| /cts/apps/CtsVerifier/src/com/android/cts/verifier/wifiaware/testcase/ |
| DataPathOutOfBandTestCase.java | 42 * open/passphrase * responder/initiator. 86 private static final String PASSPHRASE = "Some super secret password"; 282 PASSPHRASE)).build(); 416 PASSPHRASE)).build();
|
| /external/ImageMagick/config/ |
| policy.xml | 67 <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/>
|
| /external/autotest/server/cros/ap_configurators/ |
| linksyswrt120n_ap_configurator.py | 77 text = '//input[@name="passPhrase"]'
|
| /external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
| ShadowWifiP2pManagerTest.java | 109 shadowOf(wifiP2pGroup).setPassphrase("passphrase");
|
| /external/syslinux/gpxe/src/config/ |
| general.h | 77 #define CRYPTO_80211_WPA /* WPA Personal, authenticating with passphrase */
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| mesh.c | 294 if (ssid->passphrase == NULL) { 296 "mesh: Passphrase for SAE not configured"); 314 len = os_strlen(ssid->passphrase); 316 dup_binstr(ssid->passphrase, len);
|
| wpa_supplicant.conf | 333 # Password (and passphrase, etc.) backend for external storage 347 # Passphrase length (8..63) for P2P GO 349 # This parameter controls the length of the random passphrase that is [all...] |
| /frameworks/base/wifi/java/android/net/wifi/p2p/ |
| package.html | 37 network name, and passphrase.</li>
|
| /frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
| SupplicantP2pIfaceCallback.java | 252 * @param passphrase PSK passphrase used to secure the group. 257 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress, 278 group.setPassphrase(passphrase);
|
| /prebuilts/jdk/jdk8/darwin-x86/sample/nio/server/ |
| README.txt | 96 Enter keystore password: passphrase 180 Enter keystore password: passphrase<CR> 185 Enter keystore password: passphrase<CR> 200 -Djavax.net.ssl.TrustStorePassword=passphrase \
|
| /prebuilts/jdk/jdk8/linux-x86/sample/nio/server/ |
| README.txt | 96 Enter keystore password: passphrase 180 Enter keystore password: passphrase<CR> 185 Enter keystore password: passphrase<CR> 200 -Djavax.net.ssl.TrustStorePassword=passphrase \
|
| /tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
| hostapd_security.py | 38 password: The PSK or passphrase for the security mode.
|
| /tools/tradefederation/core/src/com/android/tradefed/targetprep/ |
| WifiPreparer.java | 36 @Option(name="wifi-psk", description="WPA-PSK passphrase of wifi network to connect to.")
|
| /device/google/marlin/ |
| wpa_supplicant_wcn.conf | 286 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 287 # generated using the passphrase and SSID). ASCII passphrase must be between 291 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 293 # only when the passphrase or SSID has actually changed. 501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 504 # psk="very secret passphrase" 513 # psk="very secret passphrase" 535 # psk="not so secure passphrase" 754 # psk="secret passphrase" [all...] |
| /device/google/wahoo/ |
| wpa_supplicant_wcn.conf | 286 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 287 # generated using the passphrase and SSID). ASCII passphrase must be between 291 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 293 # only when the passphrase or SSID has actually changed. 501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 504 # psk="very secret passphrase" 513 # psk="very secret passphrase" 535 # psk="not so secure passphrase" 754 # psk="secret passphrase" [all...] |
| /hardware/interfaces/wifi/supplicant/1.0/ |
| ISupplicantStaNetwork.hal | 34 /** Min length of PSK passphrase param. */ 37 /** Max length of PSK passphrase param. */ 264 * Set passphrase for WPA_PSK network. 283 * This is the calculated using 'wpa_passphrase <ssid> [passphrase]' 680 * Get passphrase for WPA_PSK network. 681 * Must return a failure if network has no passphrase set (use |getPsk| if [all...] |
| /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/ |
| commons-parent-11.pom | 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
|
| /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/17/ |
| commons-parent-17.pom | 451 <passphrase>${gpg.passphrase}</passphrase>
534 <passphrase>${gpg.passphrase}</passphrase>
|
| /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/9/ |
| commons-parent-9.pom | 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
|
| /prebuilts/tools/common/offline-m2/org/apache/commons/commons-parent/11/ |
| commons-parent-11.pom | 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
|
| /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
| sta_network.cpp | 689 if (wpa_ssid->passphrase) { 795 if (wpa_ssid->passphrase && 796 os_strlen(wpa_ssid->passphrase) == psk.size() && 797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { 804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { 817 str_clear_free(wpa_ssid->passphrase); 818 wpa_ssid->passphrase = nullptr; [all...] |
| /external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/ |
| sta_network.cpp | 708 if (wpa_ssid->passphrase) { 814 if (wpa_ssid->passphrase && 815 os_strlen(wpa_ssid->passphrase) == psk.size() && 816 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { 823 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { 836 str_clear_free(wpa_ssid->passphrase); 837 wpa_ssid->passphrase = nullptr; [all...] |
| /external/wpa_supplicant_8/src/ap/ |
| dpp_hostapd.c | 379 conf_sta->passphrase = os_strdup(pass); 380 if (!conf_sta->passphrase) 401 conf_ap->passphrase = os_strdup(pass); 402 if (!conf_ap->passphrase) 688 } else if (auth->passphrase[0]) { 692 (const u8 *) auth->passphrase, 693 os_strlen(auth->passphrase)); [all...] |
| ap_config.c | 336 wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)", 342 wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)", 355 "instead of passphrase"); 358 "passphrase"); 844 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
|
| /external/wpa_supplicant_8/src/wps/ |
| wps.h | 157 * Force PSK format to be used instead of ASCII passphrase when 699 * passphrase (8..63 characters) or the 32-octet PSK (64 hex 700 * characters). When this is set to the ASCII passphrase, the PSK can 704 * other devices to get the passphrase). 717 * network_key is set to the ASCII passphrase.
|