/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host_mock.cc | 38 const std::string& passphrase, 42 const std::string& passphrase) {
|
sync_backend_host_impl.cc | 158 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase, 167 // We should never be called with an empty passphrase. 168 DCHECK(!passphrase.empty()); 174 // encrypted with an explicit passphrase. 182 passphrase, is_explicit)); 186 const std::string& passphrase) { 193 // We should never be called with an empty passphrase. 194 DCHECK(!passphrase.empty()); 202 // Check the passphrase that was provided against our local cache of the 205 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase)) [all...] |
sync_backend_host_impl.h | 94 const std::string& passphrase, 96 virtual bool SetDecryptionPassphrase(const std::string& passphrase) 192 // passphrase. |token| must be valid UTF-8 as we use the PrefService for 205 // Checks if |passphrase| can be used to decrypt the cryptographer's pending 210 const std::string& passphrase) const; 212 // Invoked when a passphrase is required to decrypt a set of Nigori keys, 213 // or for encrypting. |reason| denotes why the passphrase was required. 215 // cached by the frontend. If there are no pending keys, or if the passphrase 221 // Invoked when the passphrase provided by the user has been accepted. 233 // Invoked when the passphrase state has changed. Caches the passphrase stat [all...] |
sync_backend_host_core.h | 149 // Called to set the passphrase for encryption. 150 void DoSetEncryptionPassphrase(const std::string& passphrase, 154 void DoSetDecryptionPassphrase(const std::string& passphrase);
|
sync_backend_host_core.cc | 418 const std::string& passphrase, 422 passphrase, is_explicit); 480 const std::string& passphrase) { 483 passphrase);
|
/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.cc | 100 const std::string& passphrase, 107 const std::string& passphrase) {
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
token_encryptor.h | 49 // Converts |passphrase| to a SymmetricKey using the given |salt|. 50 crypto::SymmetricKey* PassphraseToKey(const std::string& passphrase,
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
passwords_helper.cc | 118 const std::string& passphrase, 121 test()->GetProfile(index))->SetEncryptionPassphrase(passphrase, type); 124 bool SetDecryptionPassphrase(int index, const std::string& passphrase) { 126 test()->GetProfile(index))->SetDecryptionPassphrase(passphrase);
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 101 base::StringPiece passphrase, 105 const std::string combined = salt.as_string() + passphrase.as_string(); 191 base::StringPiece passphrase, 204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context); 371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See 375 base::StringPiece passphrase, 413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt, 414 passphrase.size() + salt.size(), key); 422 cipher_key_length, hash_function, passphrase, salt, 621 base::StringPiece passphrase) { 693 sizeof(key), HASH_AlgSHA1, passphrase, local [all...] |
/external/openssh/ |
sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
ssh-keygen.c | 61 * Flag indicating that we just want to change the passphrase. This can be 94 /* This is set to the passphrase if given on the command line. */ 97 /* This is set to the new passphrase if given on the command line. */ 247 pass = read_passphrase("Enter passphrase: ", 1174 * Perform changing a passphrase. The argument is the passwd structure 1191 /* Try to load the file with empty passphrase. */ 1198 read_passphrase("Enter old passphrase: ", 1205 printf("Bad passphrase.\n"); 1211 /* Ask the new passphrase (twice). */ 1217 read_passphrase("Enter new passphrase (empty for no 1293 char new_comment[1024], *comment, *passphrase; local [all...] |
cipher.c | 296 * passphrase and using the resulting 16 bytes as the key. 301 const char *passphrase, int do_encrypt) 307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
|
/external/chromium_org/chrome/browser/resources/ |
sync_setup_overlay.css | 27 #sync-custom-passphrase { 31 #sync-passphrase-message { 35 .sync-custom-passphrase-input { 39 #sync-existing-passphrase-container { 118 #passphrase-input { 123 #incorrect-passphrase { 154 #sync-passphrase-warning {
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.h | 43 // Remembered passphrase. 44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo 45 // true if the network requires a passphrase. 60 const std::string& passphrase,
|
