/external/chromium/net/base/ |
D | nss_memio.c | 191 struct PRFilePrivate *secret = fd->secret; in memio_Close() local 192 memio_buffer_destroy(&secret->readbuf); in memio_Close() 193 memio_buffer_destroy(&secret->writebuf); in memio_Close() 194 free(secret); in memio_Close() 212 struct PRFilePrivate *secret; in memio_Recv() local 221 secret = fd->secret; in memio_Recv() 222 mb = &secret->readbuf; in memio_Recv() 225 if (rv == 0 && !secret->eof) { in memio_Recv() 245 struct PRFilePrivate *secret; in memio_Send() local 249 secret = fd->secret; in memio_Send() [all …]
|
D | nss_memio.h | 58 int memio_GetReadParams(memio_Private *secret, char **buf); 68 void memio_PutReadResult(memio_Private *secret, int bytes_read); 74 void memio_GetWriteParams(memio_Private *secret, 84 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
D | SealedObjectTest.java | 51 String secret = "secret string"; in testReadObject() local 52 SealedObject so = new SealedObject(secret, new NullCipher()); in testReadObject() 63 secret, so_des.getObject(new NullCipher())); in testReadObject() 75 String secret = "secret string"; in testSealedObject1() local 77 new SealedObject(secret, null); in testSealedObject1() 96 String secret = "secret string"; in testSealedObject2() local 98 SealedObject so1 = new SealedObject(secret, cipher); in testSealedObject2() 102 + "to the secret content of initial object.", secret, so2 in testSealedObject2() 114 String secret = "secret string"; in testGetAlgorithm() local 121 SealedObject so = new SealedObject(secret, cipher); in testGetAlgorithm() [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 106 secretlen = strlen (secret); in rc_pack_list() 110 strcpy ((char *) md5buf, secret); in rc_pack_list() 141 secretlen = strlen (secret); in rc_pack_list() 142 strcpy ((char *) md5buf, secret); in rc_pack_list() 209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local 223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server() 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server() 238 memset (secret, '\0', sizeof (secret)); in rc_send_server() 253 memset (secret, '\0', sizeof (secret)); in rc_send_server() [all …]
|
/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() argument 219 ChapMS(challenge, (char *)secret, secret_len, &md); in chapms_verify_response() 244 unsigned char *secret, int secret_len, in chapms2_verify_response() argument 262 (char *)secret, secret_len, &md, in chapms2_verify_response() 323 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); in chapms_make_response() 333 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument 344 our_name, secret, secret_len, in chapms2_make_response() 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument 535 MD4Update(&md4Context, (unsigned char *)secret, mdlen); in NTPasswordHash() [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 98 MD5_Update(&ctx, secret, secret_len); in chap_md5_make_response()
|
D | auth.c | 1348 char secret[MAXWORDLEN]; 1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1399 int login_secret = strcmp(secret, "@login") == 0; 1406 if (secret[0] != 0 && !login_secret) { 1408 if ((cryptpap || strcmp(passwd, secret) != 0) 1409 && strcmp(crypt(passwd, secret), secret) != 0) 1444 BZERO(secret, sizeof(secret)); 1694 char secret[MAXWORDLEN]; local 1714 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0); 1715 ret = i >= 0 && secret[0] == 0; [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.h | 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 344 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 347 if (secret) { in radius_msg_finish() 361 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 375 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 393 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 403 addr[3] = secret; in radius_msg_finish_srv() 416 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 435 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 441 addr[1] = secret; in radius_msg_finish_das_resp() 455 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
D | chrome_ex_oauth.js | 102 window.chromeExOAuthOnAuthorize = function(token, secret) { argument 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 186 oauth_secret : secret, 203 var secret = this.getTokenSecret(); 204 if (!token || !secret) { 217 oauth_secret : secret, 269 oauth.initOAuthFlow(function (token, secret) { argument 270 background_page.chromeExOAuthOnAuthorize(token, secret); [all …]
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
D | chrome_ex_oauth.js | 102 window.chromeExOAuthOnAuthorize = function(token, secret) { argument 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 186 oauth_secret : secret, 203 var secret = this.getTokenSecret(); 204 if (!token || !secret) { 217 oauth_secret : secret, 269 oauth.initOAuthFlow(function (token, secret) { argument 270 background_page.chromeExOAuthOnAuthorize(token, secret); [all …]
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
D | chrome_ex_oauth.js | 102 window.chromeExOAuthOnAuthorize = function(token, secret) { argument 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 186 oauth_secret : secret, 203 var secret = this.getTokenSecret(); 204 if (!token || !secret) { 217 oauth_secret : secret, 269 oauth.initOAuthFlow(function (token, secret) { argument 270 background_page.chromeExOAuthOnAuthorize(token, secret); [all …]
