/frameworks/base/wifi/java/android/net/wifi/p2p/ |
package.html | 37 network name, and passphrase.</li>
|
/external/chromium_org/chromeos/network/ |
network_connection_handler.h | 32 // 1. Determine whether or not sufficient information (e.g. passphrase) is 64 // The passphrase is missing or invalid.
|
network_connection_handler.cc | 66 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path); 81 NET_LOG_EVENT("VPN: Passphrase Required", service_path); 110 "passphrase-required"; 369 // If 'passphrase_required' is still true, then the 'Passphrase' property 491 // VPN may require a username, and/or passphrase to be set. (Check after
|
/external/chromium_org/sync/internal_api/ |
sync_rollback_manager_base.cc | 25 virtual void SetEncryptionPassphrase(const std::string& passphrase, 27 virtual void SetDecryptionPassphrase(const std::string& passphrase)
|
/external/wpa_supplicant_8/hs20/server/ |
hs20-osu-server.txt | 140 private_key_passwd=passphrase 145 # Set RADIUS passphrase for the APs
|
/external/chromium_org/third_party/pexpect/ |
pxssh.py | 225 # and a local ssh 'passphrase' prompt (for unlocking a private key). 227 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT, "(?i)connection closed by remote host"], timeout=login_timeout) 235 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT]) 236 if i==2: # password or passphrase 238 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT]) 241 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/ |
commons-parent-11.pom | 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/17/ |
commons-parent-17.pom | 451 <passphrase>${gpg.passphrase}</passphrase>
534 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/9/ |
commons-parent-9.pom | 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 262 # Password (and passphrase, etc.) backend for external storage 272 # Passphrase length (8..63) for P2P GO 274 # This parameter controls the length of the random passphrase that is 699 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 700 # generated using the passphrase and SSID). ASCII passphrase must be between 702 # be used to indicate that the PSK/passphrase is stored in external storage. 705 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 707 # only when the passphrase or SSID has actually changed. [all...] |
config.c | 289 str_clear_free(ssid->passphrase); 290 ssid->passphrase = NULL; 314 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 321 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 322 os_memcmp(ssid->passphrase, value, len) == 0) 325 str_clear_free(ssid->passphrase); 326 ssid->passphrase = dup_binstr(value, len); 327 if (ssid->passphrase == NULL [all...] |
p2p_supplicant.c | 682 if (ssid->passphrase && !s->passphrase) 684 else if (ssid->passphrase && s->passphrase && 685 os_strcmp(ssid->passphrase, s->passphrase) != 0) 718 if (ssid->passphrase) { 719 os_free(s->passphrase); 720 s->passphrase = os_strdup(ssid->passphrase); [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 303 wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)", 309 wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)", 322 "instead of passphrase"); 325 "passphrase"); 726 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 690 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 694 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), 699 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/wpa_supplicant_8/src/wps/ |
wps.h | 156 * Force PSK format to be used instead of ASCII passphrase when 688 * passphrase (8..63 characters) or the 32-octet PSK (64 hex 689 * characters). When this is set to the ASCII passphrase, the PSK can 693 * other devices to get the passphrase). 706 * network_key is set to the ASCII passphrase.
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/apache/maven/maven-parent/5/ |
maven-parent-5.pom | 392 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/2.0.6/ |
plexus-2.0.6.pom | 467 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/2.0.7/ |
plexus-2.0.7.pom | 467 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.0.1/ |
plexus-3.0.1.pom | 524 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.1/ |
plexus-3.1.pom | 524 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.2/ |
plexus-3.2.pom | 527 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus/3.3.1/ |
plexus-3.3.1.pom | 571 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
adhoc.h | 213 STDMETHOD_(HRESULT,Connect)(THIS_ LPCWSTR Passphrase,LONG GeographicalId,BOOLEAN fSaveProfile,BOOLEAN fMakeSavedProfileUserSpecific) PURE; 232 #define IDot11AdHocNetwork_Connect(This,Passphrase,GeographicalId,fSaveProfile,fMakeSavedProfileUserSpecific) (This)->lpVtbl->Connect(This,Passphrase,GeographicalId,fSaveProfile,fMakeSavedProfileUserSpecific)
|
/prebuilts/tools/common/m2/repository/org/apache/maven/maven-parent/5/ |
maven-parent-5.pom | 392 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/maven/maven-parent/6/ |
maven-parent-6.pom | 226 <passphrase>${gpg.passphrase}</passphrase>
|