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service_android.h | 81 // Returns true if the sync code needs a passphrase for either encryption or 82 // decryption (can need a passphrase for encryption if the user is turning on 83 // encryption and no passphrase has been set yet). 86 // Returns true if the sync code needs a decryption passphrase for one of the 90 // Returns true if the sync code needs a decryption passphrase for *any* type, 94 // Returns true if the sync code needs a custom decryption passphrase. 98 // Returns true if the decryption passphrase works (was able to decrypt the 103 jstring passphrase); 105 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true 106 // then the passphrase is treated as a google (GAIA) passphrase, otherwis [all...] |
profile_sync_service_mock.h | 125 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase)); 126 MOCK_METHOD2(SetEncryptionPassphrase, void(const std::string& passphrase,
|
profile_sync_service.h | 132 // using the passed passphrase. 134 // passphrase. 240 // Used to specify the kind of passphrase with which sync data is encrypted. 242 IMPLICIT, // The user did not provide a custom passphrase for encryption. 244 EXPLICIT, // The user selected the "use custom passphrase" radio button 245 // during sync setup and provided a passphrase. 594 // Returns true if a secondary (explicit) passphrase is being used. It is not 598 // Returns the actual passphrase type being used for encryption. 601 // Returns the time the current explicit passphrase (if any), was set. 602 // If no secondary passphrase is in use, or no time is available, returns a [all...] |
profile_sync_service_android.cc | 230 // a passphrase if cryptographer has any pending keys. 235 // Passwords datatype should never prompt for a passphrase, except when 236 // user is using a custom passphrase. Do not prompt for a passphrase if 238 // notification for passphrase when PSS has not completed configuring 261 JNIEnv* env, jobject obj, jstring passphrase) { 263 std::string key = ConvertJavaStringToUTF8(env, passphrase); 268 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) { 270 std::string key = ConvertJavaStringToUTF8(env, passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 144 * passphrase - WPA ASCII passphrase 146 * If this is set, psk will be generated using the SSID and passphrase 147 * configured for the network. ASCII passphrase must be between 8 and 150 char *passphrase; member in struct:wpa_ssid 153 * ext_psk - PSK/passphrase name in external storage 155 * If this is set, PSK/passphrase will be fetched from external storage 318 * be set (either directly or using ASCII passphrase).
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 71 std::string passphrase; member in struct:__anon6567::SyncConfigInfo 156 // Passphrase settings. 169 if (!result->GetString("passphrase", &config->passphrase)) { 170 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value"; 333 // usePassphrase: true if the data is encrypted with a secondary passphrase 334 // show_passphrase: true if a passphrase is needed to decrypt the sync data 359 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase 648 // if (for example) some kind of passphrase error is encountered. 653 if (!configuration.passphrase.empty()) [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl.cc | 67 // The new passphrase state is sufficient to determine whether a nigori node 70 // 1. Passphrase state is set. 73 // 4. If passphrase state is keystore, keystore_decryptor_token is set. 316 // sync from happening until the the passphrase is provided. 322 const std::string& passphrase, 326 if (passphrase.empty()) { 327 NOTREACHED() << "Cannot encrypt with an empty passphrase."; 333 KeyParams key_params = {"localhost", "dummy", passphrase}; 343 // Once we've migrated to keystore, the only way to set a passphrase for 344 // encryption is to set a custom passphrase [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 436 * Passphrase is NULL iff there is no i-th Tunnel-Password 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|
/external/chromium/chrome/browser/sync/ |
sync_setup_flow.cc | 159 args->SetString("iframeToShow", "passphrase"); 238 // If we are activating the passphrase, we need to have one supplied. 253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) { 255 service_->SetPassphrase(passphrase, true, false); 260 // If the user cancels when being asked for the passphrase, 270 const std::string& passphrase) {
|
/external/chromium_org/chromeos/network/ |
network_configuration_handler_unittest.cc | 526 std::string identity, passphrase; local 530 service_path, shill::kPassphraseProperty, &passphrase)); 532 EXPECT_EQ(test_passphrase, passphrase); 552 service_path, shill::kIdentityProperty, &passphrase));
|