HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 76 - 100 of 279) sorted by null

1 2 34 5 6 7 8 91011>>

  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/chromium_org/chrome/browser/sync/
profile_sync_service.h 122 // using the passed passphrase.
124 // passphrase.
210 // Used to specify the kind of passphrase with which sync data is encrypted.
212 IMPLICIT, // The user did not provide a custom passphrase for encryption.
214 EXPLICIT, // The user selected the "use custom passphrase" radio button
215 // during sync setup and provided a passphrase.
522 // Returns true if a secondary (explicit) passphrase is being used. It is not
526 // Returns the actual passphrase type being used for encryption.
529 // Returns the time the current explicit passphrase (if any), was set.
530 // If no secondary passphrase is in use, or no time is available, returns a
    [all...]
profile_sync_service.cc     [all...]
profile_sync_service_android.cc 239 // a passphrase if cryptographer has any pending keys.
244 // Passwords datatype should never prompt for a passphrase, except when
245 // user is using a custom passphrase. Do not prompt for a passphrase if
247 // notification for passphrase when PSS has not completed configuring
270 JNIEnv* env, jobject obj, jstring passphrase) {
272 std::string key = ConvertJavaStringToUTF8(env, passphrase);
277 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) {
279 std::string key = ConvertJavaStringToUTF8(env, passphrase);
profile_sync_service_mock.h 123 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase));
124 MOCK_METHOD2(SetEncryptionPassphrase, void(const std::string& passphrase,
profile_sync_service_harness.cc 223 // Make sure that initial sync wasn't blocked by a missing passphrase.
225 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
252 // Set an implicit passphrase for encryption if an explicit one hasn't already
253 // been set. If an explicit passphrase has been set, immediately return false,
254 // since a decryption passphrase is required.
258 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
273 // Make sure that initial sync wasn't blocked by a missing passphrase.
275 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
339 // A passphrase is required for decryption and we don't have it. Do not
382 // A passphrase is now required. Wait for it to be accepted
    [all...]
  /external/chromium/chrome/browser/sync/protocol/
nigori_specifics.proto 34 // True if |encrypted| is encrypted using a passphrase
  /external/chromium/chrome/browser/sync/util/
cryptographer.h 31 // protected with a particular passphrase.
35 // Most likely, an updated Nigori node means that a new passphrase has been set
37 // should be prompted for the new passphrase and DecryptPendingKeys be called.
54 // passphrase.
  /external/chromium_org/chrome/browser/sync/test/integration/
passwords_helper.cc 118 const std::string& passphrase,
121 test()->GetProfile(index))->SetEncryptionPassphrase(passphrase, type);
124 bool SetDecryptionPassphrase(int index, const std::string& passphrase) {
126 test()->GetProfile(index))->SetDecryptionPassphrase(passphrase);
  /external/openssh/regress/
keygen-change.sh 4 tid="change passphrase for key"
  /system/netd/
SoftapController.cpp 126 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
231 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
235 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
SoftapController.h 42 void generatePsk(char *ssid, char *passphrase, char *psk);
  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host.cc 167 // Called to set the passphrase for encryption.
168 void DoSetEncryptionPassphrase(const std::string& passphrase,
172 void DoSetDecryptionPassphrase(const std::string& passphrase);
427 void SyncBackendHost::SetEncryptionPassphrase(const std::string& passphrase,
436 // We should never be called with an empty passphrase.
437 DCHECK(!passphrase.empty());
443 // encrypted with an explicit passphrase.
451 passphrase, is_explicit));
454 bool SyncBackendHost::SetDecryptionPassphrase(const std::string& passphrase) {
461 // We should never be called with an empty passphrase
    [all...]
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl_unittest.cc 139 const std::string& passphrase) {
140 VerifyMigratedNigoriWithTimestamp(0, passphrase_type, passphrase);
146 const std::string& passphrase) {
185 KeyParams params = {"localhost", "dummy", passphrase};
234 // Build a migrated nigori node with the specified default passphrase
268 // Build a migrated nigori node with the specified default passphrase
269 // as a custom passphrase.
299 // Build an unmigrated nigori node with the specified passphrase and type and
714 // Test that we don't attempt to migrate while an implicit passphrase is pending
716 // migrated, we should be in keystore passphrase state
    [all...]
  /external/chromium/chrome/browser/sync/
profile_sync_service.h 246 // dialog for the error condition (relogin / enter passphrase).
422 // Returns true if a secondary passphrase is being used.
425 // Sets the Cryptographer's passphrase, or caches it until that is possible.
426 // This will check asynchronously whether the passphrase is valid and notify
430 // setting a passphrase as opposed to implicitly (from the users' perspective)
432 // *not* override an explicit passphrase set previously.
434 // up a new passphrase, and false if it's being set in response to a prompt
435 // for an existing passphrase.
436 virtual void SetPassphrase(const std::string& passphrase,
508 // backend, telling us that it is safe to send a passphrase down ASAP
    [all...]
profile_sync_service.cc 612 // First try supplying gaia password as the passphrase.
619 // If the above failed then try the custom passphrase the user might have
629 // We will skip the passphrase prompt and suppress the warning
630 // if the passphrase is needed for decryption but the user is
646 // Make sure the data types that depend on the passphrase are started at
651 // since we know we no longer require the passphrase.
    [all...]
  /external/chromium_org/sync/engine/
apply_control_data_updates_unittest.cc 306 // types, but preserve the custom passphrase state of the server.
326 // and a custom passphrase (unmigrated).
384 // types, but preserve the custom passphrase state of the server.
404 // and a custom passphrase (unmigrated).
532 // If both nigoris are migrated, but we also set a custom passphrase locally,
551 // Create server specifics with a migrated keystore passphrase type.
570 // Set up a local nigori with a migrated custom passphrase type
614 // If both nigoris are migrated, but a custom passphrase with a new key was
634 // Create server specifics with a migrated custom passphrase type.
651 // Set up a local nigori with a migrated keystore passphrase typ
    [all...]
conflict_util.cc 44 // commonly seen when positional changes are made while a passphrase is
  /external/openssh/
sshconnect1.c 210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
    [all...]
readpass.c 113 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the
114 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If
115 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
  /prebuilts/tools/common/gradle-plugins/repository/org/apache/commons/commons-parent/3/
commons-parent-3.pom 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 144 * passphrase - WPA ASCII passphrase
146 * If this is set, psk will be generated using the SSID and passphrase
147 * configured for the network. ASCII passphrase must be between 8 and
150 char *passphrase; member in struct:wpa_ssid
153 * ext_psk - PSK/passphrase name in external storage
155 * If this is set, PSK/passphrase will be fetched from external storage
318 * be set (either directly or using ASCII passphrase).
  /external/chromium_org/chrome/browser/extensions/api/networking_private/
networking_private_apitest.cc 290 " \"Passphrase\": \"FAKE_CREDENTIAL_VPaJDV9x\" }"
313 " \"Passphrase\": \"passphrase\","
314 " \"Recommended\": [ \"AutoConnect\", \"Passphrase\" ],"
  /external/chromium_org/sync/protocol/
client_debug_info.proto 146 PASSPHRASE_REQUIRED = 3; // Cryptographer needs passphrase.
147 PASSPHRASE_ACCEPTED = 4; // Passphrase was accepted by cryptographer.
159 PASSPHRASE_TYPE_CHANGED = 10; // The encryption passphrase state changed.
190 // Cryptographer has pending keys which indicates the correct passphrase
  /external/javassist/
pom.xml 177 <passphrase>${gpg.passphrase}</passphrase>

Completed in 2241 milliseconds

1 2 34 5 6 7 8 91011>>