HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 126 - 150 of 276) sorted by null

1 2 3 4 56 7 8 91011>>

  /frameworks/base/wifi/java/android/net/wifi/p2p/
package.html 37 network name, and passphrase.</li>
  /external/chromium_org/chromeos/network/
network_connection_handler.h 32 // 1. Determine whether or not sufficient information (e.g. passphrase) is
64 // The passphrase is missing or invalid.
network_connection_handler.cc 66 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path);
81 NET_LOG_EVENT("VPN: Passphrase Required", service_path);
110 "passphrase-required";
369 // If 'passphrase_required' is still true, then the 'Passphrase' property
491 // VPN may require a username, and/or passphrase to be set. (Check after
  /external/chromium_org/sync/internal_api/
sync_rollback_manager_base.cc 25 virtual void SetEncryptionPassphrase(const std::string& passphrase,
27 virtual void SetDecryptionPassphrase(const std::string& passphrase)
  /external/wpa_supplicant_8/hs20/server/
hs20-osu-server.txt 140 private_key_passwd=passphrase
145 # Set RADIUS passphrase for the APs
  /external/chromium_org/third_party/pexpect/
pxssh.py 225 # and a local ssh 'passphrase' prompt (for unlocking a private key).
227 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT, "(?i)connection closed by remote host"], timeout=login_timeout)
235 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
236 if i==2: # password or passphrase
238 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
241 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/
commons-parent-11.pom 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/17/
commons-parent-17.pom 451 <passphrase>${gpg.passphrase}</passphrase>
534 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/9/
commons-parent-9.pom 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 262 # Password (and passphrase, etc.) backend for external storage
272 # Passphrase length (8..63) for P2P GO
274 # This parameter controls the length of the random passphrase that is
699 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
700 # generated using the passphrase and SSID). ASCII passphrase must be between
702 # be used to indicate that the PSK/passphrase is stored in external storage.
705 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
707 # only when the passphrase or SSID has actually changed.
    [all...]
config.c 289 str_clear_free(ssid->passphrase);
290 ssid->passphrase = NULL;
314 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
321 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
322 os_memcmp(ssid->passphrase, value, len) == 0)
325 str_clear_free(ssid->passphrase);
326 ssid->passphrase = dup_binstr(value, len);
327 if (ssid->passphrase == NULL
    [all...]
p2p_supplicant.c 682 if (ssid->passphrase && !s->passphrase)
684 else if (ssid->passphrase && s->passphrase &&
685 os_strcmp(ssid->passphrase, s->passphrase) != 0)
718 if (ssid->passphrase) {
719 os_free(s->passphrase);
720 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 303 wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)",
309 wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)",
322 "instead of passphrase");
325 "passphrase");
726 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 690 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
694 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase),
699 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
  /external/wpa_supplicant_8/src/wps/
wps.h 156 * Force PSK format to be used instead of ASCII passphrase when
688 * passphrase (8..63 characters) or the 32-octet PSK (64 hex
689 * characters). When this is set to the ASCII passphrase, the PSK can
693 * other devices to get the passphrase).
706 * network_key is set to the ASCII passphrase.
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/apache/maven/maven-parent/5/
maven-parent-5.pom 392 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/2.0.6/
plexus-2.0.6.pom 467 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/2.0.7/
plexus-2.0.7.pom 467 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.0.1/
plexus-3.0.1.pom 524 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.1/
plexus-3.1.pom 524 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.2/
plexus-3.2.pom 527 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.3.1/
plexus-3.3.1.pom 571 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
adhoc.h 213 STDMETHOD_(HRESULT,Connect)(THIS_ LPCWSTR Passphrase,LONG GeographicalId,BOOLEAN fSaveProfile,BOOLEAN fMakeSavedProfileUserSpecific) PURE;
232 #define IDot11AdHocNetwork_Connect(This,Passphrase,GeographicalId,fSaveProfile,fMakeSavedProfileUserSpecific) (This)->lpVtbl->Connect(This,Passphrase,GeographicalId,fSaveProfile,fMakeSavedProfileUserSpecific)
  /prebuilts/tools/common/m2/repository/org/apache/maven/maven-parent/5/
maven-parent-5.pom 392 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/maven/maven-parent/6/
maven-parent-6.pom 226 <passphrase>${gpg.passphrase}</passphrase>

Completed in 1196 milliseconds

1 2 3 4 56 7 8 91011>>