Searched defs:secret (Results 1 - 25 of 54) sorted by relevance

123

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dchap.c22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
30 addr[1] = secret;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
H A Dsha1-tlsprf.c18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
61 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
67 S1 = secret;
68 S2 = secret + L_S1;
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
H A Dsha1-tlsprf.c18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
61 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
67 S1 = secret;
68 S2 = secret + L_S1;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
H A Dsha1-tlsprf.c18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
61 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
67 S1 = secret;
68 S2 = secret + L_S1;
/external/openssl/crypto/jpake/
H A Djpaketest.c120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DMessageDigestAlgorithm.java191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data))
194 * @param secret secret
195 * @return H(concat(secret, ":", data));
197 private static String KD(String secret, String data) { argument
198 return H(secret + ":" + data);
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
/external/clang/test/Index/
H A Dannotate-nested-name-specifier.cpp46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.c309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.c309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.c309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
/external/chromium/net/base/
H A Dnss_memio.c40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
385 memio_GetReadParams(memio_Private *secret, char **buf) argument
394 memio_PutReadResult(memio_Private *secret, int bytes_read) argument
411 memio_GetWriteParams(memio_Private *secret, const char **buf1, unsigned int *len1, const char **buf2, unsigned int *len2) argument
424 memio_PutWriteResult(memio_Private *secret, int bytes_written) argument
[all...]
/external/openssh/
H A Dauth2-jpake.c267 * Fetch password hashing scheme, password salt and derive shared secret
276 u_char *secret; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
356 fatal("%s: BN_bin2bn (secret)", __func__);
363 bzero(secret, secret_len);
364 xfree(secret);
/external/ppp/pppd/plugins/radius/
H A Dconfig.c450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
/external/tcpdump/
H A Dprint-esp.c78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret
[all...]
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
H A D__init__.py113 provider gives the consumer a *key* and a *secret* with which the consumer
115 key in each request to identify itself, but will use its secret only when
125 secret = None variable in class:Consumer
127 def __init__(self, key, secret):
129 self.secret = secret
131 if self.key is None or self.secret is None:
132 raise ValueError("Key and secret must be set.")
136 'oauth_consumer_secret': self.secret}
145 Tokens in OAuth comprise a *key* and a *secret*
157 secret = None variable in class:Token
[all...]
/external/dbus/dbus/
H A Ddbus-keyring.c2 /* dbus-keyring.c Store secret cookies in your homedir
42 * The secret keys are not kept in locked memory, and are written to a
101 DBusString secret; /**< the actual key */ member in struct:__anon4998
169 _dbus_string_free (&keys[i].secret);
351 if (!_dbus_string_init (&keys[n_keys-1].secret))
363 &keys[n_keys-1].secret,
367 _dbus_string_free (&keys[n_keys-1].secret);
485 _dbus_verbose ("could not parse secret key ID at start of line\n");
491 _dbus_verbose ("invalid secret key ID at start of line\n");
501 _dbus_verbose ("could not parse secret ke
[all...]
/external/libppp/src/
H A Dchap_ms.c399 mschap_LANMan(char *digest, char *challenge, char *secret) argument
406 for (ptr = SECRET; *secret && ptr < end; ptr++, secret++)
407 *ptr = toupper(*secret);

Completed in 545 milliseconds

123