/external/chromium_org/net/base/ |
D | nss_memio.c | 196 struct PRFilePrivate *secret = fd->secret; in memio_Close() local 197 memio_buffer_destroy(&secret->readbuf); in memio_Close() 198 memio_buffer_destroy(&secret->writebuf); in memio_Close() 199 free(secret); in memio_Close() 217 struct PRFilePrivate *secret; in memio_Recv() local 226 secret = fd->secret; in memio_Recv() 227 mb = &secret->readbuf; in memio_Recv() 230 if (rv == 0 && !secret->eof) { in memio_Recv() 231 secret->read_requested = len; in memio_Recv() 241 else if (secret->writebuf.last_err) in memio_Recv() [all …]
|
D | nss_memio.h | 58 int memio_GetReadRequest(memio_Private *secret); 64 int memio_GetReadParams(memio_Private *secret, char **buf); 69 int memio_GetReadableBufferSize(memio_Private *secret); 79 void memio_PutReadResult(memio_Private *secret, int bytes_read); 86 int memio_GetWriteParams(memio_Private *secret, 96 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
D | SealedObjectTest.java | 51 String secret = "secret string"; in testReadObject() local 52 SealedObject so = new SealedObject(secret, new NullCipher()); in testReadObject() 63 secret, so_des.getObject(new NullCipher())); in testReadObject() 75 String secret = "secret string"; in testSealedObject1() local 77 new SealedObject(secret, null); in testSealedObject1() 96 String secret = "secret string"; in testSealedObject2() local 98 SealedObject so1 = new SealedObject(secret, cipher); in testSealedObject2() 102 + "to the secret content of initial object.", secret, so2 in testSealedObject2() 114 String secret = "secret string"; in testGetAlgorithm() local 121 SealedObject so = new SealedObject(secret, cipher); in testGetAlgorithm() [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 106 secretlen = strlen (secret); in rc_pack_list() 110 strcpy ((char *) md5buf, secret); in rc_pack_list() 141 secretlen = strlen (secret); in rc_pack_list() 142 strcpy ((char *) md5buf, secret); in rc_pack_list() 209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local 223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server() 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server() 238 memset (secret, '\0', sizeof (secret)); in rc_send_server() 253 memset (secret, '\0', sizeof (secret)); in rc_send_server() [all …]
|
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
D | hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); in TEST() local 25 secret[0] = 0xAA; in TEST() 26 secret[1] = 0xBB; in TEST() 27 secret[2] = 0xCC; in TEST() 28 secret[3] = 0xDD; in TEST() 30 std::string result = encoder.EncodeToString(secret); in TEST() 38 std::string secret("AABBCCDD"); in TEST() local 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret); in TEST()
|
/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() argument 219 ChapMS(challenge, (char *)secret, secret_len, &md); in chapms_verify_response() 244 unsigned char *secret, int secret_len, in chapms2_verify_response() argument 262 (char *)secret, secret_len, &md, in chapms2_verify_response() 323 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); in chapms_make_response() 333 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument 344 our_name, secret, secret_len, in chapms2_make_response() 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument 535 MD4Update(&md4Context, (unsigned char *)secret, mdlen); in NTPasswordHash() [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 98 MD5_Update(&ctx, secret, secret_len); in chap_md5_make_response()
|
/external/google-tv-pairing-protocol/cpp/tests/polo/wire/protobuf/ |
D | protobufwireadaptertest.cc | 260 std::vector<unsigned char> secret(4); in TEST_F() local 261 secret[0] = 0xAA; in TEST_F() 262 secret[1] = 0xBB; in TEST_F() 263 secret[2] = 0xCC; in TEST_F() 264 secret[3] = 0xDD; in TEST_F() 267 proto.set_secret(&secret[0], secret.size()); in TEST_F() 277 pairing::message::SecretMessage message(secret); in TEST_F() 285 std::vector<unsigned char> secret(4); in TEST_F() local 286 secret[0] = 0xAA; in TEST_F() 287 secret[1] = 0xBB; in TEST_F() [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.h | 217 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 219 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 221 