HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 26 - 50 of 276) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/sync/test/integration/
multiple_client_passwords_sync_test.cc 30 static const char* kValidPassphrase = "passphrase!";
66 // When client 1 hits a passphrase required state, we can infer that
67 // client 0's passphrase has been committed. to the server.
71 // Setup client 2 *after* the passphrase has been committed.
75 // Get clients 1 and 2 out of the passphrase required state.
102 // When client 1 hits a passphrase required state, we can infer that
103 // client 0's passphrase has been committed. to the server.
107 // Give client 1 the correct passphrase.
115 // Give client 2 a different passphrase so it fails to sync.
132 // Update 2 with the correct passphrase, the password should now sync over
    [all...]
passwords_helper.h 46 // Sets the cryptographer's encryption passphrase for the profile at index
47 // |index| to |passphrase|, and passphrase type |type|.
49 const std::string& passphrase,
52 // Sets the cryptographer's decryption passphrase for the profile at index
53 // |index| to |passphrase|. Returns false if the operation failed, and true
55 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
certificateutil.cc 55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
  /external/chromium_org/chromeos/test/data/network/
toplevel_wifi_wpa_psk.onc 35 "Passphrase": "some passphrase",
toplevel_wifi_wep_proxy.onc 8 "Passphrase": "z123456789012",
toplevel_with_unknown_fields.onc 22 "Passphrase": "12345678",
invalid_settings_with_repairs.json 9 "Passphrase": "dummy",
19 "Passphrase": "dummy1",
34 "Passphrase": "dummy",
202 "Passphrase": "some passphrase",
212 "Passphrase": "some passphrase",
429 "Passphrase": "12345678",
453 "Passphrase": "12345678",
  /external/owasp/sanitizer/tools/
stage_to_maven_central.sh 24 PASSPHRASE="$2"
29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
54 if [ -z "$PASSPHRASE" ]; then
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl.h 60 virtual void SetEncryptionPassphrase(const std::string& passphrase,
62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
157 // explicit passphrase state (if the cryptographer is ready).
175 // Sets a new custom passphrase. Should only be called if a custom passphrase
178 // passphrase already existed.
179 void SetCustomPassphrase(const std::string& passphrase,
182 // Decrypt the encryption keybag using a user provided passphrase.
183 // Should only be called if the current passphrase is a frozen implicit
184 // passphrase or a custom passphrase
    [all...]
sync_encryption_handler_impl.cc 67 // The new passphrase state is sufficient to determine whether a nigori node
70 // 1. Passphrase state is set.
73 // 4. If passphrase state is keystore, keystore_decryptor_token is set.
316 // sync from happening until the the passphrase is provided.
322 const std::string& passphrase,
326 if (passphrase.empty()) {
327 NOTREACHED() << "Cannot encrypt with an empty passphrase.";
333 KeyParams key_params = {"localhost", "dummy", passphrase};
343 // Once we've migrated to keystore, the only way to set a passphrase for
344 // encryption is to set a custom passphrase
    [all...]
  /external/chromium_org/chrome/browser/resources/
sync_setup_overlay.js 63 // True if the synced account uses a custom passphrase.
90 // Used to determine whether to bring the OK button / passphrase field into
175 $('sync-custom-passphrase').hidden = !visible;
256 var customPassphrase = $('custom-passphrase');
262 var confirmPassphrase = $('confirm-passphrase');
277 if (!$('sync-existing-passphrase-container').hidden) {
278 // If we were prompted for an existing passphrase, use it.
279 customPassphrase = $('choose-data-types-form').passphrase.value;
283 googlePassphrase = !$('google-passphrase-needed-body').hidden;
284 // We allow an empty passphrase, in case the user has disable
    [all...]
sync_setup_overlay.html 135 <div id="sync-custom-passphrase-container"
137 <div id="sync-custom-passphrase"
139 <div id="sync-passphrase-message">
146 <div class="sync-custom-passphrase-input">
147 <input id="custom-passphrase" type="password"
151 <div class="sync-custom-passphrase-input">
152 <input id="confirm-passphrase" type="password"
162 <div id="sync-existing-passphrase-container" hidden>
163 <div id="enter-passphrase">
166 <span id="google-passphrase-needed-body
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host.h 86 // Called on |frontend_loop_| to asynchronously set a new passphrase for
89 // - An explicit passphrase has already been set
94 // passphrase passed in is cached so we can re-encrypt with it in future.
95 // - If there are no pending keys, data is encrypted with |passphrase| (this
96 // is a no-op if data was already encrypted with |passphrase|.)
