Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 178) sorted by relevance

12345678

/external/chromium_org/net/base/
Dnss_memio.c196 struct PRFilePrivate *secret = fd->secret; in memio_Close() local
197 memio_buffer_destroy(&secret->readbuf); in memio_Close()
198 memio_buffer_destroy(&secret->writebuf); in memio_Close()
199 free(secret); in memio_Close()
217 struct PRFilePrivate *secret; in memio_Recv() local
226 secret = fd->secret; in memio_Recv()
227 mb = &secret->readbuf; in memio_Recv()
230 if (rv == 0 && !secret->eof) { in memio_Recv()
231 secret->read_requested = len; in memio_Recv()
241 else if (secret->writebuf.last_err) in memio_Recv()
[all …]
Dnss_memio.h58 int memio_GetReadRequest(memio_Private *secret);
64 int memio_GetReadParams(memio_Private *secret, char **buf);
69 int memio_GetReadableBufferSize(memio_Private *secret);
79 void memio_PutReadResult(memio_Private *secret, int bytes_read);
86 int memio_GetWriteParams(memio_Private *secret,
96 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
DSealedObjectTest.java51 String secret = "secret string"; in testReadObject() local
52 SealedObject so = new SealedObject(secret, new NullCipher()); in testReadObject()
63 secret, so_des.getObject(new NullCipher())); in testReadObject()
75 String secret = "secret string"; in testSealedObject1() local
77 new SealedObject(secret, null); in testSealedObject1()
96 String secret = "secret string"; in testSealedObject2() local
98 SealedObject so1 = new SealedObject(secret, cipher); in testSealedObject2()
102 + "to the secret content of initial object.", secret, so2 in testSealedObject2()
114 String secret = "secret string"; in testGetAlgorithm() local
121 SealedObject so = new SealedObject(secret, cipher); in testGetAlgorithm()
[all …]
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
106 secretlen = strlen (secret); in rc_pack_list()
110 strcpy ((char *) md5buf, secret); in rc_pack_list()
141 secretlen = strlen (secret); in rc_pack_list()
142 strcpy ((char *) md5buf, secret); in rc_pack_list()
209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local
223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server()
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server()
238 memset (secret, '\0', sizeof (secret)); in rc_send_server()
253 memset (secret, '\0', sizeof (secret)); in rc_send_server()
[all …]
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/
Dhexadecimalencodertest.cc24 std::vector<unsigned char> secret(4); in TEST() local
25 secret[0] = 0xAA; in TEST()
26 secret[1] = 0xBB; in TEST()
27 secret[2] = 0xCC; in TEST()
28 secret[3] = 0xDD; in TEST()
30 std::string result = encoder.EncodeToString(secret); in TEST()
38 std::string secret("AABBCCDD"); in TEST() local
40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret); in TEST()
/external/ppp/pppd/
Dchap_ms.c194 unsigned char *secret, int secret_len, in chapms_verify_response() argument
219 ChapMS(challenge, (char *)secret, secret_len, &md); in chapms_verify_response()
244 unsigned char *secret, int secret_len, in chapms2_verify_response() argument
262 (char *)secret, secret_len, &md, in chapms2_verify_response()
323 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); in chapms_make_response()
333 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument
344 our_name, secret, secret_len, in chapms2_make_response()
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument
535 MD4Update(&md4Context, (unsigned char *)secret, mdlen); in NTPasswordHash()
[all …]
Dchap-md5.c58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
98 MD5_Update(&ctx, secret, secret_len); in chap_md5_make_response()
/external/google-tv-pairing-protocol/cpp/tests/polo/wire/protobuf/
Dprotobufwireadaptertest.cc260 std::vector<unsigned char> secret(4); in TEST_F() local
261 secret[0] = 0xAA; in TEST_F()
262 secret[1] = 0xBB; in TEST_F()
263 secret[2] = 0xCC; in TEST_F()
264 secret[3] = 0xDD; in TEST_F()
267 proto.set_secret(&secret[0], secret.size()); in TEST_F()
277 pairing::message::SecretMessage message(secret); in TEST_F()
285 std::vector<unsigned char> secret(4); in TEST_F() local
286 secret[0] = 0xAA; in TEST_F()
287 secret[1] = 0xBB; in TEST_F()
[all …]
/external/wpa_supplicant_8/src/radius/
Dradius.h217 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
