/system/connectivity/apmanager/dbus/ |
config_dbus_adaptor.cc | 126 void ConfigDBusAdaptor::SetPassphrase(const std::string& passphrase) { 127 ConfigAdaptor::SetPassphrase(passphrase);
|
config_dbus_adaptor.h | 65 void SetPassphrase(const std::string& passphrase) override;
|
/external/curl/lib/ |
ssh.h | 110 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/libweave/src/privet/ |
wifi_bootstrap_manager.cc | 104 const std::string& passphrase) { 111 wifi_->Connect(ssid, passphrase, 184 const std::string& passphrase, 192 tasks_weak_factory_.GetWeakPtr(), ssid, passphrase),
|
/system/connectivity/apmanager/ |
fake_config_adaptor.h | 40 void SetPassphrase(const std::string& passphrase) override;
|
config.cc | 155 base::StringPrintf("Passphrase must contain between %d and %d characters", 310 void Config::SetPassphrase(const std::string& passphrase) { 311 adaptor_->SetPassphrase(passphrase); 499 string passphrase = GetPassphrase(); local 500 if (passphrase.empty()) { 504 base::StringPrintf("Passphrase not set for security mode: %s", 522 passphrase.c_str());
|
config.h | 67 void SetPassphrase(const std::string& passphrase);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 447 * Passphrase is NULL iff there is no i-th Tunnel-Password 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/netperf/src/ |
netserver.c | 204 /* char *passphrase = NULL; */ 698 error with receiving the passphrase */ 700 (netperf_request.content.request_type == PASSPHRASE) && 701 (!strcmp(passphrase, 707 netperf_response.content.response_type = PASSPHRASE; 711 "Sorry, unable to match with required passphrase\n"); 715 "Unable to match required passphrase. Closing control connection\n"); 740 /* if the netserver was started with a passphrase, look for it in 741 the first request to arrive. if there is no passphrase in the 745 if ((passphrase != NULL) && (recv_passphrase()) [all...] |
netsh.h | 80 extern char *passphrase;
|
netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
wps_supplicant.c | 312 if (new_ssid->passphrase && ssid->passphrase && 313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != 316 "WPS: M8 Creds with different passphrase - do not merge"); 328 if ((new_ssid->passphrase && !ssid->passphrase) || 329 (!new_ssid->passphrase && ssid->passphrase)) { 331 "WPS: M8 Creds with different passphrase/PSK type - do not merge") [all...] |
mesh.c | 262 if (ssid->passphrase == NULL) { 264 "mesh: Passphrase for SAE not configured"); 283 len = os_strlen(ssid->passphrase); 285 dup_binstr(ssid->passphrase, len);
|
mesh_rsn.c | 269 if (ssid->passphrase == NULL) { 280 (u8 *) ssid->passphrase, 281 os_strlen(ssid->passphrase), sta->sae);
|
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): 203 @param passphrase: string passphrase for network. 207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/system/connectivity/shill/test-scripts/ |
flimflam.py | 234 # Supply a passphrase only if it is non-empty. 235 passphrase = kwargs.get("passphrase", "") 236 if passphrase: 237 params["Passphrase"] = passphrase
|
/external/autotest/server/site_tests/network_WiFi_ProfileGUID/ |
network_WiFi_ProfileGUID.py | 111 passphrase=self.TEST_PASSWORD2)):
|
/system/connectivity/shill/test-rpc-proxy/ |
proxy_dbus_shill_wifi_client.h | 33 const std::string& passphrase) override;
|
proxy_shill_wifi_client.h | 52 const std::string& passphrase) = 0;
|
/system/weaved/buffet/ |
shill_client.h | 55 const std::string& passphrase,
|
shill_client.cc | 139 const string& passphrase, 154 if (passphrase.empty()) { 157 service_properties[shill::kPassphraseProperty] = Any{passphrase};
|
/external/curl/src/ |
tool_getparam.c | 283 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 292 char **passphrase) 299 *passphrase = NULL; 306 * means no passphrase was given and no characters escaped */ 373 *passphrase = strdup(param_place); 1391 char *certname, *passphrase; local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |