/external/chromium_org/chrome/browser/sync/glue/ |
sync_backend_host_impl.h | 98 const std::string& passphrase, 100 virtual bool SetDecryptionPassphrase(const std::string& passphrase) 237 // passphrase. |token| must be valid UTF-8 as we use the PrefService for 253 // Checks if |passphrase| can be used to decrypt the cryptographer's pending 258 const std::string& passphrase) const; 260 // Invoked when a passphrase is required to decrypt a set of Nigori keys, 261 // or for encrypting. |reason| denotes why the passphrase was required. 263 // cached by the frontend. If there are no pending keys, or if the passphrase 269 // Invoked when the passphrase provided by the user has been accepted. 281 // Invoked when the passphrase state has changed. Caches the passphrase stat [all...] |
sync_backend_host_impl.cc | 183 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase, 192 // We should never be called with an empty passphrase. 193 DCHECK(!passphrase.empty()); 199 // encrypted with an explicit passphrase. 207 passphrase, is_explicit)); 211 const std::string& passphrase) { 218 // We should never be called with an empty passphrase. 219 DCHECK(!passphrase.empty()); 227 // Check the passphrase that was provided against our local cache of the 230 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase)) [all...] |
sync_backend_host_core.h | 162 // Called to set the passphrase for encryption. 163 void DoSetEncryptionPassphrase(const std::string& passphrase, 167 void DoSetDecryptionPassphrase(const std::string& passphrase);
|
sync_backend_host_core.cc | 472 const std::string& passphrase, 476 passphrase, is_explicit); 519 const std::string& passphrase) { 522 passphrase);
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 82 std::string passphrase; member in struct:__anon10203::SyncConfigInfo 167 // Passphrase settings. 180 if (!result->GetString("passphrase", &config->passphrase)) { 181 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value"; 352 // usePassphrase: true if the data is encrypted with a secondary passphrase 353 // show_passphrase: true if a passphrase is needed to decrypt the sync data 381 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase 694 // if (for example) some kind of passphrase error is encountered. 699 if (!configuration.passphrase.empty()) [all...] |
sync_setup_handler_unittest.cc | 73 const std::string& passphrase, 81 result.SetBoolean("usePassphrase", !passphrase.empty()); 82 if (!passphrase.empty()) 83 result.SetString("passphrase", passphrase); 662 // passphrase. 698 // passphrase. 717 // We should navigate back to the configure page since we need a passphrase. 733 // Act as if an encryption passphrase is required the first time, then never 799 // We should navigate back to the configure page since we need a passphrase [all...] |
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl.cc | 67 // The new passphrase state is sufficient to determine whether a nigori node 70 // 1. Passphrase state is set. 73 // 4. If passphrase state is keystore, keystore_decryptor_token is set. 316 // sync from happening until the the passphrase is provided. 322 const std::string& passphrase, 326 if (passphrase.empty()) { 327 NOTREACHED() << "Cannot encrypt with an empty passphrase."; 333 KeyParams key_params = {"localhost", "dummy", passphrase}; 343 // Once we've migrated to keystore, the only way to set a passphrase for 344 // encryption is to set a custom passphrase [all...] |
sync_rollback_manager_base.cc | 25 virtual void SetEncryptionPassphrase(const std::string& passphrase, 27 virtual void SetDecryptionPassphrase(const std::string& passphrase)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 151 * passphrase - WPA ASCII passphrase 153 * If this is set, psk will be generated using the SSID and passphrase 154 * configured for the network. ASCII passphrase must be between 8 and 157 char *passphrase; member in struct:wpa_ssid 160 * ext_psk - PSK/passphrase name in external storage 162 * If this is set, PSK/passphrase will be fetched from external storage 326 * using ASCII passphrase).
