Searched refs:secret (Results 1 - 25 of 95) sorted by relevance

1234

/external/chromium/net/base/
H A Dnss_memio.h58 int memio_GetReadParams(memio_Private *secret, char **buf);
68 void memio_PutReadResult(memio_Private *secret, int bytes_read);
74 void memio_GetWriteParams(memio_Private *secret,
84 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
H A Dnss_memio.c40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
385 memio_GetReadParams(memio_Private *secret, char **buf) argument
394 memio_PutReadResult(memio_Private *secret, int bytes_read) argument
411 memio_GetWriteParams(memio_Private *secret, const char **buf1, unsigned int *len1, const char **buf2, unsigned int *len2) argument
424 memio_PutWriteResult(memio_Private *secret, int bytes_written) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dchap.c22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
30 addr[1] = secret;
H A Dchap.h20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
H A DSealedObjectTest.java51 String secret = "secret string";
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string";
77 new SealedObject(secret, null);
96 String secret
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/ipsec-tools/src/racoon/
H A Dsafefile.c48 safefile(path, secret)
50 int secret;
83 /* secret file should not be read by others */
84 if (secret) {
/external/ppp/pppd/plugins/radius/
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.h198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
228 const u8 *secret, size_t secret_len);
231 const u8 *secret, size_
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius.h198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
228 const u8 *secret, size_t secret_len);
231 const u8 *secret, size_
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.h198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
228 const u8 *secret, size_t secret_len);
231 const u8 *secret, size_
[all...]
/external/openssl/crypto/jpake/
H A Djpaketest.c120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/
H A Dchrome_ex_oauth.js14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
[all...]
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
H A Dchrome_ex_oauth.js14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
[all...]
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/
H A Dchrome_ex_oauth.js14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
[all...]
/external/tcpdump/
H A Dprint-esp.c78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret
[all...]

Completed in 327 milliseconds

1234