HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 26 - 50 of 279) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
  /external/chromium_org/chromeos/test/data/network/
toplevel_wifi_wpa_psk.onc 35 "Passphrase": "some passphrase",
toplevel_wifi_wep_proxy.onc 8 "Passphrase": "z123456789012",
toplevel_with_unknown_fields.onc 22 "Passphrase": "12345678",
  /external/chromium_org/sync/protocol/
nigori_specifics.proto 87 // The state of the passphrase required to decrypt |encryption_keybag|.
89 // Gaia-based encryption passphrase. Deprecated.
91 // Keystore key encryption passphrase. Uses |keystore_bootstrap| to
94 // Previous Gaia-based passphrase frozen and treated as a custom passphrase.
96 // User provided custom passphrase.
111 // The time (in epoch milliseconds) at which a custom passphrase was set.
112 // Note: this field may not be set if the custom passphrase was applied before
encryption.proto 22 // change their passphrase (and thus their encryption key) at any time. When
24 // passphrase, but since we don't have transactions on the server-side, we
  /external/chromium_org/chrome/browser/resources/
sync_setup_overlay.js 8 // True if the synced account uses a custom passphrase.
110 $('sync-custom-passphrase').hidden = !visible;
196 var customPassphrase = $('custom-passphrase');
202 var confirmPassphrase = $('confirm-passphrase');
227 if (!$('sync-existing-passphrase-container').hidden) {
228 // If we were prompted for an existing passphrase, use it.
229 customPassphrase = $('choose-data-types-form').passphrase.value;
233 googlePassphrase = !$('google-passphrase-needed-body').hidden;
234 // We allow an empty passphrase, in case the user has disabled
236 // the passphrase and finish configuration. If the user has enable
    [all...]
sync_setup_overlay.html 138 <div id="sync-custom-passphrase-container"
140 <div id="sync-custom-passphrase"
142 <div id="sync-passphrase-message">
149 <div class="sync-custom-passphrase-input">
150 <input id="custom-passphrase" type="password"
154 <div class="sync-custom-passphrase-input">
155 <input id="confirm-passphrase" type="password"
165 <div id="sync-existing-passphrase-container" hidden>
166 <div id="enter-passphrase">
169 <span id="google-passphrase-needed-body
    [all...]
  /external/chromium_org/chrome/browser/sync/
profile_sync_service_android.h 81 // Returns true if the sync code needs a passphrase for either encryption or
82 // decryption (can need a passphrase for encryption if the user is turning on
83 // encryption and no passphrase has been set yet).
86 // Returns true if the sync code needs a decryption passphrase for one of the
90 // Returns true if the sync code needs a decryption passphrase for *any* type,
94 // Returns true if the sync code needs a custom decryption passphrase.
98 // Returns true if the decryption passphrase works (was able to decrypt the
103 jstring passphrase);
105 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true
106 // then the passphrase is treated as a google (GAIA) passphrase, otherwis
    [all...]
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl.h 60 virtual void SetEncryptionPassphrase(const std::string& passphrase,
62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
157 // explicit passphrase state (if the cryptographer is ready).
175 // Sets a new custom passphrase. Should only be called if a custom passphrase
178 // passphrase already existed.
179 void SetCustomPassphrase(const std::string& passphrase,
182 // Decrypt the encryption keybag using a user provided passphrase.
183 // Should only be called if the current passphrase is a frozen implicit
184 // passphrase or a custom passphrase
    [all...]
sync_encryption_handler_impl.cc 67 // The new passphrase state is sufficient to determine whether a nigori node
70 // 1. Passphrase state is set.
73 // 4. If passphrase state is keystore, keystore_decryptor_token is set.
316 // sync from happening until the the passphrase is provided.
322 const std::string& passphrase,
326 if (passphrase.empty()) {
327 NOTREACHED() << "Cannot encrypt with an empty passphrase.";
333 KeyParams key_params = {"localhost", "dummy", passphrase};
343 // Once we've migrated to keystore, the only way to set a passphrase for
344 // encryption is to set a custom passphrase
    [all...]
