| /external/autotest/server/cros/ap_configurators/ |
| belkinF9K_ap_configurator.py | 247 text_field = '//input[@name="passphrase"]'
|
| dlink_dir655_ap_configurator.py | 41 elif 'The length of the Passphrase must be at least' in text:
|
| netgear_WNDR_dual_band_configurator.py | 248 text = '//input[@name="passphrase"]'
|
| netgearwnr1000v4_ap_configurator.py | 265 xpath = '//input[@name="passphrase"]'
|
| /external/wpa_supplicant_8/src/eap_peer/ |
| eap_tls.c | 62 "key passphrase");
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| README-P2P | 169 SSID/passphrase configuration based on a previously used persistent 598 Get the passphrase for a group (only available when acting as a GO). 670 passphrase on the GO that is normally used to allow legacy stations to 672 shared, devices with knowledge of that passphrase can still connect. [all...] |
| android.config | 210 # Remove IEEE 802.11i/WPA-Personal ASCII passphrase support 509 # Password (and passphrase, etc.) backend for external storage
|
| config_winreg.c | 344 if (ssid->passphrase) { 346 wpa_printf(MSG_ERROR, "Both PSK and passphrase "
|
| defconfig | 222 # Remove IEEE 802.11i/WPA-Personal ASCII passphrase support 512 # Password (and passphrase, etc.) backend for external storage
|
| config_file.c | 131 if (ssid->passphrase) { 134 "passphrase configured.", line); [all...] |
| /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.ui | 144 <string>WPA/WPA2 pre-shared key or passphrase</string>
|
| /tools/test/connectivity/acts/framework/acts/test_utils/wifi/ |
| WifiBaseTest.py | 52 """Generates SSID and passphrase for a WPA2 network using random
|
| /external/autotest/client/cros/networking/ |
| shill_xmlrpc_server.py | 135 if params.passphrase is not None: 136 properties[shill.SERVICE_PROPERTY_PASSPHRASE] = params.passphrase
|
| /external/cros/system_api/dbus/shill/ |
| dbus-constants.h | 51 const char kPassphraseProperty[] = "Passphrase"; 459 const char kErrorBadPassphrase[] = "bad-passphrase"; [all...] |
| /external/wpa_supplicant_8/hostapd/ |
| README-WPS | 14 passphrase/PSK) and configuration of an access point and client 84 # Default WPA passphrase for legacy (non-WPS) clients
|
| /external/wpa_supplicant_8/src/crypto/ |
| tls.h | 130 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no 131 * passphrase is used.
|
| crypto_openssl.c | 999 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 1002 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid, [all...] |
| /hardware/libhardware_legacy/include/hardware_legacy/ |
| wifi_nan.h | 290 /* passphrase length */ 293 passphrase info is optional in Discovery phase. 294 passphrase info can be passed during 297 u8 passphrase[NAN_SECURITY_MAX_PASSPHRASE_LEN]; member in struct:__anon48509 [all...] |
| /prebuilts/tools/common/m2/repository/org/codehaus/gmaven/gmaven/1.5/ |
| gmaven-1.5.pom | [all...] |
| /tools/tradefederation/core/src/com/android/tradefed/device/ |
| ITestDevice.java | 213 * @param wifiPsk PSK passphrase or null if unencrypted 231 * @param wifiPsk PSK passphrase or null if unencrypted
|
| /device/generic/goldfish/wifi/ |
| simulated_hostapd.conf | 736 # Passphrase for private key 737 #private_key_passwd=secret passphrase [all...] |
| /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
| SupplicantStaNetworkHalTest.java | 124 * Tests the saving/loading of WifiConfiguration to wpa_supplicant with psk passphrase. 157 * passphrase [all...] |
| /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/32/ |
| commons-parent-32.pom | 781 <passphrase>${gpg.passphrase}</passphrase>
[all...] |
| /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/33/ |
| commons-parent-33.pom | [all...] |
| /prebuilts/tools/common/offline-m2/org/apache/commons/commons-parent/33/ |
| commons-parent-33.pom | [all...] |