/external/chromium_org/media/cdm/ |
H A D | aes_decryptor.cc | 532 AesDecryptor::DecryptionKey::DecryptionKey(const std::string& secret) argument 533 : secret_(secret) {
|
/external/chromium_org/chromeos/login/auth/ |
H A D | extended_authenticator_impl.cc | 96 Key key(keys.front().secret);
|
/external/openssl/apps/ |
H A D | apps.c | 2509 const char *secret) 2524 BN_bin2bn((const unsigned char *)secret, strlen(secret), bnsecret); 2670 void jpake_client_auth(BIO *out, BIO *conn, const char *secret) argument 2677 ctx = jpake_init("client", "server", secret); 2699 void jpake_server_auth(BIO *out, BIO *conn, const char *secret) argument 2706 ctx = jpake_init("server", "client", secret); 2508 jpake_init(const char *us, const char *them, const char *secret) argument
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
H A D | signin_screen_handler.cc | 1015 const std::string& secret, 1023 user_context.SetKey(Key(secret)); 1026 // TODO(tbarzic): Handle empty secret. The delegate will end up ignoring login 1028 DCHECK(!secret.empty()); 1014 AttemptEasySignin(const std::string& user_email, const std::string& secret, const std::string& key_label) argument
|
H A D | signin_screen_handler.h | 343 const std::string& secret,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 903 int port, const char *secret, 935 as->shared_secret = (u8 *) os_strdup(secret); 936 as->shared_secret_len = os_strlen(secret); 1146 "[-s<AS secret>]\\\n" 1161 " -s<AS secret> = shared secret with the authentication " 901 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr) argument
|
/external/chromium_org/google_apis/gcm/tools/ |
H A D | mcs_probe.cc | 94 const char kSecretSwitch[] = "secret"; 206 uint64 secret() const { return secret_; } function in class:gcm::__anon8388::MCSProbe
|
/external/chromium_org/chrome/browser/password_manager/ |
H A D | native_backend_gnome_x.cc | 184 if (data->secret) { 185 form->password_value = UTF8ToUTF16(data->secret);
|
H A D | native_backend_gnome_x_unittest.cc | 241 found->secret = strdup(item->password.c_str()); 254 free(found->secret);
|
/external/chromium_org/crypto/ |
H A D | curve25519-donna.c | 576 curve25519_donna(u8 *mypublic, const u8 *secret, const u8 *basepoint) { argument 581 for (i = 0; i < 32; ++i) e[i] = secret[i];
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/ |
H A D | prio.h | 83 PRFilePrivate *secret; /* layer dependent data */ member in struct:PRFileDesc
|
/external/ppp/pppd/ |
H A D | pppd.h | 82 #define MAXSECRETLEN 256 /* max length of password or secret */ 552 /* get "secret" for chap */ 553 int get_srp_secret __P((int unit, char *client, char *server, char *secret,
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 619 char *secret; local 621 secret = os_strchr(val, ' '); 622 if (secret == NULL) 625 secret++; 631 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); 634 bss->radius_das_shared_secret_len = os_strlen(secret); 2135 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", 2160 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed",
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslsock.c | 165 ss = (sslSocket *)fd->secret; 190 ss = (sslSocket *)layer->secret; 2885 layer->secret = (PRFilePrivate *)ns;
|
H A D | sslcon.c | 794 const PRUint8 * secret = sec->sendSecret.data; local 810 (*sec->hash->update)(sec->hashcx, secret, secretLen); 820 PRINT_BUF(60, (0, "calc-mac secret:", secret, secretLen)); 1598 SSL_DBG(("%d: SSL[%d]: invalid master secret key length=%d (bits)!", 1855 /* Use secret keySize to determine which cipher is best */ 3678 * This is the secret handshake algorithm.
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 3404 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3408 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 3423 s->s3->server_random, secret);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 3404 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3408 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 3423 s->s3->server_random, secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 3404 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, argument 3408 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, 3423 s->s3->server_random, secret);
|
/external/chromium_org/chrome/browser/signin/ |
H A D | easy_unlock_screenlock_state_handler_unittest.cc | 93 const std::string& secret,
|
/external/chromium_org/chrome/browser/ui/webui/signin/ |
H A D | user_manager_screen_handler.cc | 291 const std::string& secret, 289 AttemptEasySignin( const std::string& user_email, const std::string& secret, const std::string& key_label) argument
|
/external/chromium_org/components/gcm_driver/ |
H A D | gcm_client_impl_unittest.cc | 558 EXPECT_EQ(kDeviceSecurityToken, device_checkin_info().secret);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_sess.c | 839 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, argument
|
/external/openssl/ssl/ |
H A D | ssl_sess.c | 926 int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, argument
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctputil.c | 1797 int i, secret; local 1812 secret = (int)inp->sctp_ep.current_secret_number; 1814 inp->sctp_ep.secret_key[secret][i] =
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 302 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg); 1396 /* TLS pre-shared secret session resumption */ 2252 /* Pre-shared secret session resumption functions */
|