Searched refs:passphrase (Results 1 - 25 of 75) sorted by relevance

123

/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/google-tv-pairing-protocol/cpp/src/polo/util/
H A Dcertificateutil.h43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
H A Dcertificateutil.cc55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
54 PKEYFromPEM(std::string pem, std::string passphrase) argument
63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
/external/chromium_org/chrome/browser/sync/test/integration/
H A Dpasswords_helper.h46 // Sets the cryptographer's encryption passphrase for the profile at index
47 // |index| to |passphrase|, and passphrase type |type|.
49 const std::string& passphrase,
52 // Sets the cryptographer's decryption passphrase for the profile at index
53 // |index| to |passphrase|. Returns false if the operation failed, and true
55 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
/external/chromium_org/sync/internal_api/public/
H A Dsync_encryption_handler.h22 // Reasons due to which Cryptographer might require a passphrase.
26 // passphrase for its first attempt at
30 // passphrase for its first attempt at
34 // The different states for the encryption passphrase. These control if and how
35 // the user should be prompted for a decryption passphrase.
37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated).
38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase.
39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase.
40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase.
62 // Called when user interaction is required to obtain a valid passphrase
[all...]
/external/chromium_org/sync/test/
H A Dfake_sync_encryption_handler.h35 virtual void SetEncryptionPassphrase(const std::string& passphrase,
37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
H A Dfake_sync_encryption_handler.cc100 const std::string& passphrase,
107 const std::string& passphrase) {
99 SetEncryptionPassphrase( const std::string& passphrase, bool is_explicit) argument
106 SetDecryptionPassphrase( const std::string& passphrase) argument
/external/bison/build-aux/
H A Dgnupload224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" |
[all...]
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl.h60 virtual void SetEncryptionPassphrase(const std::string& passphrase,
62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
157 // explicit passphrase state (if the cryptographer is ready).
175 // Sets a new custom passphrase. Should only be called if a custom passphrase
178 // passphrase already existed.
179 void SetCustomPassphrase(const std::string& passphrase,
182 // Decrypt the encryption keybag using a user provided passphrase.
183 // Should only be called if the current passphrase is a frozen implicit
184 // passphrase o
[all...]
/external/chromium_org/chromeos/network/onc/
H A Donc_utils.h46 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an
49 const std::string& passphrase,
94 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|,
103 const std::string& passphrase,
/external/chromium_org/chrome/browser/chromeos/settings/
H A Dtoken_encryptor.cc68 const std::string& passphrase,
71 crypto::SymmetricKey::AES, passphrase, salt, 1000, 256);
67 PassphraseToKey( const std::string& passphrase, const std::string& salt) argument
H A Dtoken_encryptor.h49 // Converts |passphrase| to a SymmetricKey using the given |salt|.
50 crypto::SymmetricKey* PassphraseToKey(const std::string& passphrase,
/external/chromium_org/chrome/browser/sync/glue/
H A Dsync_backend_host.h86 // Called on |frontend_loop_| to asynchronously set a new passphrase for
89 // - An explicit passphrase has already been set
94 // passphrase passed in is cached so we can re-encrypt with it in future.
95 // - If there are no pending keys, data is encrypted with |passphrase| (this
96 // is a no-op if data was already encrypted with |passphrase|.)
98 const std::string& passphrase,
101 // Called on |frontend_loop_| to use the provided passphrase to asynchronously
102 // attempt decryption. Returns false immediately if the passphrase could not
107 virtual bool SetDecryptionPassphrase(const std::string& passphrase)
171 // Returns the type of passphrase bein
[all...]
H A Dsync_backend_host_mock.cc41 const std::string& passphrase,
45 const std::string& passphrase) {
40 SetEncryptionPassphrase( const std::string& passphrase, bool is_explicit) argument
44 SetDecryptionPassphrase( const std::string& passphrase) argument
H A Dsync_backend_host_mock.h47 const std::string& passphrase,
51 const std::string& passphrase) OVERRIDE;
/external/chromium_org/chrome/browser/sync/
H A Dprofile_sync_service_mock.h116 MOCK_METHOD1(SetDecryptionPassphrase, bool(const std::string& passphrase));
117 MOCK_METHOD2(SetEncryptionPassphrase, void(const std::string& passphrase,
/external/owasp/sanitizer/tools/
H A Dstage_to_maven_central.sh29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
/external/chromium_org/chrome/browser/resources/
H A Dsync_setup_overlay.css27 #sync-custom-passphrase {
31 #sync-passphrase-message {
35 .sync-custom-passphrase-input {
39 #sync-existing-passphrase-container {
122 #passphrase-input {
127 #incorrect-passphrase {
158 #sync-passphrase-warning {
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
H A DProfileSyncService.java186 * Checks if a password or a passphrase is required for decryption of sync data.
188 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required.
190 * @return the enum describing the decryption passphrase type required
196 // passphrase type we should tell the user we need.
206 * Returns the actual passphrase type being used for encryption. The sync backend must be
210 * should ask the user for a passphrase, you should instead use
225 * Returns true if the current explicit passphrase time is defined.
233 * Returns the current explicit passphrase time in milliseconds since epoch.
260 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running
263 * @return true if sync is using a custom passphrase
341 setEncryptionPassphrase(String passphrase, boolean isGaia) argument
351 setDecryptionPassphrase(String passphrase) argument
590 nativeSetDecryptionPassphrase( long nativeProfileSyncServiceAndroid, String passphrase) argument
592 nativeSetEncryptionPassphrase( long nativeProfileSyncServiceAndroid, String passphrase, boolean isGaia) argument
[all...]

Completed in 531 milliseconds

123