|
p2p_supplicant.c | 682 if (ssid->passphrase && !s->passphrase) 684 else if (ssid->passphrase && s->passphrase && 685 os_strcmp(ssid->passphrase, s->passphrase) != 0) 718 if (ssid->passphrase) { 719 os_free(s->passphrase); 720 s->passphrase = os_strdup(ssid->passphrase); [all...] |
wps_supplicant.c | 300 if (new_ssid->passphrase && ssid->passphrase && 301 os_strcmp(new_ssid->passphrase, ssid->passphrase) != 304 "WPS: M8 Creds with different passphrase - do not merge"); 316 if ((new_ssid->passphrase && !ssid->passphrase) || 317 (!new_ssid->passphrase && ssid->passphrase)) { 319 "WPS: M8 Creds with different passphrase/PSK type - do not merge") [all...] |
config.c | 289 str_clear_free(ssid->passphrase); 290 ssid->passphrase = NULL; 314 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 321 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 322 os_memcmp(ssid->passphrase, value, len) == 0) 325 str_clear_free(ssid->passphrase); 326 ssid->passphrase = dup_binstr(value, len); 327 if (ssid->passphrase == NULL [all...] |
sme.c | 91 if (ssid->passphrase == NULL) { 102 (u8 *) ssid->passphrase, 103 os_strlen(ssid->passphrase), [all...] |
/external/chromium_org/chrome/browser/sync/ |
profile_sync_service_android.h | 85 // Returns true if the sync code needs a passphrase for either encryption or 86 // decryption (can need a passphrase for encryption if the user is turning on 87 // encryption and no passphrase has been set yet). 90 // Returns true if the sync code needs a decryption passphrase for one of the 94 // Returns true if the sync code needs a decryption passphrase for *any* type, 98 // Returns true if the sync code needs a custom decryption passphrase. 102 // Returns true if the decryption passphrase works (was able to decrypt the 107 jstring passphrase); 109 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true 110 // then the passphrase is treated as a google (GAIA) passphrase, otherwis [all...] |
profile_sync_service_android.cc | 238 // a passphrase if cryptographer has any pending keys. 243 // Passwords datatype should never prompt for a passphrase, except when 244 // user is using a custom passphrase. Do not prompt for a passphrase if 246 // notification for passphrase when PSS has not completed configuring 269 JNIEnv* env, jobject obj, jstring passphrase) { 271 std::string key = ConvertJavaStringToUTF8(env, passphrase); 276 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) { 278 std::string key = ConvertJavaStringToUTF8(env, passphrase);
|
profile_sync_service.h | 146 // using the passed passphrase. 148 // passphrase. 240 // Used to specify the kind of passphrase with which sync data is encrypted. 242 IMPLICIT, // The user did not provide a custom passphrase for encryption. 244 EXPLICIT, // The user selected the "use custom passphrase" radio button 245 // during sync setup and provided a passphrase. 648 // Returns true if a secondary (explicit) passphrase is being used. It is not 652 // Returns the actual passphrase type being used for encryption. 655 // Returns the time the current explicit passphrase (if any), was set. 656 // If no secondary passphrase is in use, or no time is available, returns a [all...] |
profile_sync_service.cc | [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 426 char *passphrase, *strpassphrase; local 434 passphrase = radius_msg_get_tunnel_password( 438 * Passphrase is NULL iff there is no i-th Tunnel-Password 441 if (passphrase == NULL) 444 * passphrase does not contain the NULL termination. 450 os_memcpy(strpassphrase, passphrase, passphraselen); 461 os_free(passphrase);
|
/external/chromium_org/chromeos/network/ |
network_configuration_handler_unittest.cc | 527 std::string identity, passphrase; local 531 service_path, shill::kPassphraseProperty, &passphrase)); 533 EXPECT_EQ(test_passphrase, passphrase); 553 service_path, shill::kIdentityProperty, &passphrase));
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 58 scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase, 114 passphrase, 353 const std::string& passphrase, 376 toplevel_onc = Decrypt(passphrase, *toplevel_onc);
|
/external/chromium_org/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 410 // If the network requires a passphrase, make sure it is the right length. 498 // Passphrase. 695 std::string passphrase = GetPassphrase(); local 696 if (!passphrase.empty()) { 722 const std::string passphrase = GetPassphrase(); local 723 if (!passphrase.empty()) { 725 shill::kPassphraseProperty, passphrase); 1208 std::string passphrase; local [all...] |
/external/chromium_org/chromeos/dbus/ |
fake_shill_service_client.cc | 612 std::string passphrase; local 614 shill::kPassphraseProperty, &passphrase); 615 if (passphrase == "failure") {
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 690 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 694 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), 699 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|