/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service.h | 122 // using the passed passphrase. 124 // passphrase. 210 // Used to specify the kind of passphrase with which sync data is encrypted. 212 IMPLICIT, // The user did not provide a custom passphrase for encryption. 214 EXPLICIT, // The user selected the "use custom passphrase" radio button 215 // during sync setup and provided a passphrase. 522 // Returns true if a secondary (explicit) passphrase is being used. It is not 526 // Returns the actual passphrase type being used for encryption. 529 // Returns the time the current explicit passphrase (if any), was set. 530 // If no secondary passphrase is in use, or no time is available, returns a [all...] |
profile_sync_service.cc | [all...] |
profile_sync_service_android.cc | 239 // a passphrase if cryptographer has any pending keys. 244 // Passwords datatype should never prompt for a passphrase, except when 245 // user is using a custom passphrase. Do not prompt for a passphrase if 247 // notification for passphrase when PSS has not completed configuring 270 JNIEnv* env, jobject obj, jstring passphrase) { 272 std::string key = ConvertJavaStringToUTF8(env, passphrase); 277 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) { 279 std::string key = ConvertJavaStringToUTF8(env, passphrase);
|
profile_sync_service_mock.h | 123 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase)); 124 MOCK_METHOD2(SetEncryptionPassphrase, void(const std::string& passphrase,
|
profile_sync_service_harness.cc | 223 // Make sure that initial sync wasn't blocked by a missing passphrase. 225 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 252 // Set an implicit passphrase for encryption if an explicit one hasn't already 253 // been set. If an explicit passphrase has been set, immediately return false, 254 // since a decryption passphrase is required. 258 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 273 // Make sure that initial sync wasn't blocked by a missing passphrase. 275 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 339 // A passphrase is required for decryption and we don't have it. Do not 382 // A passphrase is now required. Wait for it to be accepted [all...] |
/external/chromium/chrome/browser/sync/protocol/ |
nigori_specifics.proto | 34 // True if |encrypted| is encrypted using a passphrase
|
/external/chromium/chrome/browser/sync/util/ |
cryptographer.h | 31 // protected with a particular passphrase. 35 // Most likely, an updated Nigori node means that a new passphrase has been set 37 // should be prompted for the new passphrase and DecryptPendingKeys be called. 54 // passphrase.
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
passwords_helper.cc | 118 const std::string& passphrase, 121 test()->GetProfile(index))->SetEncryptionPassphrase(passphrase, type); 124 bool SetDecryptionPassphrase(int index, const std::string& passphrase) { 126 test()->GetProfile(index))->SetDecryptionPassphrase(passphrase);
|
/external/openssh/regress/ |
keygen-change.sh | 4 tid="change passphrase for key"
|
/system/netd/ |
SoftapController.cpp | 126 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 231 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) { 235 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
|
SoftapController.h | 42 void generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host.cc | 167 // Called to set the passphrase for encryption. 168 void DoSetEncryptionPassphrase(const std::string& passphrase, 172 void DoSetDecryptionPassphrase(const std::string& passphrase); 427 void SyncBackendHost::SetEncryptionPassphrase(const std::string& passphrase, 436 // We should never be called with an empty passphrase. 437 DCHECK(!passphrase.empty()); 443 // encrypted with an explicit passphrase. 451 passphrase, is_explicit)); 454 bool SyncBackendHost::SetDecryptionPassphrase(const std::string& passphrase) { 461 // We should never be called with an empty passphrase [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl_unittest.cc | 139 const std::string& passphrase) { 140 VerifyMigratedNigoriWithTimestamp(0, passphrase_type, passphrase); 146 const std::string& passphrase) { 185 KeyParams params = {"localhost", "dummy", passphrase}; 234 // Build a migrated nigori node with the specified default passphrase 268 // Build a migrated nigori node with the specified default passphrase 269 // as a custom passphrase. 299 // Build an unmigrated nigori node with the specified passphrase and type and 714 // Test that we don't attempt to migrate while an implicit passphrase is pending 716 // migrated, we should be in keystore passphrase state [all...] |
/external/chromium/chrome/browser/sync/ |
profile_sync_service.h | 246 // dialog for the error condition (relogin / enter passphrase). 422 // Returns true if a secondary passphrase is being used. 425 // Sets the Cryptographer's passphrase, or caches it until that is possible. 426 // This will check asynchronously whether the passphrase is valid and notify 430 // setting a passphrase as opposed to implicitly (from the users' perspective) 432 // *not* override an explicit passphrase set previously. 434 // up a new passphrase, and false if it's being set in response to a prompt 435 // for an existing passphrase. 436 virtual void SetPassphrase(const std::string& passphrase, 508 // backend, telling us that it is safe to send a passphrase down ASAP [all...] |
profile_sync_service.cc | 612 // First try supplying gaia password as the passphrase. 619 // If the above failed then try the custom passphrase the user might have 629 // We will skip the passphrase prompt and suppress the warning 630 // if the passphrase is needed for decryption but the user is 646 // Make sure the data types that depend on the passphrase are started at 651 // since we know we no longer require the passphrase. [all...] |
/external/chromium_org/sync/engine/ |
apply_control_data_updates_unittest.cc | 306 // types, but preserve the custom passphrase state of the server. 326 // and a custom passphrase (unmigrated). 384 // types, but preserve the custom passphrase state of the server. 404 // and a custom passphrase (unmigrated). 532 // If both nigoris are migrated, but we also set a custom passphrase locally, 551 // Create server specifics with a migrated keystore passphrase type. 570 // Set up a local nigori with a migrated custom passphrase type 614 // If both nigoris are migrated, but a custom passphrase with a new key was 634 // Create server specifics with a migrated custom passphrase type. 651 // Set up a local nigori with a migrated keystore passphrase typ [all...] |
conflict_util.cc | 44 // commonly seen when positional changes are made while a passphrase is
|
/external/openssh/ |
sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
readpass.c | 113 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the 114 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If 115 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
|
/prebuilts/tools/common/gradle-plugins/repository/org/apache/commons/commons-parent/3/ |
commons-parent-3.pom | 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 144 * passphrase - WPA ASCII passphrase 146 * If this is set, psk will be generated using the SSID and passphrase 147 * configured for the network. ASCII passphrase must be between 8 and 150 char *passphrase; member in struct:wpa_ssid 153 * ext_psk - PSK/passphrase name in external storage 155 * If this is set, PSK/passphrase will be fetched from external storage 318 * be set (either directly or using ASCII passphrase).
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_apitest.cc | 290 " \"Passphrase\": \"FAKE_CREDENTIAL_VPaJDV9x\" }" 313 " \"Passphrase\": \"passphrase\"," 314 " \"Recommended\": [ \"AutoConnect\", \"Passphrase\" ],"
|
/external/chromium_org/sync/protocol/ |
client_debug_info.proto | 146 PASSPHRASE_REQUIRED = 3; // Cryptographer needs passphrase. 147 PASSPHRASE_ACCEPTED = 4; // Passphrase was accepted by cryptographer. 159 PASSPHRASE_TYPE_CHANGED = 10; // The encryption passphrase state changed. 190 // Cryptographer has pending keys which indicates the correct passphrase
|
/external/javassist/ |
pom.xml | 177 <passphrase>${gpg.passphrase}</passphrase>
|