219 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
221 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
224 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
226 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
229 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
231 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
239 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
250 const u8 *secret, size_t secret_len);
[all …]
Dradius.c351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
354 if (secret) { in radius_msg_finish()
368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
410 addr[3] = secret; in radius_msg_finish_srv()
423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
448 addr[1] = secret; in radius_msg_finish_das_resp()
462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/external/chromium_org/third_party/tlslite/tlslite/
Dmathtls.py23 def P_hash(macFunc, secret, seed, length): argument
28 A = macFunc(secret, A)
29 output = macFunc(secret, A + seed)
37 def PRF(secret, label, seed, length): argument
40 S1 = secret[ : int(math.ceil(len(secret)/2.0))]
41 S2 = secret[ int(math.floor(len(secret)/2.0)) : ]
53 def PRF_SSL(secret, seed, length): argument
58 input = secret + SHA1(A + secret + seed)
/external/chromium_org/third_party/boringssl/src/ssl/test/runner/
Dprf.go19 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) {
20 s1 = secret[0 : (len(secret)+1)/2]
21 s2 = secret[len(secret)/2:]
26 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument
27 h := hmac.New(hash, secret)
51 func prf10(result, secret, label, seed []byte) { argument
59 s1, s2 := splitPreMasterSecret(secret)
70 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
71 return func(result, secret, label, seed []byte) {
76 pHash(result, secret, labelAndSeed, hashFunc)
[all …]
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/
Dhexadecimalencoder.cc28 const std::vector<uint8_t>& secret) const { in EncodeToString()
29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); in EncodeToString()
33 const std::string& secret) const { in DecodeToBytes()
35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes); in DecodeToBytes()
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/gdocs/
Dchrome_ex_oauth.js100 window.chromeExOAuthOnAuthorize = function(token, secret) { argument
101 callback(token, secret);
170 var secret = this.getTokenSecret();
171 if (!token || !secret) {
184 oauth_secret : secret,
201 var secret = this.getTokenSecret();
202 if (!token || !secret) {
215 oauth_secret : secret,
267 oauth.initOAuthFlow(function (token, secret) { argument
268 background_page.chromeExOAuthOnAuthorize(token, secret);
[all …]
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
Dchrome_ex_oauth.js100 window.chromeExOAuthOnAuthorize = function(token, secret) { argument
101 callback(token, secret);
170 var secret = this.getTokenSecret();
171 if (!token || !secret) {
184 oauth_secret : secret,
201 var secret = this.getTokenSecret();
202 if (!token || !secret) {
215 oauth_secret : secret,
267 oauth.initOAuthFlow(function (token, secret) { argument
268 background_page.chromeExOAuthOnAuthorize(token, secret);
[all …]
/external/openssl/crypto/jpake/
Djpaketest.c120 BIGNUM *secret = BN_new(); in main() local
150 BN_rand(secret, 32, -1, 0); in main()
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main()
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main()
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main()
167 BN_add_word(secret, 1); in main()
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main()
179 BN_free(secret); in main()
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
Dpairingsession.cc90 bool PairingSession::SetSecret(const Gamma& secret) { in SetSecret() argument
91 secret_ = new Gamma(secret); in SetSecret()
98 if (!challenge().CheckGamma(secret)) { in SetSecret()
103 nonce_ = challenge().ExtractNonce(secret); in SetSecret()
224 if (!VerifySecret(message.secret())) { in OnSecretMessage()
248 if (kVerifySecretAck && !VerifySecret(message.secret())) { in OnSecretAckMessage()
261 bool PairingSession::VerifySecret(const Alpha& secret) const { in VerifySecret()
273 bool valid = (secret == *gen_alpha); in VerifySecret()
