/external/javassist/ |
pom.xml | 177 <passphrase>${gpg.passphrase}</passphrase>
|
/external/openssh/ |
readpass.c | 113 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the 114 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If 115 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
|
PROTOCOL.agent | 262 is a PIN or passphrase used to unlock the private key(s) on the 337 or passphrase used to unlock the private key(s) on the device. 395 signing and encryption without requiring a passphrase to unlock the 483 The agent supports temporary locking with a passphrase to suspend 485 same passphrase. To lock an agent, a client send the following request: 488 string passphrase 503 string passphrase 505 If the passphrase matches and the agent is locked, then it will resume 507 is not locked or the passphrase does not match then it will return
|
cipher.c | 296 * passphrase and using the resulting 16 bytes as the key. 301 const char *passphrase, int do_encrypt) 307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
|
/external/chromium/chrome/browser/sync/ |
profile_sync_service.cc | 612 // First try supplying gaia password as the passphrase. 619 // If the above failed then try the custom passphrase the user might have 629 // We will skip the passphrase prompt and suppress the warning 630 // if the passphrase is needed for decryption but the user is 646 // Make sure the data types that depend on the passphrase are started at 651 // since we know we no longer require the passphrase. [all...] |
sync_setup_flow.cc | 159 args->SetString("iframeToShow", "passphrase"); 238 // If we are activating the passphrase, we need to have one supplied. 253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) { 255 service_->SetPassphrase(passphrase, true, false); 260 // If the user cancels when being asked for the passphrase, 270 const std::string& passphrase) {
|
profile_sync_service_harness.h | 95 // If a SetPassphrase call has been issued with a valid passphrase, this 96 // will wait until the passphrase has been accepted. 154 // The sync client is waiting for its passphrase to be accepted by the
|
/external/chromium_org/chrome/browser/resources/ |
sync_setup_overlay.css | 27 #sync-custom-passphrase { 31 #sync-passphrase-message { 35 .sync-custom-passphrase-input { 39 #sync-existing-passphrase-container { 118 #passphrase-input { 123 #incorrect-passphrase { 154 #sync-passphrase-warning {
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 436 * Passphrase is NULL iff there is no i-th Tunnel-Password 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 303 // If security is not none, also enforce passphrase is non empty. 313 // if the network requires a passphrase, make sure it is the right length. 559 // Passphrase 567 const std::string passphrase = GetPassphrase(); local 568 if (passphrase != wifi->passphrase()) 569 wifi->SetPassphrase(passphrase); 726 // Passphrase input 737 // Disable passphrase input initially for other network. 880 // Passphrase [all...] |
/external/chromium_org/chrome/browser/sync/test/integration/ |
profile_sync_service_harness.cc | 137 // Initial sync is blocked because custom passphrase is required. 167 // passphrase to be entered for decryption. 173 // Helper function which returns true if the custom passphrase entered was 302 // Make sure that initial sync wasn't blocked by a missing passphrase. 304 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 331 // Set an implicit passphrase for encryption if an explicit one hasn't already 332 // been set. If an explicit passphrase has been set, immediately return false, 333 // since a decryption passphrase is required. 337 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 354 // Make sure that initial sync wasn't blocked by a missing passphrase [all...] |
/external/openssh/contrib/cygwin/ |
ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/5/ |
commons-parent-5.pom | 269 <passphrase>${gpg.passphrase}</passphrase>
347 <passphrase>${gpg.passphrase}</passphrase>
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 56 psk="very secret passphrase" 158 psk="very secret passphrase" 207 private key uses a passphrase, this has to be configured in
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.h | 43 // Remembered passphrase. 44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo 45 // true if the network requires a passphrase. 60 const std::string& passphrase,
|
/external/chromium/chrome/browser/sync/engine/ |
syncapi.h | 781 // Called when user interaction is required to obtain a valid passphrase. 782 // If the passphrase is required to decrypt something that has 784 // |for_decryption| will be true. If the passphrase is needed for 789 // passphrase failed to decrypt pending keys. This is different from 791 // a passphrase. OnPassphraseRequired means we have data we could not 795 // Called when the passphrase provided by the user has been accepted and is [all...] |
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_apitest.cc | 356 " \"Passphrase\": \"FAKE_CREDENTIAL_VPaJDV9x\" }" 379 " \"Passphrase\": \"passphrase\"," 380 " \"Recommended\": [ \"AutoConnect\", \"Passphrase\" ],"
|
/external/chromium_org/chrome/browser/profiles/ |
profile_metrics.h | 54 SYNC_PASSPHRASE, // User is using a passphrase
|
/external/chromium_org/chrome/browser/sync/ |
sync_ui_util.cc | 133 // 2. Auth errors. 3. Protocol errors. 4. Passphrase errors. 177 // Check for a passphrase error. 343 // Display a passphrase error if we have one. 346 // This is not the first machine so ask user to enter passphrase.
|
sync_prefs.h | 104 // Use this encryption bootstrap token if we're using an explicit passphrase. 109 // passphrase.
|
/external/chromium_org/sync/engine/ |
syncer_types.h | 32 // forward progress on this node, but because the passphrase may not arrive
|
/external/chromium_org/sync/util/ |
cryptographer.h | 38 // protected with a particular passphrase. 42 // Most likely, an updated Nigori node means that a new passphrase has been set 44 // should be prompted for the new passphrase and DecryptPendingKeys be called. 62 // passphrase.
|
/frameworks/base/core/java/android/hardware/display/ |
WifiDisplaySessionInfo.java | 111 +"\n Passphrase: " + mPassphrase
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler_unittest.cc | 74 const std::string& passphrase, 82 result.SetBoolean("usePassphrase", !passphrase.empty()); 83 if (!passphrase.empty()) 84 result.SetString("passphrase", passphrase); 655 // passphrase. 689 // passphrase. 708 // We should navigate back to the configure page since we need a passphrase. 724 // Act as if an encryption passphrase is required the first time, then never 790 // We should navigate back to the configure page since we need a passphrase [all...] |
/external/chromium_org/sync/protocol/ |
sync_enums.proto | 25 PASSPHRASE_REQUIRED = 3; // Cryptographer needs passphrase. 26 PASSPHRASE_ACCEPTED = 4; // Passphrase was accepted by cryptographer.
|