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 224 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 226 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 229 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 231 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 239 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 250 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 354 if (secret) { in radius_msg_finish() 368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 410 addr[3] = secret; in radius_msg_finish_srv() 423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 448 addr[1] = secret; in radius_msg_finish_das_resp() 462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/external/chromium_org/third_party/tlslite/tlslite/ |
D | mathtls.py | 23 def P_hash(macFunc, secret, seed, length): argument 28 A = macFunc(secret, A) 29 output = macFunc(secret, A + seed) 37 def PRF(secret, label, seed, length): argument 40 S1 = secret[ : int(math.ceil(len(secret)/2.0))] 41 S2 = secret[ int(math.floor(len(secret)/2.0)) : ] 53 def PRF_SSL(secret, seed, length): argument 58 input = secret + SHA1(A + secret + seed)
|
/external/chromium_org/third_party/boringssl/src/ssl/test/runner/ |
D | prf.go | 19 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) { 20 s1 = secret[0 : (len(secret)+1)/2] 21 s2 = secret[len(secret)/2:] 26 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument 27 h := hmac.New(hash, secret) 51 func prf10(result, secret, label, seed []byte) { argument 59 s1, s2 := splitPreMasterSecret(secret) 70 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) { 71 return func(result, secret, label, seed []byte) { 76 pHash(result, secret, labelAndSeed, hashFunc) [all …]
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
D | hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { in EncodeToString() 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); in EncodeToString() 33 const std::string& secret) const { in DecodeToBytes() 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes); in DecodeToBytes()
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/gdocs/ |
D | chrome_ex_oauth.js | 100 window.chromeExOAuthOnAuthorize = function(token, secret) { argument 101 callback(token, secret); 170 var secret = this.getTokenSecret(); 171 if (!token || !secret) { 184 oauth_secret : secret, 201 var secret = this.getTokenSecret(); 202 if (!token || !secret) { 215 oauth_secret : secret, 267 oauth.initOAuthFlow(function (token, secret) { argument 268 background_page.chromeExOAuthOnAuthorize(token, secret); [all …]
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
D | chrome_ex_oauth.js | 100 window.chromeExOAuthOnAuthorize = function(token, secret) { argument 101 callback(token, secret); 170 var secret = this.getTokenSecret(); 171 if (!token || !secret) { 184 oauth_secret : secret, 201 var secret = this.getTokenSecret(); 202 if (!token || !secret) { 215 oauth_secret : secret, 267 oauth.initOAuthFlow(function (token, secret) { argument 268 background_page.chromeExOAuthOnAuthorize(token, secret); [all …]
|
/external/openssl/crypto/jpake/ |
D | jpaketest.c | 120 BIGNUM *secret = BN_new(); in main() local 150 BN_rand(secret, 32, -1, 0); in main() 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main() 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main() 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); in main() 167 BN_add_word(secret, 1); in main() 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); in main() 179 BN_free(secret); in main()
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
D | pairingsession.cc | 90 bool PairingSession::SetSecret(const Gamma& secret) { in SetSecret() argument 91 secret_ = new Gamma(secret); in SetSecret() 98 if (!challenge().CheckGamma(secret)) { in SetSecret() 103 nonce_ = challenge().ExtractNonce(secret); in SetSecret() 224 if (!VerifySecret(message.secret())) { in OnSecretMessage() 248 if (kVerifySecretAck && !VerifySecret(message.secret())) { in OnSecretAckMessage() 261 bool PairingSession::VerifySecret(const Alpha& secret) const { in VerifySecret() 273 bool valid = (secret == *gen_alpha); in VerifySecret() 279 << util::PoloUtil::BytesToHexString(&secret[0], secret.size()) in VerifySecret()
|
