HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 151 - 175 of 279) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 280 wpa_printf(MSG_INFO, "WPS: WPA/WPA2-Personal passphrase uses "
292 "termination from ASCII passphrase");
wps.h 158 * Force PSK format to be used instead of ASCII passphrase when
675 * passphrase (8..63 characters) or the 32-octet PSK (64 hex
676 * characters). When this is set to the ASCII passphrase, the PSK can
680 * other devices to get the passphrase).
693 * network_key is set to the ASCII passphrase.
  /external/chromium_org/third_party/pexpect/
pxssh.py 225 # and a local ssh 'passphrase' prompt (for unlocking a private key).
227 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT, "(?i)connection closed by remote host"], timeout=login_timeout)
235 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
236 if i==2: # password or passphrase
238 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
241 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
  /prebuilts/tools/common/m2/internal/org/apache/commons/commons-parent/9/
commons-parent-9.pom 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/
commons-parent-11.pom 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
  /external/openssh/
sshconnect2.c 1317 char prompt[300], *passphrase; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config.c 288 os_free(ssid->passphrase);
289 ssid->passphrase = NULL;
313 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
320 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
321 os_memcmp(ssid->passphrase, value, len) == 0)
324 os_free(ssid->passphrase);
325 ssid->passphrase = dup_binstr(value, len);
326 if (ssid->passphrase == NULL
    [all...]
wpa_supplicant.conf 258 # Password (and passphrase, etc.) backend for external storage
599 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
600 # generated using the passphrase and SSID). ASCII passphrase must be between
602 # be used to indicate that the PSK/passphrase is stored in external storage.
605 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
607 # only when the passphrase or SSID has actually changed.
    [all...]
  /external/chromium_org/chromeos/network/
network_connection_handler.cc 64 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path);
79 NET_LOG_EVENT("VPN: Passphrase Required", service_path);
106 "passphrase-required";
342 // If 'passphrase_required' is still true, then the 'Passphrase' property
474 // VPN may require a username, and/or passphrase to be set. (Check after
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 684 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
688 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase),
693 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
  /external/chromium/chrome/browser/chromeos/options/
vpn_config_view.cc 292 // Passphrase visible button.
355 // PSK passphrase label, input and visible button.
399 // User passphrase label, input and visble button.
  /external/chromium/chrome/browser/sync/
profile_sync_service_harness.cc 247 // The passphrase has been accepted, and sync has been restarted.
302 // Passphrase is already accepted; don't wait.
308 "Waiting for passphrase accepted.");
  /external/chromium_org/chromeos/dbus/
fake_shill_service_client.cc 540 std::string passphrase; local
542 shill::kPassphraseProperty, &passphrase);
543 if (passphrase == "failure") {
  /external/chromium/chrome/browser/chromeos/cros/
network_library.cc 117 const char* kPassphraseProperty = "Passphrase";
320 const char* kErrorBadPassphrase = "bad-passphrase";
329 const char* kErrorPassphraseRequiredMsg = "Passphrase required";
1858 std::string passphrase; local
4323 std::string passphrase; member in struct:chromeos::NetworkLibraryImpl::ConnectData
    [all...]
  /external/chromium/chrome/browser/sync/glue/
sync_backend_host.cc 219 void SyncBackendHost::SetPassphrase(const std::string& passphrase,
238 passphrase, is_explicit));
537 << "passphrase. Silently dropping.";
549 // When a passphrase fails, we just unset our waiting flag and trigger a
760 void SyncBackendHost::Core::DoSetPassphrase(const std::string& passphrase,
763 syncapi_->SetPassphrase(passphrase, is_explicit);
    [all...]
  /external/chromium/chrome/browser/sync/engine/
syncapi.cc     [all...]
  /external/chromium_org/chrome/browser/chromeos/options/
wimax_config_view.cc 91 // If the network requires a passphrase, make sure it is the right length.
253 // Passphrase input
vpn_config_view.h 110 // Get passphrase from input field.
wifi_config_view.h 142 // Returns whether the current configuration requires a passphrase.
  /external/chromium_org/chrome/browser/chromeos/policy/
configuration_policy_handler_chromeos_unittest.cc 216 " \"Passphrase\": \"pass\","
273 " \"Passphrase\": \"pass\","
  /external/chromium_org/chrome/browser/sync/test/integration/
profile_sync_service_harness.h 142 // Blocks the caller until |service_| indicates that a passphrase is required.
145 // Blocks the caller until |service_| indicates that the passphrase set by
  /external/chromium_org/chrome/browser/sync/
sync_global_error_unittest.cc 158 // Test that SyncGlobalError shows an error if a passphrase is required.
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.h 91 // invalid passphrase.
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 58 scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase,
114 passphrase,
351 const std::string& passphrase,
374 toplevel_onc = Decrypt(passphrase, *toplevel_onc);
  /external/chromium_org/components/wifi/
wifi_test.cc 149 properties->SetString("WiFi.Passphrase", password);

Completed in 1855 milliseconds

1 2 3 4 5 67 8 91011>>