279 << util::PoloUtil::BytesToHexString(&secret[0], secret.size()) in VerifySecret()
/external/chromium_org/ipc/
Dipc_channel_win.cc202 int32 secret; in HandleInternalMessage() local
203 failed = it.ReadInt(&secret) ? (secret != client_secret_) : true; in HandleInternalMessage()
226 const std::string& channel_id, int32* secret) { in PipeName() argument
232 if (secret) // Retrieve the secret if asked for. in PipeName()
233 base::StringToInt(channel_id.substr(index + 1), secret); in PipeName()
238 if (secret) in PipeName()
239 *secret = 0; in PipeName()
321 int32 secret = validate_client_ ? 0 : client_secret_; in CreatePipe() local
323 (secret && !m->WriteUInt32(secret))) { in CreatePipe()
560 int secret; in GenerateVerifiedChannelID() local
[all …]
/external/conscrypt/src/test/java/org/conscrypt/
DMacTest.java31 final String secret = "-HMAC-test1"; in test_getInstance_OpenSSL_ENGINE() local
42 SecretKey key1 = engine.getSecretKeyById(secret, "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE()
43 SecretKey key1dupe = engine.getSecretKeyById(secret, "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE()
46 SecretKey key2 = new SecretKeySpec(secret.getBytes(), "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE()
54 assertEquals(Arrays.toString(secret.getBytes()), Arrays.toString(key2.getEncoded())); in test_getInstance_OpenSSL_ENGINE()
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/
Dprotobufwireadapter.cc134 Secret secret; in SendSecretMessage() local
135 secret.set_secret(&message.secret()[0], message.secret().size()); in SendSecretMessage()
138 secret.SerializeAsString()); in SendSecretMessage()
146 ack.set_secret(&message.secret()[0], message.secret().size()); in SendSecretAckMessage()
330 Secret secret; in ParseSecretMessage() local
331 if (!secret.ParseFromString(payload)) { in ParseSecretMessage()
337 const std::vector<uint8_t> secret_bytes(secret.secret().begin(), in ParseSecretMessage()
338 secret.secret().end()); in ParseSecretMessage()
352 std::vector<uint8_t> secret_bytes(ack.secret().begin(), in ParseSecretAckMessage()
353 ack.secret().end()); in ParseSecretAckMessage()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
DKeyAgreementSpi.java175 byte[] secret = engineGenerateSecret(); in engineGenerateSecret()
177 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret()
179 … throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); in engineGenerateSecret()
182 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret()
184 return secret.length; in engineGenerateSecret()
191 byte[] secret = bigIntToBytes(result); in engineGenerateSecret()
216 return new SecretKeySpec(secret, algorithm); in engineGenerateSecret()
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
D__init__.py125 secret = None variable in Consumer
127 def __init__(self, key, secret): argument
129 self.secret = secret
131 if self.key is None or self.secret is None:
136 'oauth_consumer_secret': self.secret}
157 secret = None variable in Token
162 def __init__(self, key, secret): argument
164 self.secret = secret
166 if self.key is None or self.secret is None:
201 'oauth_token_secret': self.secret,
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha256-tlsprf.c29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256()
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256()
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
/external/tcpdump/
Dprint-esp.c89 u_char secret[256]; /* is that big enough for all secrets? */ member
134 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2()
271 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo()
276 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo()
277 memcpy(sa->secret, colon, i); in espprint_decode_encalgo()
280 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo()
281 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
556 u_char *secret; in esp_print() local
566 secret = NULL; in esp_print()
572 p = (u_char *)&secret; in esp_print()
[all …]
/external/chromium_org/crypto/
Dec_signature_creator_nss.cc73 SECItem secret; in Sign() local
74 secret.type = siBuffer; in Sign()
75 secret.len = data_len; in Sign()
76 secret.data = const_cast<unsigned char*>(data); in Sign()
86 SignData(&result, &secret, key_->key(), HASH_AlgSHA256, &signature_len_); in Sign()

12345678