/external/chromium_org/ipc/ |
D | ipc_channel_win.cc | 202 int32 secret; in HandleInternalMessage() local 203 failed = it.ReadInt(&secret) ? (secret != client_secret_) : true; in HandleInternalMessage() 226 const std::string& channel_id, int32* secret) { in PipeName() argument 232 if (secret) // Retrieve the secret if asked for. in PipeName() 233 base::StringToInt(channel_id.substr(index + 1), secret); in PipeName() 238 if (secret) in PipeName() 239 *secret = 0; in PipeName() 321 int32 secret = validate_client_ ? 0 : client_secret_; in CreatePipe() local 323 (secret && !m->WriteUInt32(secret))) { in CreatePipe() 560 int secret; in GenerateVerifiedChannelID() local [all …]
|
/external/conscrypt/src/test/java/org/conscrypt/ |
D | MacTest.java | 31 final String secret = "-HMAC-test1"; in test_getInstance_OpenSSL_ENGINE() local 42 SecretKey key1 = engine.getSecretKeyById(secret, "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE() 43 SecretKey key1dupe = engine.getSecretKeyById(secret, "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE() 46 SecretKey key2 = new SecretKeySpec(secret.getBytes(), "HmacSHA256"); in test_getInstance_OpenSSL_ENGINE() 54 assertEquals(Arrays.toString(secret.getBytes()), Arrays.toString(key2.getEncoded())); in test_getInstance_OpenSSL_ENGINE()
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
D | protobufwireadapter.cc | 134 Secret secret; in SendSecretMessage() local 135 secret.set_secret(&message.secret()[0], message.secret().size()); in SendSecretMessage() 138 secret.SerializeAsString()); in SendSecretMessage() 146 ack.set_secret(&message.secret()[0], message.secret().size()); in SendSecretAckMessage() 330 Secret secret; in ParseSecretMessage() local 331 if (!secret.ParseFromString(payload)) { in ParseSecretMessage() 337 const std::vector<uint8_t> secret_bytes(secret.secret().begin(), in ParseSecretMessage() 338 secret.secret().end()); in ParseSecretMessage() 352 std::vector<uint8_t> secret_bytes(ack.secret().begin(), in ParseSecretAckMessage() 353 ack.secret().end()); in ParseSecretAckMessage()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyAgreementSpi.java | 175 byte[] secret = engineGenerateSecret(); in engineGenerateSecret() 177 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() 179 … throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); in engineGenerateSecret() 182 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret() 184 return secret.length; in engineGenerateSecret() 191 byte[] secret = bigIntToBytes(result); in engineGenerateSecret() 216 return new SecretKeySpec(secret, algorithm); in engineGenerateSecret()
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
D | __init__.py | 125 secret = None variable in Consumer 127 def __init__(self, key, secret): argument 129 self.secret = secret 131 if self.key is None or self.secret is None: 136 'oauth_consumer_secret': self.secret} 157 secret = None variable in Token 162 def __init__(self, key, secret): argument 164 self.secret = secret 166 if self.key is None or self.secret is None: 201 'oauth_token_secret': self.secret, [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha256-tlsprf.c | 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256() 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256() 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
|
/external/tcpdump/ |
D | print-esp.c | 89 u_char secret[256]; /* is that big enough for all secrets? */ member 134 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2() 271 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo() 276 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo() 277 memcpy(sa->secret, colon, i); in espprint_decode_encalgo() 280 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo() 281 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo() 556 u_char *secret; in esp_print() local 566 secret = NULL; in esp_print() 572 p = (u_char *)&secret; in esp_print() [all …]
|
/external/chromium_org/crypto/ |
D | ec_signature_creator_nss.cc | 73 SECItem secret; in Sign() local 74 secret.type = siBuffer; in Sign() 75 secret.len = data_len; in Sign() 76 secret.data = const_cast<unsigned char*>(data); in Sign() 86 SignData(&result, &secret, key_->key(), HASH_AlgSHA256, &signature_len_); in Sign()
|