/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
/external/chromium_org/chromeos/test/data/network/ |
toplevel_wifi_wpa_psk.onc | 35 "Passphrase": "some passphrase",
|
toplevel_wifi_wep_proxy.onc | 8 "Passphrase": "z123456789012",
|
toplevel_with_unknown_fields.onc | 22 "Passphrase": "12345678",
|
/external/chromium_org/sync/protocol/ |
nigori_specifics.proto | 87 // The state of the passphrase required to decrypt |encryption_keybag|. 89 // Gaia-based encryption passphrase. Deprecated. 91 // Keystore key encryption passphrase. Uses |keystore_bootstrap| to 94 // Previous Gaia-based passphrase frozen and treated as a custom passphrase. 96 // User provided custom passphrase. 111 // The time (in epoch milliseconds) at which a custom passphrase was set. 112 // Note: this field may not be set if the custom passphrase was applied before
|
encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When 24 // passphrase, but since we don't have transactions on the server-side, we
|
/external/chromium_org/chrome/browser/resources/ |
sync_setup_overlay.js | 8 // True if the synced account uses a custom passphrase. 110 $('sync-custom-passphrase').hidden = !visible; 196 var customPassphrase = $('custom-passphrase'); 202 var confirmPassphrase = $('confirm-passphrase'); 227 if (!$('sync-existing-passphrase-container').hidden) { 228 // If we were prompted for an existing passphrase, use it. 229 customPassphrase = $('choose-data-types-form').passphrase.value; 233 googlePassphrase = !$('google-passphrase-needed-body').hidden; 234 // We allow an empty passphrase, in case the user has disabled 236 // the passphrase and finish configuration. If the user has enable [all...] |
sync_setup_overlay.html | 138 <div id="sync-custom-passphrase-container" 140 <div id="sync-custom-passphrase" 142 <div id="sync-passphrase-message"> 149 <div class="sync-custom-passphrase-input"> 150 <input id="custom-passphrase" type="password" 154 <div class="sync-custom-passphrase-input"> 155 <input id="confirm-passphrase" type="password" 165 <div id="sync-existing-passphrase-container" hidden> 166 <div id="enter-passphrase"> 169 <span id="google-passphrase-needed-body [all...] |
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service_android.h | 81 // Returns true if the sync code needs a passphrase for either encryption or 82 // decryption (can need a passphrase for encryption if the user is turning on 83 // encryption and no passphrase has been set yet). 86 // Returns true if the sync code needs a decryption passphrase for one of the 90 // Returns true if the sync code needs a decryption passphrase for *any* type, 94 // Returns true if the sync code needs a custom decryption passphrase. 98 // Returns true if the decryption passphrase works (was able to decrypt the 103 jstring passphrase); 105 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true 106 // then the passphrase is treated as a google (GAIA) passphrase, otherwis [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl.h | 60 virtual void SetEncryptionPassphrase(const std::string& passphrase, 62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE; 157 // explicit passphrase state (if the cryptographer is ready). 175 // Sets a new custom passphrase. Should only be called if a custom passphrase 178 // passphrase already existed. 179 void SetCustomPassphrase(const std::string& passphrase, 182 // Decrypt the encryption keybag using a user provided passphrase. 183 // Should only be called if the current passphrase is a frozen implicit 184 // passphrase or a custom passphrase [all...] |
sync_encryption_handler_impl.cc | 67 // The new passphrase state is sufficient to determine whether a nigori node 70 // 1. Passphrase state is set. 73 // 4. If passphrase state is keystore, keystore_decryptor_token is set. 316 // sync from happening until the the passphrase is provided. 322 const std::string& passphrase, 326 if (passphrase.empty()) { 327 NOTREACHED() << "Cannot encrypt with an empty passphrase."; 333 KeyParams key_params = {"localhost", "dummy", passphrase}; 343 // Once we've migrated to keystore, the only way to set a passphrase for 344 // encryption is to set a custom passphrase [all...] |
/external/chromium/chrome/browser/sync/resources/ |
