/external/wpa_supplicant_8/src/wps/ |
wps_attr_process.c | 280 wpa_printf(MSG_INFO, "WPS: WPA/WPA2-Personal passphrase uses " 292 "termination from ASCII passphrase");
|
wps.h | 158 * Force PSK format to be used instead of ASCII passphrase when 675 * passphrase (8..63 characters) or the 32-octet PSK (64 hex 676 * characters). When this is set to the ASCII passphrase, the PSK can 680 * other devices to get the passphrase). 693 * network_key is set to the ASCII passphrase.
|
/external/chromium_org/third_party/pexpect/ |
pxssh.py | 225 # and a local ssh 'passphrase' prompt (for unlocking a private key). 227 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT, "(?i)connection closed by remote host"], timeout=login_timeout) 235 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT]) 236 if i==2: # password or passphrase 238 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT]) 241 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
|
/prebuilts/tools/common/m2/internal/org/apache/commons/commons-parent/9/ |
commons-parent-9.pom | 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/ |
commons-parent-11.pom | 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
|
/external/openssh/ |
sshconnect2.c | 1317 char prompt[300], *passphrase; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 288 os_free(ssid->passphrase); 289 ssid->passphrase = NULL; 313 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 320 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 321 os_memcmp(ssid->passphrase, value, len) == 0) 324 os_free(ssid->passphrase); 325 ssid->passphrase = dup_binstr(value, len); 326 if (ssid->passphrase == NULL [all...] |
wpa_supplicant.conf | 258 # Password (and passphrase, etc.) backend for external storage 599 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 600 # generated using the passphrase and SSID). ASCII passphrase must be between 602 # be used to indicate that the PSK/passphrase is stored in external storage. 605 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 607 # only when the passphrase or SSID has actually changed. [all...] |
/external/chromium_org/chromeos/network/ |
network_connection_handler.cc | 64 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path); 79 NET_LOG_EVENT("VPN: Passphrase Required", service_path); 106 "passphrase-required"; 342 // If 'passphrase_required' is still true, then the 'Passphrase' property 474 // VPN may require a username, and/or passphrase to be set. (Check after
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 684 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 688 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), 693 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/chromium/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 292 // Passphrase visible button. 355 // PSK passphrase label, input and visible button. 399 // User passphrase label, input and visble button.
|
/external/chromium/chrome/browser/sync/ |
profile_sync_service_harness.cc | 247 // The passphrase has been accepted, and sync has been restarted. 302 // Passphrase is already accepted; don't wait. 308 "Waiting for passphrase accepted.");
|
/external/chromium_org/chromeos/dbus/ |
fake_shill_service_client.cc | 540 std::string passphrase; local 542 shill::kPassphraseProperty, &passphrase); 543 if (passphrase == "failure") {
|
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.cc | 117 const char* kPassphraseProperty = "Passphrase"; 320 const char* kErrorBadPassphrase = "bad-passphrase"; 329 const char* kErrorPassphraseRequiredMsg = "Passphrase required"; 1858 std::string passphrase; local 4323 std::string passphrase; member in struct:chromeos::NetworkLibraryImpl::ConnectData [all...] |
/external/chromium/chrome/browser/sync/glue/ |
sync_backend_host.cc | 219 void SyncBackendHost::SetPassphrase(const std::string& passphrase, 238 passphrase, is_explicit)); 537 << "passphrase. Silently dropping."; 549 // When a passphrase fails, we just unset our waiting flag and trigger a 760 void SyncBackendHost::Core::DoSetPassphrase(const std::string& passphrase, 763 syncapi_->SetPassphrase(passphrase, is_explicit); [all...] |
/external/chromium/chrome/browser/sync/engine/ |
syncapi.cc | [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
wimax_config_view.cc | 91 // If the network requires a passphrase, make sure it is the right length. 253 // Passphrase input
|
vpn_config_view.h | 110 // Get passphrase from input field.
|
wifi_config_view.h | 142 // Returns whether the current configuration requires a passphrase.
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
configuration_policy_handler_chromeos_unittest.cc | 216 " \"Passphrase\": \"pass\"," 273 " \"Passphrase\": \"pass\","
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
profile_sync_service_harness.h | 142 // Blocks the caller until |service_| indicates that a passphrase is required. 145 // Blocks the caller until |service_| indicates that the passphrase set by
|
/external/chromium_org/chrome/browser/sync/ |
sync_global_error_unittest.cc | 158 // Test that SyncGlobalError shows an error if a passphrase is required.
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.h | 91 // invalid passphrase.
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 58 scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, 114 passphrase, 351 const std::string& passphrase, 374 toplevel_onc = Decrypt(passphrase, *toplevel_onc);
|
/external/chromium_org/components/wifi/ |
wifi_test.cc | 149 properties->SetString("WiFi.Passphrase", password);
|