/external/chromium/chrome/browser/resources/options/ |
sync_setup_overlay.html | 307 <div id="sync-passphrase-container"> 308 <div id="passphrase-encryption-message" 323 <div id="sync-custom-passphrase" hidden> 324 <div id="sync-passphrase-message"> 330 <div class="sync-custom-passphrase-input"> 331 <input id="custom-passphrase" type="password" 334 <div class="sync-custom-passphrase-input"> 335 <input id="confirm-passphrase" type="password" 358 <div id="sync-setup-passphrase" class="hidden"> 362 <div id="enter-passphrase"> [all...] |
sync_setup_overlay.js | 16 // True if the synced account uses a custom passphrase. 89 $('passphraseForm').onsubmit = $('passphrase-ok').onclick = function() { 93 $('passphrase-cancel').onclick = function() { 115 $('passphrase-ok').disabled = true; 116 $('passphrase-cancel').disabled = true; 122 var result = JSON.stringify({"passphrase": f.passphrase.value}); 123 chrome.send("Passphrase", [result]); 140 $('sync-custom-passphrase').hidden = true; 142 $('sync-custom-passphrase').hidden = false [all...] |
sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/openssh/ |
ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 68 If ssh-add needs a passphrase, it will read the passphrase from 72 SSH_ASKPASS and open an X11 window to read the passphrase. This
|
ssh-add.1 | 71 If any file requires a passphrase, 73 asks for the passphrase from the user. 74 The passphrase is read from the user's tty. 76 retries the last passphrase if multiple identity files are given. 136 needs a passphrase, it will read the passphrase from the current 146 and open an X11 window to read the passphrase.
|
ssh-keygen.0 | 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 48 name but ``.pub'' appended. The program also asks for a passphrase. The 49 passphrase may be empty to indicate no passphrase (host keys must have an 50 empty passphrase), or it may be a string of arbitrary length. A 51 passphrase is similar to a password, except it can be a phrase with a 57 alphanumeric characters. The passphrase can be changed later by using 60 There is no way to recover a lost passphrase. If the passphrase is lost 77 key file path, an empty passphrase, default bits for the ke [all...] |
ssh-keygen.1 | 71 .Op Fl P Ar passphrase 161 The program also asks for a passphrase. 162 The passphrase may be empty to indicate no passphrase 163 (host keys must have an empty passphrase), or it may be a string of 165 A passphrase is similar to a password, except it can be a phrase with a 173 The passphrase can be changed later by using the 177 There is no way to recover a lost passphrase. 178 If the passphrase is lost or forgotten, a new key must be generated 199 an empty passphrase, default bits for the key type, and default comment [all...] |
ssh-keygen.c | 61 * Flag indicating that we just want to change the passphrase. This can be 94 /* This is set to the passphrase if given on the command line. */ 97 /* This is set to the new passphrase if given on the command line. */ 247 pass = read_passphrase("Enter passphrase: ", 1174 * Perform changing a passphrase. The argument is the passwd structure 1191 /* Try to load the file with empty passphrase. */ 1198 read_passphrase("Enter old passphrase: ", 1205 printf("Bad passphrase.\n"); 1211 /* Ask the new passphrase (twice). */ 1217 read_passphrase("Enter new passphrase (empty for no 1293 char new_comment[1024], *comment, *passphrase; local [all...] |
/external/chromium_org/sync/engine/ |
apply_control_data_updates.cc | 87 // handles the case where two clients both set a different passphrase. The 90 // everything with the passphrase of the first client and commit the set of 92 // passphrase, the cryptographer will preserve the encryption keys based on the 93 // local passphrase, while the nigori node will preserve the server encryption 113 // for encryption, but didn't change the passphrase. 144 // passphrase. If we had migrated locally, we will re-migrate when the 145 // pending keys are provided. If we had set a new custom passphrase locally 146 // the user will have another chance to set a custom passphrase later 147 // (assuming they hadn't set a custom passphrase on the other client). 156 // They're both migrated, preserve the local nigori if the passphrase [all...] |
/external/chromium/chrome/browser/sync/resources/ |
configure.html | 55 #sync-passphrase-container { 59 #sync-custom-passphrase { 63 #sync-passphrase-message { 67 .sync-custom-passphrase-input { 138 #sync-passphrase-warning { 205 #change-passphrase { 286 // passphrase. 378 // The passphrase, once set, cannot be unset, but we show a reset link. 381 document.getElementById("sync-custom-passphrase").hidden = true; 462 "passphrase": f.passphrase.valu [all...] |
/external/chromium/chrome/browser/sync/ |
sync_setup_wizard.h | 33 // Choose what to encrypt and whether to use a passphrase. 35 // Show the screen that prompts for your passphrase 37 // Show the passphrase "first time" screen for migrating users, where all 38 // is explained and they choose between google password/custom passphrase.
