/external/chromium/net/base/ |
H A D | nss_memio.h | 58 int memio_GetReadParams(memio_Private *secret, char **buf); 68 void memio_PutReadResult(memio_Private *secret, int bytes_read); 74 void memio_GetWriteParams(memio_Private *secret, 84 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
|
H A D | nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 191 struct PRFilePrivate *secret = fd->secret; local 192 memio_buffer_destroy(&secret->readbuf); 193 memio_buffer_destroy(&secret->writebuf); 194 free(secret); 212 struct PRFilePrivate *secret; local 221 secret = fd->secret; 222 mb = &secret 245 struct PRFilePrivate *secret; local 274 struct PRFilePrivate *secret = fd->secret; local 356 struct PRFilePrivate *secret; local 374 struct PRFilePrivate *secret = memiofd->secret; local 381 struct PRFilePrivate *secret = memiofd->secret; local 385 memio_GetReadParams(memio_Private *secret, char **buf) argument 394 memio_PutReadResult(memio_Private *secret, int bytes_read) argument 411 memio_GetWriteParams(memio_Private *secret, const char **buf1, unsigned int *len1, const char **buf2, unsigned int *len2) argument 424 memio_PutWriteResult(memio_Private *secret, int bytes_written) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 30 addr[1] = secret;
|
H A D | chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
H A D | SealedObjectTest.java | 51 String secret = "secret string"; 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; 77 new SealedObject(secret, null); 96 String secret [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/external/ppp/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_ [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.h | 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.h | 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_ [all...] |
/external/openssl/crypto/jpake/ |
H A D | jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
H A D | chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
H A D | chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
H A D | chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/tcpdump/ |
H A D | print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret [all...] |