  /external/chromium/chrome/browser/sync/resources/
passphrase.html 45 #passphrase-input {
76 #sync-passphrase-warning {
108 var result = JSON.stringify({"passphrase": f.passphrase.value});
109 chrome.send("Passphrase", [result]);
134 <div id="enter-passphrase">
143 <div id="passphrase-input">
145 for="passphrase" i18n-content="passphraseLabel">
147 <input id="passphrase" name="passphrase" type="password" /
    [all...]
firstpassphrase.html 66 #passphrase {
119 if (f.passphrase.value.length == 0) {
123 if (f.confirmpassphrase.value != f.passphrase.value) {
137 "passphrase": f.passphrase.value});
143 "passphrase": ""});
setup_flow.html 6 var pages = ['login', 'configure', 'passphrase',
22 function showPassphrase() { showPage('passphrase'); }
41 <iframe id="passphrase" frameborder="0" width="100%" scrolling="no"
42 height="100%" src="chrome://syncresources/passphrase"
  /external/chromium_org/chrome/browser/sync/test/integration/
passwords_helper.h 41 // Sets the cryptographer's encryption passphrase for the profile at index
42 // |index| to |passphrase|, and passphrase type |type|.
44 const std::string& passphrase,
47 // Sets the cryptographer's decryption passphrase for the profile at index
48 // |index| to |passphrase|. Returns false if the operation failed, and true
50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
  /external/chromium/chrome/browser/sync/
sync_setup_flow.h 63 // Fills |args| for the enter passphrase screen.
85 // The 'passphrase' screen is used when the user is prompted to enter
86 // an existing passphrase.
87 void OnPassphraseEntry(const std::string& passphrase);
89 // The user canceled the passphrase entry without supplying a passphrase.
92 // The 'first passphrase' screen is for users migrating from a build
93 // without passwords, who are prompted to make a passphrase choice.
96 const std::string& passphrase);
145 // Set to true if we've tried creating/setting an explicit passphrase, so w
    [all...]
  /external/openssh/
authfile.c 7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase too short: have %d bytes, need > 4", len)
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
data_type_encryption_handler.h 19 // Returns true if a passphrase is required for encryption to proceed, false
sync_backend_host.h 94 // The syncer requires a passphrase to decrypt sensitive updates. This is
96 // the passphrase is changed by another synced client. |reason| denotes why
97 // the passphrase was required. |pending_keys| is a copy of the
104 // Called when the passphrase provided by the user is
106 // encrypted using the accepted passphrase.
199 // Called on |frontend_loop_| to asynchronously set a new passphrase for
202 // - An explicit passphrase has already been set
207 // passphrase passed in is cached so we can re-encrypt with it in future.
208 // - If there are no pending keys, data is encrypted with |passphrase| (this
209 // is a no-op if data was already encrypted with |passphrase|.
    [all...]
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
ProfileSyncService.java 182 * Checks if a password or a passphrase is required for decryption of sync data.
184 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required.
186 * @return the enum describing the decryption passphrase type required
192 // passphrase type we should tell the user we need.
202 * Returns the actual passphrase type being used for encryption. The sync backend must be
206 * should ask the user for a passphrase, you should instead use
221 * Returns true if the current explicit passphrase time is defined.
248 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running
251 * @return true if sync is using a custom passphrase.
259 * Checks if we need a passphrase to decrypt a currently-enabled data type. This returns fals
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) {
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
288 web_ui_->RegisterMessageCallback("Passphrase",
321 StringValue page("passphrase");
422 std::string passphrase;
448 std::string passphrase; local
    [all...]
  /external/chromium/chrome/browser/sync/protocol/
encryption.proto 22 // change their passphrase (and thus their encryption key) at any time. When
24 // passphrase, but since we don't have transactions on the server-side, we
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.h 35 base::StringPiece passphrase,
39 base::StringPiece passphrase);
  /external/dropbear/
keyimport.h 37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);

Completed in 1364 milliseconds

12 3 4 5 6 7 8 91011>>