|
/external/chromium_org/chrome/browser/chromeos/options/ |
passphrase_textfield.h | 27 // Returns the passphrase. If it's unchanged, then returns an empty string.
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.h | 45 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an 48 const std::string& passphrase, 93 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs| 101 const std::string& passphrase,
|
/external/wpa_supplicant_8/src/crypto/ |
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.h | 35 virtual void SetEncryptionPassphrase(const std::string& passphrase, 37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
|
fake_sync_encryption_handler.cc | 100 const std::string& passphrase, 107 const std::string& passphrase) {
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 68 else if (strcmp(tmp, "PASSPHRASE") == 0) { 69 queryField->setText(tr("Private key passphrase: "));
|
/external/chromium_org/chromeos/test/data/network/ |
invalid_settings_with_repairs.json | 143 "Passphrase": "some passphrase", 153 "Passphrase": "some passphrase", 288 "Passphrase": "12345678", 312 "Passphrase": "12345678",
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 70 std::string passphrase; member in struct:__anon9010::SyncConfigInfo 155 // Passphrase settings. 168 if (!result->GetString("passphrase", &config->passphrase)) { 169 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value"; 332 // usePassphrase: true if the data is encrypted with a secondary passphrase 333 // show_passphrase: true if a passphrase is needed to decrypt the sync data 358 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase 650 // if (for example) some kind of passphrase error is encountered. 655 if (!configuration.passphrase.empty()) [all...] |
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/external/chromium_org/chrome/browser/sync/test/integration/ |
two_client_passwords_sync_test.cc | 29 static const char* kValidPassphrase = "passphrase!"; 30 static const char* kAnotherValidPassphrase = "another passphrase!"; 125 ASSERT_TRUE(GetClient(1)->AwaitFullSyncCompletion("Set passphrase.")); 265 // Setup 1 with a different passphrase, so that it fails to sync. 281 // Update 1 with the correct passphrase, the password should now sync over.
|
/external/chromium/chrome/browser/sync/glue/ |
sync_backend_host.h | 82 // The syncer requires a passphrase to decrypt sensitive 84 // setup by the user as well as anytime any the passphrase is 86 // |passphrase_required_for_decryption| is false, the passphrase is 90 // Called when the passphrase provided by the user is 92 // encrypted using the accepted passphrase. 150 // Called on |frontend_loop_| to asynchronously set the passphrase. 152 // setting a passphrase as opposed to implicitly (from the users' perspective) 154 // *not* override an explicit passphrase set previously. 155 void SetPassphrase(const std::string& passphrase, bool is_explicit); 241 // Whether or not the Nigori node is encrypted using an explicit passphrase [all...] |
/external/dropbear/ |
keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { 82 return openssh_read(filename, passphrase); 87 return sshcom_read(filename, passphrase); 93 int import_write(const char *filename, sign_key *key, char *passphrase, 97 return openssh_write(filename, key, passphrase); 102 return sshcom_write(filename, key, passphrase); [all...] |
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 101 base::StringPiece passphrase, 105 const std::string combined = salt.as_string() + passphrase.as_string(); 191 base::StringPiece passphrase, 204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context); 371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See 375 base::StringPiece passphrase, 413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt, 414 passphrase.size() + salt.size(), key); 422 cipher_key_length, hash_function, passphrase, salt, 621 base::StringPiece passphrase) { 693 sizeof(key), HASH_AlgSHA1, passphrase, local [all...] |
/external/openssh/contrib/ |
README | 20 passphrase requester. This is highly recommended: 35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or
|