/external/curl/docs/examples/ |
simplessl.c | 28 2. if the key is passphrase protected, set pPassphrase to the 29 passphrase you use 104 /* sorry, for engine we must set the passphrase
|
/system/connectivity/shill/setup_wifi/ |
main.cc | 38 static const char kPassphrase[] = "passphrase"; 47 " --passphrase=<passprhase>\n" 48 " Set the passphrase for PSK networks\n";
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/system/connectivity/apmanager/ |
fake_config_adaptor.cc | 55 void FakeConfigAdaptor::SetPassphrase(const std::string& passphrase) { 56 passphrase_ = passphrase;
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
control.wifi_checkRawPMK | 16 a raw PMK value instead of an ASCII passphrase.
|
/external/curl/src/ |
tool_getparam.h | 55 char **passphrase);
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/ |
forge-parent-4.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/ |
forge-parent-5.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/ |
forge-parent-6.pom | 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile --> 186 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/lombok-ast/ |
deploy.txt | 3 mvn gpg:sign-and-deploy-file -DpomFile=lombok-ast-0.2.1.pom -Dfile=lombok-ast-0.2.1.jar -DrepositoryId=sonatype-nexus-staging -Durl=https://oss.sonatype.org/service/local/staging/deploy/maven2/ -Dsources=lombok-ast-0.2.1-sources.jar -Djavadoc=lombok-ast-0.2.1-javadoc.jar -Dgpg.keyname=???? -Dgpg.passphrase=????
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/4/ |
forge-parent-4.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/5/ |
forge-parent-5.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/6/ |
forge-parent-6.pom | 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile --> 186 <passphrase>${gpg.passphrase}</passphrase>
|
/system/netd/server/ |
SoftapController.cpp | 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 221 bool SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) { 225 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
|
SoftapController.h | 42 bool generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): 203 @param passphrase: string passphrase for network. 207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 447 * Passphrase is NULL iff there is no i-th Tunnel-Password 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/prebuilts/tools/common/gradle-plugins/repository/org/apache/commons/commons-parent/3/ |
commons-parent-3.pom | 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/3/ |
commons-parent-3.pom | 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
|
/external/netperf/src/ |
netserver.c | 204 /* char *passphrase = NULL; */ 698 error with receiving the passphrase */ 700 (netperf_request.content.request_type == PASSPHRASE) && 701 (!strcmp(passphrase, 707 netperf_response.content.response_type = PASSPHRASE; 711 "Sorry, unable to match with required passphrase\n"); 715 "Unable to match required passphrase. Closing control connection\n"); 740 /* if the netserver was started with a passphrase, look for it in 741 the first request to arrive. if there is no passphrase in the 745 if ((passphrase != NULL) && (recv_passphrase()) [all...] |
/external/libweave/src/privet/ |
wifi_bootstrap_manager.h | 58 const std::string& passphrase, 73 void StartConnecting(const std::string& ssid, const std::string& passphrase);
|
/system/connectivity/shill/ |
error.cc | 46 { kErrorResultInvalidPassphrase, "Invalid passphrase" }, 58 { kErrorResultPassphraseRequired, "Passphrase required" },
|
/system/connectivity/shill/test-rpc-proxy/ |
proxy_rpc_security_types.cc | 85 std::string passphrase = base::StringPrintf( local 88 (*properties)[shill::kPassphraseProperty] = passphrase;
|
/external/cros/system_api/dbus/apmanager/ |
dbus-constants.h | 28 const char kConfigPassphraseProperty[] = "Passphrase";
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_KEYPASSWD.3 | 25 CURLOPT_KEYPASSWD \- set passphrase to private key
|