HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 26 - 50 of 70) sorted by null

12 3

  /external/chromium_org/chrome/browser/sync/glue/
sync_backend_host_impl.h 98 const std::string& passphrase,
100 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
237 // passphrase. |token| must be valid UTF-8 as we use the PrefService for
253 // Checks if |passphrase| can be used to decrypt the cryptographer's pending
258 const std::string& passphrase) const;
260 // Invoked when a passphrase is required to decrypt a set of Nigori keys,
261 // or for encrypting. |reason| denotes why the passphrase was required.
263 // cached by the frontend. If there are no pending keys, or if the passphrase
269 // Invoked when the passphrase provided by the user has been accepted.
281 // Invoked when the passphrase state has changed. Caches the passphrase stat
    [all...]
sync_backend_host_impl.cc 183 void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase,
192 // We should never be called with an empty passphrase.
193 DCHECK(!passphrase.empty());
199 // encrypted with an explicit passphrase.
207 passphrase, is_explicit));
211 const std::string& passphrase) {
218 // We should never be called with an empty passphrase.
219 DCHECK(!passphrase.empty());
227 // Check the passphrase that was provided against our local cache of the
230 if (!CheckPassphraseAgainstCachedPendingKeys(passphrase))
    [all...]
sync_backend_host_core.h 162 // Called to set the passphrase for encryption.
163 void DoSetEncryptionPassphrase(const std::string& passphrase,
167 void DoSetDecryptionPassphrase(const std::string& passphrase);
sync_backend_host_core.cc 472 const std::string& passphrase,
476 passphrase, is_explicit);
519 const std::string& passphrase) {
522 passphrase);
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 82 std::string passphrase; member in struct:__anon10203::SyncConfigInfo
167 // Passphrase settings.
180 if (!result->GetString("passphrase", &config->passphrase)) {
181 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value";
352 // usePassphrase: true if the data is encrypted with a secondary passphrase
353 // show_passphrase: true if a passphrase is needed to decrypt the sync data
381 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase
694 // if (for example) some kind of passphrase error is encountered.
699 if (!configuration.passphrase.empty())
    [all...]
sync_setup_handler_unittest.cc 73 const std::string& passphrase,
81 result.SetBoolean("usePassphrase", !passphrase.empty());
82 if (!passphrase.empty())
83 result.SetString("passphrase", passphrase);
662 // passphrase.
698 // passphrase.
717 // We should navigate back to the configure page since we need a passphrase.
733 // Act as if an encryption passphrase is required the first time, then never
799 // We should navigate back to the configure page since we need a passphrase
    [all...]
  /external/chromium_org/sync/internal_api/
sync_encryption_handler_impl.cc 67 // The new passphrase state is sufficient to determine whether a nigori node
70 // 1. Passphrase state is set.
73 // 4. If passphrase state is keystore, keystore_decryptor_token is set.
316 // sync from happening until the the passphrase is provided.
322 const std::string& passphrase,
326 if (passphrase.empty()) {
327 NOTREACHED() << "Cannot encrypt with an empty passphrase.";
333 KeyParams key_params = {"localhost", "dummy", passphrase};
343 // Once we've migrated to keystore, the only way to set a passphrase for
344 // encryption is to set a custom passphrase
    [all...]
sync_rollback_manager_base.cc 25 virtual void SetEncryptionPassphrase(const std::string& passphrase,
27 virtual void SetDecryptionPassphrase(const std::string& passphrase)
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 151 * passphrase - WPA ASCII passphrase
153 * If this is set, psk will be generated using the SSID and passphrase
154 * configured for the network. ASCII passphrase must be between 8 and
157 char *passphrase; member in struct:wpa_ssid
160 * ext_psk - PSK/passphrase name in external storage
162 * If this is set, PSK/passphrase will be fetched from external storage
326 * using ASCII passphrase).
p2p_supplicant.c 682 if (ssid->passphrase && !s->passphrase)
684 else if (ssid->passphrase && s->passphrase &&
685 os_strcmp(ssid->passphrase, s->passphrase) != 0)
718 if (ssid->passphrase) {
719 os_free(s->passphrase);
720 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
wps_supplicant.c 300 if (new_ssid->passphrase && ssid->passphrase &&
301 os_strcmp(new_ssid->passphrase, ssid->passphrase) !=
