HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 126 - 150 of 485) sorted by null

1 2 3 4 56 7 8 91011>>

  /cts/apps/CtsVerifier/src/com/android/cts/verifier/wifiaware/testcase/
DataPathOutOfBandTestCase.java 42 * open/passphrase * responder/initiator.
86 private static final String PASSPHRASE = "Some super secret password";
282 PASSPHRASE)).build();
416 PASSPHRASE)).build();
  /external/ImageMagick/config/
policy.xml 67 <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/>
  /external/autotest/server/cros/ap_configurators/
linksyswrt120n_ap_configurator.py 77 text = '//input[@name="passPhrase"]'
  /external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/
ShadowWifiP2pManagerTest.java 109 shadowOf(wifiP2pGroup).setPassphrase("passphrase");
  /external/syslinux/gpxe/src/config/
general.h 77 #define CRYPTO_80211_WPA /* WPA Personal, authenticating with passphrase */
  /external/wpa_supplicant_8/wpa_supplicant/
mesh.c 294 if (ssid->passphrase == NULL) {
296 "mesh: Passphrase for SAE not configured");
314 len = os_strlen(ssid->passphrase);
316 dup_binstr(ssid->passphrase, len);
wpa_supplicant.conf 333 # Password (and passphrase, etc.) backend for external storage
347 # Passphrase length (8..63) for P2P GO
349 # This parameter controls the length of the random passphrase that is
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
package.html 37 network name, and passphrase.</li>
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
SupplicantP2pIfaceCallback.java 252 * @param passphrase PSK passphrase used to secure the group.
257 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress,
278 group.setPassphrase(passphrase);
  /prebuilts/jdk/jdk8/darwin-x86/sample/nio/server/
README.txt 96 Enter keystore password: passphrase
180 Enter keystore password: passphrase<CR>
185 Enter keystore password: passphrase<CR>
200 -Djavax.net.ssl.TrustStorePassword=passphrase \
  /prebuilts/jdk/jdk8/linux-x86/sample/nio/server/
README.txt 96 Enter keystore password: passphrase
180 Enter keystore password: passphrase<CR>
185 Enter keystore password: passphrase<CR>
200 -Djavax.net.ssl.TrustStorePassword=passphrase \
  /tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
hostapd_security.py 38 password: The PSK or passphrase for the security mode.
  /tools/tradefederation/core/src/com/android/tradefed/targetprep/
WifiPreparer.java 36 @Option(name="wifi-psk", description="WPA-PSK passphrase of wifi network to connect to.")
  /device/google/marlin/
wpa_supplicant_wcn.conf 286 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
287 # generated using the passphrase and SSID). ASCII passphrase must be between
291 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
293 # only when the passphrase or SSID has actually changed.
501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
504 # psk="very secret passphrase"
513 # psk="very secret passphrase"
535 # psk="not so secure passphrase"
754 # psk="secret passphrase"
    [all...]
  /device/google/wahoo/
wpa_supplicant_wcn.conf 286 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
287 # generated using the passphrase and SSID). ASCII passphrase must be between
291 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
293 # only when the passphrase or SSID has actually changed.
501 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
504 # psk="very secret passphrase"
513 # psk="very secret passphrase"
535 # psk="not so secure passphrase"
754 # psk="secret passphrase"
    [all...]
  /hardware/interfaces/wifi/supplicant/1.0/
ISupplicantStaNetwork.hal 34 /** Min length of PSK passphrase param. */
37 /** Max length of PSK passphrase param. */
264 * Set passphrase for WPA_PSK network.
283 * This is the calculated using 'wpa_passphrase <ssid> [passphrase]'
680 * Get passphrase for WPA_PSK network.
681 * Must return a failure if network has no passphrase set (use |getPsk| if
    [all...]
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/
commons-parent-11.pom 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/17/
commons-parent-17.pom 451 <passphrase>${gpg.passphrase}</passphrase>
534 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/9/
commons-parent-9.pom 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/offline-m2/org/apache/commons/commons-parent/11/
commons-parent-11.pom 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
sta_network.cpp 689 if (wpa_ssid->passphrase) {
795 if (wpa_ssid->passphrase &&
796 os_strlen(wpa_ssid->passphrase) == psk.size() &&
797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) {
804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) {
817 str_clear_free(wpa_ssid->passphrase);
818 wpa_ssid->passphrase = nullptr;
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/
sta_network.cpp 708 if (wpa_ssid->passphrase) {
814 if (wpa_ssid->passphrase &&
815 os_strlen(wpa_ssid->passphrase) == psk.size() &&
816 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) {
823 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) {
836 str_clear_free(wpa_ssid->passphrase);
837 wpa_ssid->passphrase = nullptr;
    [all...]
  /external/wpa_supplicant_8/src/ap/
dpp_hostapd.c 379 conf_sta->passphrase = os_strdup(pass);
380 if (!conf_sta->passphrase)
401 conf_ap->passphrase = os_strdup(pass);
402 if (!conf_ap->passphrase)
688 } else if (auth->passphrase[0]) {
692 (const u8 *) auth->passphrase,
693 os_strlen(auth->passphrase));
    [all...]
ap_config.c 336 wpa_hexdump_ascii_key(MSG_DEBUG, "PSK (ASCII passphrase)",
342 wpa_hexdump_key(MSG_DEBUG, "PSK (from passphrase)",
355 "instead of passphrase");
358 "passphrase");
844 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
  /external/wpa_supplicant_8/src/wps/
wps.h 157 * Force PSK format to be used instead of ASCII passphrase when
699 * passphrase (8..63 characters) or the 32-octet PSK (64 hex
700 * characters). When this is set to the ASCII passphrase, the PSK can
704 * other devices to get the passphrase).
717 * network_key is set to the ASCII passphrase.

Completed in 879 milliseconds

1 2 3 4 56 7 8 91011>>