98 const std::string& passphrase,
101 // Called on |frontend_loop_| to use the provided passphrase to asynchronously
102 // attempt decryption. Returns false immediately if the passphrase could not
107 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
171 // Returns the type of passphrase being used to encrypt data. Se
    [all...]
sync_backend_host_impl.h 98 const std::string& passphrase,
100 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
237 // passphrase. |token| must be valid UTF-8 as we use the PrefService for
253 // Checks if |passphrase| can be used to decrypt the cryptographer's pending
258 const std::string& passphrase) const;
260 // Invoked when a passphrase is required to decrypt a set of Nigori keys,
261 // or for encrypting. |reason| denotes why the passphrase was required.
263 // cached by the frontend. If there are no pending keys, or if the passphrase
269 // Invoked when the passphrase provided by the user has been accepted.
281 // Invoked when the passphrase state has changed. Caches the passphrase stat
    [all...]
  /external/chromium_org/sync/engine/
apply_control_data_updates.cc 84 // handles the case where two clients both set a different passphrase. The
87 // everything with the passphrase of the first client and commit the set of
89 // passphrase, the cryptographer will preserve the encryption keys based on the
90 // local passphrase, while the nigori node will preserve the server encryption
110 // for encryption, but didn't change the passphrase.
141 // passphrase. If we had migrated locally, we will re-migrate when the
142 // pending keys are provided. If we had set a new custom passphrase locally
143 // the user will have another chance to set a custom passphrase later
144 // (assuming they hadn't set a custom passphrase on the other client).
153 // They're both migrated, preserve the local nigori if the passphrase
    [all...]
  /external/chromium_org/chrome/browser/sync/
profile_sync_service_android.h 85 // Returns true if the sync code needs a passphrase for either encryption or
86 // decryption (can need a passphrase for encryption if the user is turning on
87 // encryption and no passphrase has been set yet).
90 // Returns true if the sync code needs a decryption passphrase for one of the
94 // Returns true if the sync code needs a decryption passphrase for *any* type,
98 // Returns true if the sync code needs a custom decryption passphrase.
102 // Returns true if the decryption passphrase works (was able to decrypt the
107 jstring passphrase);
109 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true
110 // then the passphrase is treated as a google (GAIA) passphrase, otherwis
    [all...]
  /external/chromium_org/components/sync_driver/
data_type_encryption_handler.h 19 // Returns true if a passphrase is required for encryption to proceed, false
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
ProfileSyncService.java 186 * Checks if a password or a passphrase is required for decryption of sync data.
188 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required.
190 * @return the enum describing the decryption passphrase type required
196 // passphrase type we should tell the user we need.
206 * Returns the actual passphrase type being used for encryption. The sync backend must be
210 * should ask the user for a passphrase, you should instead use
225 * Returns true if the current explicit passphrase time is defined.
233 * Returns the current explicit passphrase time in milliseconds since epoch.
260 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running
263 * @return true if sync is using a custom passphrase
    [all...]
  /external/chromium_org/sync/protocol/
encryption.proto 22 // change their passphrase (and thus their encryption key) at any time. When
24 // passphrase, but since we don't have transactions on the server-side, we
nigori_specifics.proto 89 // The state of the passphrase required to decrypt |encryption_keybag|.
91 // Gaia-based encryption passphrase. Deprecated.
93 // Keystore key encryption passphrase. Uses |keystore_bootstrap| to
96 // Previous Gaia-based passphrase frozen and treated as a custom passphrase.
98 // User provided custom passphrase.
113 // The time (in epoch milliseconds) at which a custom passphrase was set.
114 // Note: this field may not be set if the custom passphrase was applied before
  /external/chromium_org/sync/android/java/src/org/chromium/sync/internal_api/pub/
SyncDecryptionPassphraseType.java 14 * This enum describes the type of passphrase required, if any, to decrypt synced data.
23 IMPLICIT_PASSPHRASE(0), // GAIA-based passphrase (deprecated).
24 KEYSTORE_PASSPHRASE(1), // Keystore passphrase.
25 FROZEN_IMPLICIT_PASSPHRASE(2), // Frozen GAIA passphrase.
26 CUSTOM_PASSPHRASE(3); // User-provided passphrase.
  /external/chromium_org/chrome/browser/chromeos/options/
passphrase_textfield.h 27 // Returns the passphrase. If it's unchanged, then returns an empty string.
  /external/chromium_org/chrome/common/extensions/api/
preferences_private.json 20 "description": "Returns a list of sync categories the user has enabled without using a custom passphrase for encryption. The possible values are those that can be returned from syncer::ModelTypeToString in sync/syncable/model_type.cc.",
  /external/wpa_supplicant_8/src/crypto/
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,

Completed in 1026 milliseconds

12 3 4 5 6 7 8 91011>>