passphrase.html | 45 #passphrase-input { 76 #sync-passphrase-warning { 108 var result = JSON.stringify({"passphrase": f.passphrase.value}); 109 chrome.send("Passphrase", [result]); 134 <div id="enter-passphrase"> 143 <div id="passphrase-input"> 145 for="passphrase" i18n-content="passphraseLabel"> 147 <input id="passphrase" name="passphrase" type="password" / [all...] |
firstpassphrase.html | 66 #passphrase { 119 if (f.passphrase.value.length == 0) { 123 if (f.confirmpassphrase.value != f.passphrase.value) { 137 "passphrase": f.passphrase.value}); 143 "passphrase": ""});
|
setup_flow.html | 6 var pages = ['login', 'configure', 'passphrase', 22 function showPassphrase() { showPage('passphrase'); } 41 <iframe id="passphrase" frameborder="0" width="100%" scrolling="no" 42 height="100%" src="chrome://syncresources/passphrase"
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
passwords_helper.h | 41 // Sets the cryptographer's encryption passphrase for the profile at index 42 // |index| to |passphrase|, and passphrase type |type|. 44 const std::string& passphrase, 47 // Sets the cryptographer's decryption passphrase for the profile at index 48 // |index| to |passphrase|. Returns false if the operation failed, and true 50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
|
/external/chromium/chrome/browser/sync/ |
sync_setup_flow.h | 63 // Fills |args| for the enter passphrase screen. 85 // The 'passphrase' screen is used when the user is prompted to enter 86 // an existing passphrase. 87 void OnPassphraseEntry(const std::string& passphrase); 89 // The user canceled the passphrase entry without supplying a passphrase. 92 // The 'first passphrase' screen is for users migrating from a build 93 // without passwords, who are prompted to make a passphrase choice. 96 const std::string& passphrase); 145 // Set to true if we've tried creating/setting an explicit passphrase, so w [all...] |
/external/openssh/ |
authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase too short: have %d bytes, need > 4", len) [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
data_type_encryption_handler.h | 19 // Returns true if a passphrase is required for encryption to proceed, false
|
sync_backend_host.h | 94 // The syncer requires a passphrase to decrypt sensitive updates. This is 96 // the passphrase is changed by another synced client. |reason| denotes why 97 // the passphrase was required. |pending_keys| is a copy of the 104 // Called when the passphrase provided by the user is 106 // encrypted using the accepted passphrase. 199 // Called on |frontend_loop_| to asynchronously set a new passphrase for 202 // - An explicit passphrase has already been set 207 // passphrase passed in is cached so we can re-encrypt with it in future. 208 // - If there are no pending keys, data is encrypted with |passphrase| (this 209 // is a no-op if data was already encrypted with |passphrase|. [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/ |
ProfileSyncService.java | 182 * Checks if a password or a passphrase is required for decryption of sync data. 184 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required. 186 * @return the enum describing the decryption passphrase type required 192 // passphrase type we should tell the user we need. 202 * Returns the actual passphrase type being used for encryption. The sync backend must be 206 * should ask the user for a passphrase, you should instead use 221 * Returns true if the current explicit passphrase time is defined. 248 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running 251 * @return true if sync is using a custom passphrase. 259 * Checks if we need a passphrase to decrypt a currently-enabled data type. This returns fals [all...] |
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 127 !result->GetString("passphrase", &config->secondary_passphrase)) 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { 139 return result->GetString("passphrase", passphrase); 144 std::string* passphrase) { 151 result->GetString("passphrase", passphrase); 288 web_ui_->RegisterMessageCallback("Passphrase", 321 StringValue page("passphrase"); 422 std::string passphrase; 448 std::string passphrase; local [all...] |
/external/chromium/chrome/browser/sync/protocol/ |
encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When 24 // passphrase, but since we don't have transactions on the server-side, we
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.h | 35 base::StringPiece passphrase, 39 base::StringPiece passphrase);
|
/external/dropbear/ |
keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|