HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 1 - 25 of 276) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/chromeos/test/data/network/policy/
shill_unmanaged_wifi1.json 4 "Passphrase": "user's passphrase",
9 "UIData": "{\"user_settings\":{\"WiFi\":{\"Passphrase\":\"user's passphrase\"}}}"
policy_wifi1.onc 8 "Passphrase": "policy's passphrase",
9 "Recommended": [ "AutoConnect", "Passphrase" ],
shill_policy_on_unmanaged_wifi1.json 4 "Passphrase": "user's passphrase",
9 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}"
shill_unmanaged_wifi1_wo_uidata.json 4 "Passphrase": "user's passphrase",
shill_unmanaged_wifi2.json 4 "Passphrase": "user's passphrase",
shill_policy_on_unconfigured_wifi1.json 4 "Passphrase": "policy's passphrase",
shill_policy_on_unmanaged_wifi1_wo_uidata.json 4 "Passphrase": "user's passphrase",
policy_wifi1_with_redundant_fields.onc 8 "Passphrase": "policy's passphrase",
9 "Recommended": [ "AutoConnect", "Passphrase" ],
shill_managed_wifi1.json 7 "Passphrase": "user's passphrase",
11 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}",
shill_managed_wifi1_rsn.json 5 "Passphrase": "user's passphrase",
10 "UIData": "{\"onc_source\":\"user_policy\",\"user_settings\":{\"WiFi\":{\"Passphrase\":\"FAKE_CREDENTIAL_VPaJDV9x\"}}}"
  /external/wpa_supplicant_8/hostapd/
hostapd.radius_clients 2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
hostapd.wpa_psk 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
  /external/chromium_org/chromeos/test/data/network/
shill_wifi_wpa1.json 5 "Passphrase":"some passphrase",
translation_of_shill_wifi_wpa1.onc 6 "Passphrase":"some passphrase",
shill_wifi_psk.json 5 "Passphrase": "some passphrase",
shill_wifi_with_state.json 7 "Passphrase": "some passphrase",
translation_of_shill_wifi_with_state.onc 11 "Passphrase": "some passphrase",
valid_wifi_psk.onc 31 "Passphrase": "some passphrase",
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_passphrase.sgml 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 11 psk="secret passphrase"
  /external/chromium_org/sync/internal_api/public/
sync_encryption_handler.h 22 // Reasons due to which Cryptographer might require a passphrase.
26 // passphrase for its first attempt at
30 // passphrase for its first attempt at
34 // The different states for the encryption passphrase. These control if and how
35 // the user should be prompted for a decryption passphrase.
37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated).
38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase.
39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase.
40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase.
62 // Called when user interaction is required to obtain a valid passphrase
    [all...]