/external/chromium_org/sync/test/ |
fake_sync_encryption_handler.h | 35 virtual void SetEncryptionPassphrase(const std::string& passphrase, 37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
|
fake_sync_encryption_handler.cc | 100 const std::string& passphrase, 107 const std::string& passphrase) {
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 68 else if (strcmp(tmp, "PASSPHRASE") == 0) { 69 queryField->setText(tr("Private key passphrase: "));
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 82 std::string passphrase; member in struct:__anon10203::SyncConfigInfo 167 // Passphrase settings. 180 if (!result->GetString("passphrase", &config->passphrase)) { 181 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value"; 352 // usePassphrase: true if the data is encrypted with a secondary passphrase 353 // show_passphrase: true if a passphrase is needed to decrypt the sync data 381 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase 694 // if (for example) some kind of passphrase error is encountered. 699 if (!configuration.passphrase.empty()) [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host_impl.cc | 183 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase, 192 // We should never be called with an empty passphrase. 193 DCHECK(!passphrase.empty()); 199 // encrypted with an explicit passphrase. 207 passphrase, is_explicit)); 211 const std::string& passphrase) { 218 // We should never be called with an empty passphrase. 219 DCHECK(!passphrase.empty()); 227 // Check the passphrase that was provided against our local cache of the 230 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase)) [all...] |
sync_backend_host_mock.h | 47 const std::string& passphrase, 51 const std::string& passphrase) OVERRIDE;
|
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/external/chromium_org/chrome/browser/sync/test/integration/ |
profile_sync_service_harness.cc | 86 // Sync is blocked because a custom passphrase is required. 188 // Make sure that initial sync wasn't blocked by a missing passphrase. 190 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 210 // Set an implicit passphrase for encryption if an explicit one hasn't already 211 // been set. If an explicit passphrase has been set, immediately return false, 212 // since a decryption passphrase is required. 216 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed" 228 // Make sure that initial sync wasn't blocked by a missing passphrase. 230 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
|
/external/chromium_org/components/sync_driver/ |
sync_frontend.h | 97 // The syncer requires a passphrase to decrypt sensitive updates. This is 99 // the passphrase is changed by another synced client. |reason| denotes why 100 // the passphrase was required. |pending_keys| is a copy of the 107 // Called when the passphrase provided by the user is 109 // encrypted using the accepted passphrase.
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
token_encryptor.h | 49 // Converts |passphrase| to a SymmetricKey using the given |salt|. 50 crypto::SymmetricKey* PassphraseToKey(const std::string& passphrase,
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service.h | 146 // using the passed passphrase. 148 // passphrase. 240 // Used to specify the kind of passphrase with which sync data is encrypted. 242 IMPLICIT, // The user did not provide a custom passphrase for encryption. 244 EXPLICIT, // The user selected the "use custom passphrase" radio button 245 // during sync setup and provided a passphrase. 648 // Returns true if a secondary (explicit) passphrase is being used. It is not 652 // Returns the actual passphrase type being used for encryption. 655 // Returns the time the current explicit passphrase (if any), was set. 656 // If no secondary passphrase is in use, or no time is available, returns a [all...] |
profile_sync_service_android.cc | 238 // a passphrase if cryptographer has any pending keys. 243 // Passwords datatype should never prompt for a passphrase, except when 244 // user is using a custom passphrase. Do not prompt for a passphrase if 246 // notification for passphrase when PSS has not completed configuring 269 JNIEnv* env, jobject obj, jstring passphrase) { 271 std::string key = ConvertJavaStringToUTF8(env, passphrase); 276 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) { 278 std::string key = ConvertJavaStringToUTF8(env, passphrase);
|
/external/chromium_org/chrome/browser/chromeos/options/ |
network_property_ui_data.cc | 42 // but has no default value, e.g. Username or Passphrase. (The default
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.h | 46 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an 49 const std::string& passphrase, 94 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|, 103 const std::string& passphrase,
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/ |
forge-parent-4.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/ |
forge-parent-5.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/ |
forge-parent-6.pom | 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile --> 186 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/lombok-ast/ |
deploy.txt | 3 mvn gpg:sign-and-deploy-file -DpomFile=lombok-ast-0.2.1.pom -Dfile=lombok-ast-0.2.1.jar -DrepositoryId=sonatype-nexus-staging -Durl=https://oss.sonatype.org/service/local/staging/deploy/maven2/ -Dsources=lombok-ast-0.2.1-sources.jar -Djavadoc=lombok-ast-0.2.1-javadoc.jar -Dgpg.keyname=???? -Dgpg.passphrase=????
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/4/ |
forge-parent-4.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/5/ |
forge-parent-5.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/6/ |
forge-parent-6.pom | 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile --> 186 <passphrase>${gpg.passphrase}</passphrase>
|
/system/netd/server/ |
SoftapController.cpp | 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 233 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) { 237 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
|
SoftapController.h | 42 void generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl_unittest.cc | 139 const std::string& passphrase) { 140 VerifyMigratedNigoriWithTimestamp(0, passphrase_type, passphrase); 146 const std::string& passphrase) { 185 KeyParams params = {"localhost", "dummy", passphrase}; 234 // Build a migrated nigori node with the specified default passphrase 268 // Build a migrated nigori node with the specified default passphrase 269 // as a custom passphrase. 299 // Build an unmigrated nigori node with the specified passphrase and type and 714 // Test that we don't attempt to migrate while an implicit passphrase is pending 716 // migrated, we should be in keystore passphrase state [all...] |