HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 26 - 50 of 92) sorted by null

12 3 4

  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host_mock.cc 38 const std::string& passphrase,
42 const std::string& passphrase) {
sync_backend_host_impl.cc 158 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase,
167 // We should never be called with an empty passphrase.
168 DCHECK(!passphrase.empty());
174 // encrypted with an explicit passphrase.
182 passphrase, is_explicit));
186 const std::string& passphrase) {
193 // We should never be called with an empty passphrase.
194 DCHECK(!passphrase.empty());
202 // Check the passphrase that was provided against our local cache of the
205 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase))
    [all...]
sync_backend_host_impl.h 94 const std::string& passphrase,
96 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
192 // passphrase. |token| must be valid UTF-8 as we use the PrefService for
205 // Checks if |passphrase| can be used to decrypt the cryptographer's pending
210 const std::string& passphrase) const;
212 // Invoked when a passphrase is required to decrypt a set of Nigori keys,
213 // or for encrypting. |reason| denotes why the passphrase was required.
215 // cached by the frontend. If there are no pending keys, or if the passphrase
221 // Invoked when the passphrase provided by the user has been accepted.
233 // Invoked when the passphrase state has changed. Caches the passphrase stat
    [all...]
sync_backend_host_core.h 149 // Called to set the passphrase for encryption.
150 void DoSetEncryptionPassphrase(const std::string& passphrase,
154 void DoSetDecryptionPassphrase(const std::string& passphrase);
sync_backend_host_core.cc 418 const std::string& passphrase,
422 passphrase, is_explicit);
480 const std::string& passphrase) {
483 passphrase);
  /external/chromium_org/sync/test/
fake_sync_encryption_handler.cc 100 const std::string& passphrase,
107 const std::string& passphrase) {
  /external/chromium_org/chrome/browser/chromeos/settings/
token_encryptor.h 49 // Converts |passphrase| to a SymmetricKey using the given |salt|.
50 crypto::SymmetricKey* PassphraseToKey(const std::string& passphrase,
  /external/chromium_org/chrome/browser/sync/test/integration/
passwords_helper.cc 118 const std::string& passphrase,
121 test()->GetProfile(index))->SetEncryptionPassphrase(passphrase, type);
124 bool SetDecryptionPassphrase(int index, const std::string& passphrase) {
126 test()->GetProfile(index))->SetDecryptionPassphrase(passphrase);
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.cc 101 base::StringPiece passphrase,
105 const std::string combined = salt.as_string() + passphrase.as_string();
191 base::StringPiece passphrase,
204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context);
371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See
375 base::StringPiece passphrase,
413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt,
414 passphrase.size() + salt.size(), key);
422 cipher_key_length, hash_function, passphrase, salt,
621 base::StringPiece passphrase) {
693 sizeof(key), HASH_AlgSHA1, passphrase, local
    [all...]
  /external/openssh/
sshconnect1.c 210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
    [all...]
ssh-keygen.c 61 * Flag indicating that we just want to change the passphrase. This can be
94 /* This is set to the passphrase if given on the command line. */
97 /* This is set to the new passphrase if given on the command line. */
247 pass = read_passphrase("Enter passphrase: ",
1174 * Perform changing a passphrase. The argument is the passwd structure
1191 /* Try to load the file with empty passphrase. */
1198 read_passphrase("Enter old passphrase: ",
1205 printf("Bad passphrase.\n");
1211 /* Ask the new passphrase (twice). */
1217 read_passphrase("Enter new passphrase (empty for no
1293 char new_comment[1024], *comment, *passphrase; local
    [all...]
cipher.c 296 * passphrase and using the resulting 16 bytes as the key.
301 const char *passphrase, int do_encrypt)
307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
  /external/chromium_org/chrome/browser/resources/
sync_setup_overlay.css 27 #sync-custom-passphrase {
31 #sync-passphrase-message {
35 .sync-custom-passphrase-input {
39 #sync-existing-passphrase-container {
118 #passphrase-input {
123 #incorrect-passphrase {
154 #sync-passphrase-warning {
  /external/chromium/chrome/browser/chromeos/status/
network_menu.h 43 // Remembered passphrase.
44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo
45 // true if the network requires a passphrase.
60 const std::string& passphrase,
  /external/chromium_org/chrome/browser/sync/
profile_sync_service_android.h 81 // Returns true if the sync code needs a passphrase for either encryption or
82 // decryption (can need a passphrase for encryption if the user is turning on
