HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 26 - 50 of 421) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/curl/docs/examples/
simplessl.c 28 2. if the key is passphrase protected, set pPassphrase to the
29 passphrase you use
104 /* sorry, for engine we must set the passphrase
  /system/connectivity/shill/setup_wifi/
main.cc 38 static const char kPassphrase[] = "passphrase";
47 " --passphrase=<passprhase>\n"
48 " Set the passphrase for PSK networks\n";
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /system/connectivity/apmanager/
fake_config_adaptor.cc 55 void FakeConfigAdaptor::SetPassphrase(const std::string& passphrase) {
56 passphrase_ = passphrase;
  /external/autotest/server/site_tests/network_WiFi_SimpleConnect/
control.wifi_checkRawPMK 16 a raw PMK value instead of an ASCII passphrase.
  /external/curl/src/
tool_getparam.h 55 char **passphrase);
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/
forge-parent-4.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/
forge-parent-5.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/
forge-parent-6.pom 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
186 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/lombok-ast/
deploy.txt 3 mvn gpg:sign-and-deploy-file -DpomFile=lombok-ast-0.2.1.pom -Dfile=lombok-ast-0.2.1.jar -DrepositoryId=sonatype-nexus-staging -Durl=https://oss.sonatype.org/service/local/staging/deploy/maven2/ -Dsources=lombok-ast-0.2.1-sources.jar -Djavadoc=lombok-ast-0.2.1-javadoc.jar -Dgpg.keyname=???? -Dgpg.passphrase=????
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/4/
forge-parent-4.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/5/
forge-parent-5.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/sonatype/forge/forge-parent/6/
forge-parent-6.pom 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
186 <passphrase>${gpg.passphrase}</passphrase>
  /system/netd/server/
SoftapController.cpp 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
221 bool SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
225 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
SoftapController.h 42 bool generatePsk(char *ssid, char *passphrase, char *psk);
  /external/autotest/client/common_lib/cros/tendo/
privet_helper.py 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}):
203 @param passphrase: string passphrase for network.
207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
447 * Passphrase is NULL iff there is no i-th Tunnel-Password
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
  /prebuilts/tools/common/gradle-plugins/repository/org/apache/commons/commons-parent/3/
commons-parent-3.pom 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/3/
commons-parent-3.pom 209 <passphrase>${gpg.passphrase}</passphrase>
269 <passphrase>${gpg.passphrase}</passphrase>
  /external/netperf/src/
netserver.c 204 /* char *passphrase = NULL; */
698 error with receiving the passphrase */
700 (netperf_request.content.request_type == PASSPHRASE) &&
701 (!strcmp(passphrase,
707 netperf_response.content.response_type = PASSPHRASE;
711 "Sorry, unable to match with required passphrase\n");
715 "Unable to match required passphrase. Closing control connection\n");
740 /* if the netserver was started with a passphrase, look for it in
741 the first request to arrive. if there is no passphrase in the
745 if ((passphrase != NULL) && (recv_passphrase())
    [all...]
  /external/libweave/src/privet/
wifi_bootstrap_manager.h 58 const std::string& passphrase,
73 void StartConnecting(const std::string& ssid, const std::string& passphrase);
  /system/connectivity/shill/
error.cc 46 { kErrorResultInvalidPassphrase, "Invalid passphrase" },
58 { kErrorResultPassphraseRequired, "Passphrase required" },
  /system/connectivity/shill/test-rpc-proxy/
proxy_rpc_security_types.cc 85 std::string passphrase = base::StringPrintf( local
88 (*properties)[shill::kPassphraseProperty] = passphrase;
  /external/cros/system_api/dbus/apmanager/
dbus-constants.h 28 const char kConfigPassphraseProperty[] = "Passphrase";
  /external/curl/docs/libcurl/opts/
CURLOPT_KEYPASSWD.3 25 CURLOPT_KEYPASSWD \- set passphrase to private key

Completed in 1315 milliseconds

12 3 4 5 6 7 8 91011>>