/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 30 addr[1] = secret;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
/external/openssl/crypto/jpake/ |
H A D | jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | MessageDigestAlgorithm.java | 191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data)) 194 * @param secret secret 195 * @return H(concat(secret, ":", data)); 197 private static String KD(String secret, String data) { argument 198 return H(secret + ":" + data);
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/clang/test/Index/ |
H A D | annotate-nested-name-specifier.cpp | 46 namespace secret { namespace in namespace:outer::inner 51 using namespace outer_alias::inner::secret; 52 namespace super_secret = outer_alias::inner::secret; 238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15 248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
/external/chromium/net/base/ |
H A D | nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 191 struct PRFilePrivate *secret = fd->secret; local 192 memio_buffer_destroy(&secret->readbuf); 193 memio_buffer_destroy(&secret->writebuf); 194 free(secret); 212 struct PRFilePrivate *secret; local 221 secret = fd->secret; 222 mb = &secret 245 struct PRFilePrivate *secret; local 274 struct PRFilePrivate *secret = fd->secret; local 356 struct PRFilePrivate *secret; local 374 struct PRFilePrivate *secret = memiofd->secret; local 381 struct PRFilePrivate *secret = memiofd->secret; local 385 memio_GetReadParams(memio_Private *secret, char **buf) argument 394 memio_PutReadResult(memio_Private *secret, int bytes_read) argument 411 memio_GetWriteParams(memio_Private *secret, const char **buf1, unsigned int *len1, const char **buf2, unsigned int *len2) argument 424 memio_PutWriteResult(memio_Private *secret, int bytes_written) argument [all...] |
/external/openssh/ |
H A D | auth2-jpake.c | 267 * Fetch password hashing scheme, password salt and derive shared secret 276 u_char *secret; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 356 fatal("%s: BN_bin2bn (secret)", __func__); 363 bzero(secret, secret_len); 364 xfree(secret);
|
/external/ppp/pppd/plugins/radius/ |
H A D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument 492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */ 495 memset (secret, '\0', MAX_SECRET_LENGTH); 501 strncpy (secret, s, (size_t) len); 502 secret[MAX_SECRET_LENGTH] = '\0'; 538 memset (secret, '\0', sizeof (secret));
|
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/external/tcpdump/ |
H A D | print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
H A D | __init__.py | 113 provider gives the consumer a *key* and a *secret* with which the consumer 115 key in each request to identify itself, but will use its secret only when 125 secret = None variable in class:Consumer 127 def __init__(self, key, secret): 129 self.secret = secret 131 if self.key is None or self.secret is None: 132 raise ValueError("Key and secret must be set.") 136 'oauth_consumer_secret': self.secret} 145 Tokens in OAuth comprise a *key* and a *secret* 157 secret = None variable in class:Token [all...] |
/external/dbus/dbus/ |
H A D | dbus-keyring.c | 2 /* dbus-keyring.c Store secret cookies in your homedir 42 * The secret keys are not kept in locked memory, and are written to a 101 DBusString secret; /**< the actual key */ member in struct:__anon4998 169 _dbus_string_free (&keys[i].secret); 351 if (!_dbus_string_init (&keys[n_keys-1].secret)) 363 &keys[n_keys-1].secret, 367 _dbus_string_free (&keys[n_keys-1].secret); 485 _dbus_verbose ("could not parse secret key ID at start of line\n"); 491 _dbus_verbose ("invalid secret key ID at start of line\n"); 501 _dbus_verbose ("could not parse secret ke [all...] |
/external/libppp/src/ |
H A D | chap_ms.c | 399 mschap_LANMan(char *digest, char *challenge, char *secret) argument 406 for (ptr = SECRET; *secret && ptr < end; ptr++, secret++) 407 *ptr = toupper(*secret);
|