83 // encryption and no passphrase has been set yet).
86 // Returns true if the sync code needs a decryption passphrase for one of the
90 // Returns true if the sync code needs a decryption passphrase for *any* type,
94 // Returns true if the sync code needs a custom decryption passphrase.
98 // Returns true if the decryption passphrase works (was able to decrypt the
103 jstring passphrase);
105 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true
106 // then the passphrase is treated as a google (GAIA) passphrase, otherwis
    [all...]
profile_sync_service_mock.h 125 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase));
126 MOCK_METHOD2(SetEncryptionPassphrase, void(const std::string& passphrase,
profile_sync_service.h 132 // using the passed passphrase.
134 // passphrase.
240 // Used to specify the kind of passphrase with which sync data is encrypted.
242 IMPLICIT, // The user did not provide a custom passphrase for encryption.
244 EXPLICIT, // The user selected the "use custom passphrase" radio button
245 // during sync setup and provided a passphrase.
594 // Returns true if a secondary (explicit) passphrase is being used. It is not
598 // Returns the actual passphrase type being used for encryption.
601 // Returns the time the current explicit passphrase (if any), was set.
602 // If no secondary passphrase is in use, or no time is available, returns a
    [all...]
profile_sync_service_android.cc 230 // a passphrase if cryptographer has any pending keys.
235 // Passwords datatype should never prompt for a passphrase, except when
236 // user is using a custom passphrase. Do not prompt for a passphrase if
238 // notification for passphrase when PSS has not completed configuring
261 JNIEnv* env, jobject obj, jstring passphrase) {
263 std::string key = ConvertJavaStringToUTF8(env, passphrase);
268 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) {
270 std::string key = ConvertJavaStringToUTF8(env, passphrase);
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 144 * passphrase - WPA ASCII passphrase
146 * If this is set, psk will be generated using the SSID and passphrase
147 * configured for the network. ASCII passphrase must be between 8 and
150 char *passphrase; member in struct:wpa_ssid
153 * ext_psk - PSK/passphrase name in external storage
155 * If this is set, PSK/passphrase will be fetched from external storage
318 * be set (either directly or using ASCII passphrase).
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 71 std::string passphrase; member in struct:__anon6567::SyncConfigInfo
156 // Passphrase settings.
169 if (!result->GetString("passphrase", &config->passphrase)) {
170 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value";
333 // usePassphrase: true if the data is encrypted with a secondary passphrase
334 // show_passphrase: true if a passphrase is needed to decrypt the sync data
359 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase
648 // if (for example) some kind of passphrase error is encountered.
653 if (!configuration.passphrase.empty())
    [all...]
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl.cc 67 // The new passphrase state is sufficient to determine whether a nigori node
70 // 1. Passphrase state is set.
73 // 4. If passphrase state is keystore, keystore_decryptor_token is set.
316 // sync from happening until the the passphrase is provided.
322 const std::string& passphrase,
326 if (passphrase.empty()) {
327 NOTREACHED() << "Cannot encrypt with an empty passphrase.";
333 KeyParams key_params = {"localhost", "dummy", passphrase};
343 // Once we've migrated to keystore, the only way to set a passphrase for
344 // encryption is to set a custom passphrase
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 424 char *passphrase, *strpassphrase; local
432 passphrase = radius_msg_get_tunnel_password(
436 * Passphrase is NULL iff there is no i-th Tunnel-Password
439 if (passphrase == NULL)
442 * passphrase does not contain the NULL termination.
448 os_memcpy(strpassphrase, passphrase, passphraselen);
459 os_free(passphrase);
  /external/chromium/chrome/browser/sync/
sync_setup_flow.cc 159 args->SetString("iframeToShow", "passphrase");
238 // If we are activating the passphrase, we need to have one supplied.
253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) {
255 service_->SetPassphrase(passphrase, true, false);
260 // If the user cancels when being asked for the passphrase,
270 const std::string& passphrase) {
  /external/chromium_org/chromeos/network/
network_configuration_handler_unittest.cc 526 std::string identity, passphrase; local
530 service_path, shill::kPassphraseProperty, &passphrase));
532 EXPECT_EQ(test_passphrase, passphrase);
552 service_path, shill::kIdentityProperty, &passphrase));

Completed in 948 milliseconds

12 3 4