HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 1 - 25 of 92) sorted by null

1 2 3 4

  /external/dropbear/
keyimport.h 37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
keyimport.c 53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) {
82 return openssh_read(filename, passphrase);
87 return sshcom_read(filename, passphrase);
93 int import_write(const char *filename, sign_key *key, char *passphrase,
97 return openssh_write(filename, key, passphrase);
102 return sshcom_write(filename, key, passphrase);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.h 35 base::StringPiece passphrase,
39 base::StringPiece passphrase);
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
  /system/netd/
SoftapController.h 42 void generatePsk(char *ssid, char *passphrase, char *psk);
SoftapController.cpp 126 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
231 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
235 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
  /external/chromium_org/chrome/browser/sync/test/integration/
passwords_helper.h 41 // Sets the cryptographer's encryption passphrase for the profile at index
42 // |index| to |passphrase|, and passphrase type |type|.
44 const std::string& passphrase,
47 // Sets the cryptographer's decryption passphrase for the profile at index
48 // |index| to |passphrase|. Returns false if the operation failed, and true
50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
  /external/chromium_org/sync/internal_api/public/
sync_encryption_handler.h 22 // Reasons due to which Cryptographer might require a passphrase.
26 // passphrase for its first attempt at
30 // passphrase for its first attempt at
34 // The different states for the encryption passphrase. These control if and how
35 // the user should be prompted for a decryption passphrase.
37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated).
38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase.
39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase.
40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase.
62 // Called when user interaction is required to obtain a valid passphrase
    [all...]
  /external/chromium_org/sync/test/
fake_sync_encryption_handler.h 35 virtual void SetEncryptionPassphrase(const std::string& passphrase,
37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
  /external/openssh/contrib/cygwin/
ssh-user-config 37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
  /external/openssh/
authfile.c 7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase too short: have %d bytes, need > 4", len)
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) {
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
288 web_ui_->RegisterMessageCallback("Passphrase",
321 StringValue page("passphrase");
422 std::string passphrase;
448 std::string passphrase; local
    [all...]
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl.h 60 virtual void SetEncryptionPassphrase(const std::string& passphrase,
62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
157 // explicit passphrase state (if the cryptographer is ready).
175 // Sets a new custom passphrase. Should only be called if a custom passphrase
178 // passphrase already existed.
179 void SetCustomPassphrase(const std::string& passphrase,
182 // Decrypt the encryption keybag using a user provided passphrase.
183 // Should only be called if the current passphrase is a frozen implicit
184 // passphrase or a custom passphrase
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host.h 83 // Called on |frontend_loop_| to asynchronously set a new passphrase for
86 // - An explicit passphrase has already been set
91 // passphrase passed in is cached so we can re-encrypt with it in future.
92 // - If there are no pending keys, data is encrypted with |passphrase| (this
93 // is a no-op if data was already encrypted with |passphrase|.)
95 const std::string& passphrase,
98 // Called on |frontend_loop_| to use the provided passphrase to asynchronously
99 // attempt decryption. Returns false immediately if the passphrase could not
104 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
175 // Returns the type of passphrase being used to encrypt data. Se
    [all...]
sync_backend_host_mock.h 47 const std::string& passphrase,
51 const std::string& passphrase) OVERRIDE;
  /external/chromium_org/chromeos/network/onc/
onc_utils.h 45 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an
48 const std::string& passphrase,
93 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|,
102 const std::string& passphrase,
  /external/chromium/chrome/browser/resources/options/
sync_setup_overlay.css 19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
ProfileSyncService.java 184 * Checks if a password or a passphrase is required for decryption of sync data.
186 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required.
188 * @return the enum describing the decryption passphrase type required
194 // passphrase type we should tell the user we need.
204 * Returns the actual passphrase type being used for encryption. The sync backend must be
208 * should ask the user for a passphrase, you should instead use
223 * Returns true if the current explicit passphrase time is defined.
250 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running
253 * @return true if sync is using a custom passphrase.
261 * Checks if we need a passphrase to decrypt a currently-enabled data type. This returns fals
    [all...]
  /external/chromium/chrome/browser/sync/
sync_setup_flow.h 63 // Fills |args| for the enter passphrase screen.
85 // The 'passphrase' screen is used when the user is prompted to enter
86 // an existing passphrase.
87 void OnPassphraseEntry(const std::string& passphrase);
89 // The user canceled the passphrase entry without supplying a passphrase.
92 // The 'first passphrase' screen is for users migrating from a build
93 // without passwords, who are prompted to make a passphrase choice.
96 const std::string& passphrase);
145 // Set to true if we've tried creating/setting an explicit passphrase, so w
    [all...]
  /external/chromium_org/chrome/browser/chromeos/settings/
token_encryptor.cc 68 const std::string& passphrase,
71 crypto::SymmetricKey::AES, passphrase, salt, 1000, 256);

Completed in 1003 milliseconds

1 2 3 4