/external/chromium_org/chromeos/network/ |
network_connection_handler_unittest.cc | 446 " \"Passphrase\": \"passphrase\""
|
managed_network_configuration_handler_unittest.cc | 521 // The passphrase isn't sent again, because it's configured by the user and 584 // The passphrase isn't sent again, because it's configured by the user and 619 // The passphrase isn't sent again, because it's configured by the user and
|
client_cert_util.cc | 331 // OpenVPN generally requires a passphrase and we don't know whether or
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 311 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no 312 * passphrase is used.
|
/external/chromium_org/chrome/browser/profiles/ |
profile_metrics.h | 78 SYNC_PASSPHRASE, // User is using a passphrase
|
/external/chromium_org/chromeos/dbus/ |
shill_service_client_unittest.cc | 115 const char kValue[] = "passphrase";
|
fake_shill_service_client.cc | 612 std::string passphrase; local 614 shill::kPassphraseProperty, &passphrase); 615 if (passphrase == "failure") {
|
/external/openssl/apps/ |
CA.sh | 167 echo "Cert passphrase will be requested twice - bug?"
|
enc.c | 307 BIO_printf(bio_err,"%-14s passphrase is the next argument\n","-k"); 308 BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile"); 310 BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-P2P | 148 SSID/passphrase configuration based on a previously used persistent 418 Get the passphrase for a group (only available when acting as a GO). 485 passphrase on the GO that is normally used to allow legacy stations to 487 shared, devices with knowledge of that passphrase can still connect.
|
wpas_glue.c | 660 else if (os_strcmp(field, "PASSPHRASE") == 0) 697 *txt = "Private key passphrase"; 698 ret = "PASSPHRASE";
|
wpa_cli.c | 1276 printf("Invalid PASSPHRASE command: needs two arguments " 1277 "(network id and passphrase)\n"); 1283 ret = os_snprintf(pos, end - pos, WPA_CTRL_RSP "PASSPHRASE-%s:%s", 1286 printf("Too long PASSPHRASE command.\n"); 1293 printf("Too long PASSPHRASE command.\n"); 1373 " psk (WPA passphrase or pre-shared key)\n" [all...] |
config_file.c | 130 if (ssid->passphrase) { 133 "passphrase configured.", line); 1243 !ssid->passphrase) [all...] |
/external/chromium_org/chrome/browser/extensions/api/gcd_private/ |
gcd_private_api.cc | 47 const char kPrivetKeyPassphrase[] = "passphrase"; 49 const char kPrivetKeyPassphraseDotted[] = "wifi.passphrase"; 408 // the passphrase.
|
/external/chromium_org/components/wifi/ |
wifi_service_mac.mm | 310 std::string passphrase; 315 wifi->GetString(onc::wifi::kPassphrase, &passphrase)) { 316 ns_password = base::SysUTF8ToNSString(passphrase);
|
/external/wpa_supplicant_8/hostapd/ |
README | 332 # secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase 334 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 336 #wpa_passphrase=secret passphrase
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/apache/maven/maven-parent/11/ |
maven-parent-11.pom | 920 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/maven/maven-parent/8/ |
maven-parent-8.pom | 288 <passphrase>${gpg.passphrase}</passphrase>
|
/external/chromium_org/sync/internal_api/ |
sync_manager_impl_unittest.cc | 464 KeyParams params = {"localhost", "username", "passphrase"}; 498 KeyParams params = {"localhost", "username", "passphrase"}; [all...] |
/external/chromium_org/components/onc/ |
onc_constants.cc | 186 const char kPassphrase[] = "Passphrase";
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 61 "key passphrase");
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 144 <string>WPA/WPA2 pre-shared key or passphrase</string>
|
/external/chromium_org/chrome/common/ |
url_constants.cc | 87 "chrome://managed-user-passphrase/"; 235 "managed-user-passphrase";
|
/external/chromium_org/components/onc/docs/ |
onc_spec.html | 54 passphrase so that upon entering the passphrase the entire configuration is 669 <dt class="field">Passphrase</dt> 677 Describes the passphrase for WEP/WPA/WPA2 678 connections. If <span class="value">WEP-PSK</span> is used, the passphrase [all...] |
/external/chromium_org/sync/engine/ |
get_commit_ids.cc | 122 // 2. It requires encryption (either the type is encrypted but a passphrase 144 // provided the most recent passphrase).
|