HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 1 - 25 of 279) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/chromeos/test/data/network/policy/
shill_unmanaged_wifi1.json 4 "Passphrase": "user's passphrase",
9 "UIData": "{\"user_settings\":{\"WiFi\":{\"Passphrase\":\"user's passphrase\"}}}"
policy_wifi1.onc 8 "Passphrase": "policy's passphrase",
9 "Recommended": [ "AutoConnect", "Passphrase" ],
shill_policy_on_unmanaged_wifi1.json 4 "Passphrase": "user's passphrase",
9 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}"
shill_unmanaged_wifi1_wo_uidata.json 4 "Passphrase": "user's passphrase",
shill_unmanaged_wifi2.json 4 "Passphrase": "user's passphrase",
shill_policy_on_unconfigured_wifi1.json 4 "Passphrase": "policy's passphrase",
shill_policy_on_unmanaged_wifi1_wo_uidata.json 4 "Passphrase": "user's passphrase",
policy_wifi1_with_redundant_fields.onc 8 "Passphrase": "policy's passphrase",
9 "Recommended": [ "AutoConnect", "Passphrase" ],
shill_managed_wifi1.json 7 "Passphrase": "user's passphrase",
11 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}",
  /external/wpa_supplicant_8/hostapd/
hostapd.radius_clients 2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
hostapd.wpa_psk 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
  /external/chromium_org/chromeos/test/data/network/
shill_wifi_wpa1.json 5 "Passphrase":"some passphrase",
translation_of_shill_wifi_wpa1.onc 6 "Passphrase":"some passphrase",
shill_wifi_psk.json 5 "Passphrase": "some passphrase",
translation_of_shill_wifi_with_state.onc 9 "Passphrase": "some passphrase",
shill_wifi_with_state.json 6 "Passphrase": "some passphrase",
valid_wifi_psk.onc 31 "Passphrase": "some passphrase",
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_passphrase.sgml 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 11 psk="secret passphrase"
  /external/chromium_org/sync/internal_api/public/
sync_encryption_handler.h 22 // Reasons due to which Cryptographer might require a passphrase.
26 // passphrase for its first attempt at
30 // passphrase for its first attempt at
34 // The different states for the encryption passphrase. These control if and how
35 // the user should be prompted for a decryption passphrase.
37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated).
38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase.
39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase.
40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase.
62 // Called when user interaction is required to obtain a valid passphrase
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
  /system/core/fastboot/
p12topem.sh 5 echo "Usage: $0 alias passphrase"
  /external/chromium_org/sync/android/java/src/org/chromium/sync/internal_api/pub/
SyncDecryptionPassphraseType.java 11 * This enum describes the type of passphrase required, if any, to decrypt synced data.
20 IMPLICIT_PASSPHRASE(0), // GAIA-based passphrase (deprecated).
21 KEYSTORE_PASSPHRASE(1), // Keystore passphrase.
22 FROZEN_IMPLICIT_PASSPHRASE(2), // Frozen GAIA passphrase.
23 CUSTOM_PASSPHRASE(3); // User-provided passphrase.
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]

Completed in 764 milliseconds

1 2 3 4 5 6 7 8 91011>>