|
/external/openssl/crypto/jpake/ |
D | jpaketest.c | 120 BIGNUM *secret = BN_new(); in main() local 150 BN_rand(secret, 32, -1, 0); in main() 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main() 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main() 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main() 167 BN_add_word(secret, 1); in main() 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main() 179 BN_free(secret); in main()
|
/external/tcpdump/ |
D | print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member 283 memcpy(sa1.secret, espsecret_key, i); in esp_print_decode_onesecret() 288 if (i < sizeof(sa1.secret)) { in esp_print_decode_onesecret() 289 memcpy(sa1.secret, colon, i); in esp_print_decode_onesecret() 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); in esp_print_decode_onesecret() 293 sa1.secretlen = sizeof(sa1.secret); in esp_print_decode_onesecret() 356 u_char *secret; in esp_print() local 368 secret = NULL; in esp_print() 379 p = (u_char *)&secret; in esp_print() 470 secret = sa->secret; in esp_print() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
D | radius.h | 210 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 212 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 214 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 222 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 225 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 233 const u8 *secret, size_t secret_len); 236 const u8 *secret, size_t secret_len); 239 const u8 *secret, size_t secret_len, 245 const u8 *secret, size_t secret_len);
|
D | radius.c | 296 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 299 if (secret) { in radius_msg_finish() 313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, in radius_msg_finish() 327 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, in radius_msg_finish_srv() 355 addr[3] = secret; in radius_msg_finish_srv() 368 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument 378 addr[1] = secret; in radius_msg_finish_acct() 585 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_msg_auth() argument 618 hmac_md5(secret, secret_len, msg->buf, msg->buf_used, auth); in radius_msg_verify_msg_auth() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyAgreementSpi.java | 175 byte[] secret = engineGenerateSecret(); in engineGenerateSecret() 177 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() 179 … throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); in engineGenerateSecret() 182 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret() 184 return secret.length; in engineGenerateSecret() 191 byte[] secret = bigIntToBytes(result); in engineGenerateSecret() 216 return new SecretKeySpec(secret, algorithm); in engineGenerateSecret()
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
D | __init__.py | 125 secret = None variable in Consumer 127 def __init__(self, key, secret): argument 129 self.secret = secret 131 if self.key is None or self.secret is None: 136 'oauth_consumer_secret': self.secret} 157 secret = None variable in Token 162 def __init__(self, key, secret): argument 164 self.secret = secret 166 if self.key is None or self.secret is None: 201 'oauth_token_secret': self.secret, [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha256-tlsprf.c | 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256() 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256() 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
|
D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument 67 S1 = secret; in tls_prf_sha1_md5() 68 S2 = secret + L_S1; in tls_prf_sha1_md5()
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
D | OAuth.php | 12 public $secret; variable in OAuthConsumer 14 function __construct($key, $secret, $callback_url=NULL) { argument 16 $this->secret = $secret; 21 return "OAuthConsumer[key=$this->key,secret=$this->secret]"; 28 public $secret; variable in OAuthToken 34 function __construct($key, $secret) { argument 36 $this->secret = $secret; 47 OAuthUtil::urlencode_rfc3986($this->secret); 109 $consumer->secret, 110 ($token) ? $token->secret : "" [all …]
|
/external/ipsec-tools/src/racoon/ |
D | safefile.c | 48 safefile(path, secret) in safefile() argument 50 int secret; 84 if (secret) {
|
/external/dbus/dbus/ |
D | dbus-keyring.c | 101 DBusString secret; /**< the actual key */ member 169 _dbus_string_free (&keys[i].secret); in free_keys() 351 if (!_dbus_string_init (&keys[n_keys-1].secret)) in add_new_key() 363 &keys[n_keys-1].secret, in add_new_key() 367 _dbus_string_free (&keys[n_keys-1].secret); in add_new_key() 535 if (!_dbus_string_init (&keys[n_keys-1].secret)) in _dbus_keyring_reload() 545 &keys[n_keys-1].secret, 0)) in _dbus_keyring_reload() 554 _dbus_string_free (&keys[n_keys - 1].secret); in _dbus_keyring_reload() 591 if (!_dbus_string_hex_encode (&keys[i].secret, 0, in _dbus_keyring_reload() 640 _dbus_string_zero (&keys[i].secret); in _dbus_keyring_reload() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
D | KeyAgreementSpi.java | 122 byte[] secret = bigIntToBytes(result); in engineGenerateSecret() 124 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() 129 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret() 131 return secret.length; in engineGenerateSecret()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|