HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 51 - 75 of 276) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/sync/test/
fake_sync_encryption_handler.h 35 virtual void SetEncryptionPassphrase(const std::string& passphrase,
37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
fake_sync_encryption_handler.cc 100 const std::string& passphrase,
107 const std::string& passphrase) {
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 68 else if (strcmp(tmp, "PASSPHRASE") == 0) {
69 queryField->setText(tr("Private key passphrase: "));
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 82 std::string passphrase; member in struct:__anon10203::SyncConfigInfo
167 // Passphrase settings.
180 if (!result->GetString("passphrase", &config->passphrase)) {
181 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value";
352 // usePassphrase: true if the data is encrypted with a secondary passphrase
353 // show_passphrase: true if a passphrase is needed to decrypt the sync data
381 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase
694 // if (for example) some kind of passphrase error is encountered.
699 if (!configuration.passphrase.empty())
    [all...]
  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host_impl.cc 183 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase,
192 // We should never be called with an empty passphrase.
193 DCHECK(!passphrase.empty());
199 // encrypted with an explicit passphrase.
207 passphrase, is_explicit));
211 const std::string& passphrase) {
218 // We should never be called with an empty passphrase.
219 DCHECK(!passphrase.empty());
227 // Check the passphrase that was provided against our local cache of the
230 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase))
    [all...]
sync_backend_host_mock.h 47 const std::string& passphrase,
51 const std::string& passphrase) OVERRIDE;
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/chromium_org/chrome/browser/sync/test/integration/
profile_sync_service_harness.cc 86 // Sync is blocked because a custom passphrase is required.
188 // Make sure that initial sync wasn't blocked by a missing passphrase.
190 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
210 // Set an implicit passphrase for encryption if an explicit one hasn't already
211 // been set. If an explicit passphrase has been set, immediately return false,
212 // since a decryption passphrase is required.
216 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
228 // Make sure that initial sync wasn't blocked by a missing passphrase.
230 LOG(ERROR) << "A passphrase is required for decryption. Sync cannot proceed"
  /external/chromium_org/components/sync_driver/
sync_frontend.h 97 // The syncer requires a passphrase to decrypt sensitive updates. This is
99 // the passphrase is changed by another synced client. |reason| denotes why
100 // the passphrase was required. |pending_keys| is a copy of the
107 // Called when the passphrase provided by the user is
109 // encrypted using the accepted passphrase.
  /external/chromium_org/chrome/browser/chromeos/settings/
token_encryptor.h 49 // Converts |passphrase| to a SymmetricKey using the given |salt|.
50 crypto::SymmetricKey* PassphraseToKey(const std::string& passphrase,
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/chromium_org/chrome/browser/sync/
profile_sync_service.h 146 // using the passed passphrase.
148 // passphrase.
240 // Used to specify the kind of passphrase with which sync data is encrypted.
242 IMPLICIT, // The user did not provide a custom passphrase for encryption.
244 EXPLICIT, // The user selected the "use custom passphrase" radio button
245 // during sync setup and provided a passphrase.
648 // Returns true if a secondary (explicit) passphrase is being used. It is not
652 // Returns the actual passphrase type being used for encryption.
655 // Returns the time the current explicit passphrase (if any), was set.
656 // If no secondary passphrase is in use, or no time is available, returns a
    [all...]
profile_sync_service_android.cc 238 // a passphrase if cryptographer has any pending keys.
243 // Passwords datatype should never prompt for a passphrase, except when
244 // user is using a custom passphrase. Do not prompt for a passphrase if
246 // notification for passphrase when PSS has not completed configuring
269 JNIEnv* env, jobject obj, jstring passphrase) {
271 std::string key = ConvertJavaStringToUTF8(env, passphrase);
276 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) {
278 std::string key = ConvertJavaStringToUTF8(env, passphrase);
  /external/chromium_org/chrome/browser/chromeos/options/
network_property_ui_data.cc 42 // but has no default value, e.g. Username or Passphrase. (The default
  /external/chromium_org/chromeos/network/onc/
onc_utils.h 46 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an
49 const std::string& passphrase,
94 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|,
103 const std::string& passphrase,
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/
forge-parent-4.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/
forge-parent-5.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/
forge-parent-6.pom 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
186 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/lombok-ast/
deploy.txt 3 mvn gpg:sign-and-deploy-file -DpomFile=lombok-ast-0.2.1.pom -Dfile=lombok-ast-0.2.1.jar -DrepositoryId=sonatype-nexus-staging -Durl=https://oss.sonatype.org/service/local/staging/deploy/maven2/ -Dsources=lombok-ast-0.2.1-sources.jar -Djavadoc=lombok-ast-0.2.1-javadoc.jar -Dgpg.keyname=???? -Dgpg.passphrase=????
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/4/
forge-parent-4.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/5/
forge-parent-5.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/6/
forge-parent-6.pom 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
186 <passphrase>${gpg.passphrase}</passphrase>
  /system/netd/server/
SoftapController.cpp 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
233 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
237 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
SoftapController.h 42 void generatePsk(char *ssid, char *passphrase, char *psk);
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl_unittest.cc 139 const std::string& passphrase) {
140 VerifyMigratedNigoriWithTimestamp(0, passphrase_type, passphrase);
146 const std::string& passphrase) {
185 KeyParams params = {"localhost", "dummy", passphrase};
234 // Build a migrated nigori node with the specified default passphrase
268 // Build a migrated nigori node with the specified default passphrase
269 // as a custom passphrase.
299 // Build an unmigrated nigori node with the specified passphrase and type and
714 // Test that we don't attempt to migrate while an implicit passphrase is pending
716 // migrated, we should be in keystore passphrase state
    [all...]

Completed in 1834 milliseconds

1 23 4 5 6 7 8 91011>>