304 "WPS: M8 Creds with different passphrase - do not merge");
316 if ((new_ssid->passphrase && !ssid->passphrase) ||
317 (!new_ssid->passphrase && ssid->passphrase)) {
319 "WPS: M8 Creds with different passphrase/PSK type - do not merge")
    [all...]
config.c 289 str_clear_free(ssid->passphrase);
290 ssid->passphrase = NULL;
314 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
321 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
322 os_memcmp(ssid->passphrase, value, len) == 0)
325 str_clear_free(ssid->passphrase);
326 ssid->passphrase = dup_binstr(value, len);
327 if (ssid->passphrase == NULL
    [all...]
sme.c 91 if (ssid->passphrase == NULL) {
102 (u8 *) ssid->passphrase,
103 os_strlen(ssid->passphrase),
    [all...]
  /external/chromium_org/chrome/browser/sync/
profile_sync_service_android.h 85 // Returns true if the sync code needs a passphrase for either encryption or
86 // decryption (can need a passphrase for encryption if the user is turning on
87 // encryption and no passphrase has been set yet).
90 // Returns true if the sync code needs a decryption passphrase for one of the
94 // Returns true if the sync code needs a decryption passphrase for *any* type,
98 // Returns true if the sync code needs a custom decryption passphrase.
102 // Returns true if the decryption passphrase works (was able to decrypt the
107 jstring passphrase);
109 // Encrypts the user's data with the passed passphrase. If |is_gaia| == true
110 // then the passphrase is treated as a google (GAIA) passphrase, otherwis
    [all...]
profile_sync_service_android.cc 238 // a passphrase if cryptographer has any pending keys.
243 // Passwords datatype should never prompt for a passphrase, except when
244 // user is using a custom passphrase. Do not prompt for a passphrase if
246 // notification for passphrase when PSS has not completed configuring
269 JNIEnv* env, jobject obj, jstring passphrase) {
271 std::string key = ConvertJavaStringToUTF8(env, passphrase);
276 JNIEnv* env, jobject obj, jstring passphrase, jboolean is_gaia) {
278 std::string key = ConvertJavaStringToUTF8(env, passphrase);
profile_sync_service.h 146 // using the passed passphrase.
148 // passphrase.
240 // Used to specify the kind of passphrase with which sync data is encrypted.
242 IMPLICIT, // The user did not provide a custom passphrase for encryption.
244 EXPLICIT, // The user selected the "use custom passphrase" radio button
245 // during sync setup and provided a passphrase.
648 // Returns true if a secondary (explicit) passphrase is being used. It is not
652 // Returns the actual passphrase type being used for encryption.
655 // Returns the time the current explicit passphrase (if any), was set.
656 // If no secondary passphrase is in use, or no time is available, returns a
    [all...]
profile_sync_service.cc     [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 426 char *passphrase, *strpassphrase; local
434 passphrase = radius_msg_get_tunnel_password(
438 * Passphrase is NULL iff there is no i-th Tunnel-Password
441 if (passphrase == NULL)
444 * passphrase does not contain the NULL termination.
450 os_memcpy(strpassphrase, passphrase, passphraselen);
461 os_free(passphrase);
  /external/chromium_org/chromeos/network/
network_configuration_handler_unittest.cc 527 std::string identity, passphrase; local
531 service_path, shill::kPassphraseProperty, &passphrase));
533 EXPECT_EQ(test_passphrase, passphrase);
553 service_path, shill::kIdentityProperty, &passphrase));
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 58 scoped_ptr<base::DictionaryValue> Decrypt(const std::string& passphrase,
114 passphrase,
353 const std::string& passphrase,
376 toplevel_onc = Decrypt(passphrase, *toplevel_onc);
  /external/chromium_org/chrome/browser/chromeos/options/
wifi_config_view.cc 410 // If the network requires a passphrase, make sure it is the right length.
498 // Passphrase.
695 std::string passphrase = GetPassphrase(); local
696 if (!passphrase.empty()) {
722 const std::string passphrase = GetPassphrase(); local
723 if (!passphrase.empty()) {
725 shill::kPassphraseProperty, passphrase);
1208 std::string passphrase; local
    [all...]
  /external/chromium_org/chromeos/dbus/
fake_shill_service_client.cc 612 std::string passphrase; local
614 shill::kPassphraseProperty, &passphrase);
615 if (passphrase == "failure") {
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 690 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
694 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase),
699 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,

Completed in 830 milliseconds

12 3