/external/chromium_org/chromeos/test/data/network/policy/ |
shill_unmanaged_wifi1.json | 4 "Passphrase": "user's passphrase", 9 "UIData": "{\"user_settings\":{\"WiFi\":{\"Passphrase\":\"user's passphrase\"}}}"
|
policy_wifi1.onc | 8 "Passphrase": "policy's passphrase", 9 "Recommended": [ "AutoConnect", "Passphrase" ],
|
shill_policy_on_unmanaged_wifi1.json | 4 "Passphrase": "user's passphrase", 9 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}"
|
shill_unmanaged_wifi1_wo_uidata.json | 4 "Passphrase": "user's passphrase",
|
shill_unmanaged_wifi2.json | 4 "Passphrase": "user's passphrase",
|
shill_policy_on_unconfigured_wifi1.json | 4 "Passphrase": "policy's passphrase",
|
shill_policy_on_unmanaged_wifi1_wo_uidata.json | 4 "Passphrase": "user's passphrase",
|
policy_wifi1_with_redundant_fields.onc | 8 "Passphrase": "policy's passphrase", 9 "Recommended": [ "AutoConnect", "Passphrase" ],
|
shill_managed_wifi1.json | 7 "Passphrase": "user's passphrase", 11 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}",
|
/external/wpa_supplicant_8/hostapd/ |
hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
/external/chromium_org/chromeos/test/data/network/ |
shill_wifi_wpa1.json | 5 "Passphrase":"some passphrase",
|
translation_of_shill_wifi_wpa1.onc | 6 "Passphrase":"some passphrase",
|
shill_wifi_psk.json | 5 "Passphrase": "some passphrase",
|
translation_of_shill_wifi_with_state.onc | 9 "Passphrase": "some passphrase",
|
shill_wifi_with_state.json | 6 "Passphrase": "some passphrase",
|
valid_wifi_psk.onc | 31 "Passphrase": "some passphrase",
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/chromium_org/sync/internal_api/public/ |
sync_encryption_handler.h | 22 // Reasons due to which Cryptographer might require a passphrase. 26 // passphrase for its first attempt at 30 // passphrase for its first attempt at 34 // The different states for the encryption passphrase. These control if and how 35 // the user should be prompted for a decryption passphrase. 37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated). 38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase. 39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase. 40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase. 62 // Called when user interaction is required to obtain a valid passphrase [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
/system/core/fastboot/ |
p12topem.sh | 5 echo "Usage: $0 alias passphrase"
|
/external/chromium_org/sync/android/java/src/org/chromium/sync/internal_api/pub/ |
SyncDecryptionPassphraseType.java | 11 * This enum describes the type of passphrase required, if any, to decrypt synced data. 20 IMPLICIT_PASSPHRASE(0), // GAIA-based passphrase (deprecated). 21 KEYSTORE_PASSPHRASE(1), // Keystore passphrase. 22 FROZEN_IMPLICIT_PASSPHRASE(2), // Frozen GAIA passphrase. 23 CUSTOM_PASSPHRASE(3); // User-provided passphrase.
|
/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |