/external/ppp/pppd/ |
H A D | chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 535 MD4Update(&md4Context, (unsigned char *)secret, mdle 193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
H A D | __init__.py | 113 provider gives the consumer a *key* and a *secret* with which the consumer 115 key in each request to identify itself, but will use its secret only when 125 secret = None variable in class:Consumer 127 def __init__(self, key, secret): 129 self.secret = secret 131 if self.key is None or self.secret is None: 132 raise ValueError("Key and secret must be set.") 136 'oauth_consumer_secret': self.secret} 145 Tokens in OAuth comprise a *key* and a *secret* 157 secret = None variable in class:Token [all...] |
/external/chromium_org/chrome/browser/signin/ |
H A D | easy_unlock_auth_attempt.cc | 21 // Fake secret used to force invalid login. 24 // Decrypts the secret that should be used to login from |wrapped_secret| using 44 std::string secret; 45 if (!encryptor.Decrypt(wrapped_secret, &secret)) 48 return secret; 136 // If secret is not set, set it to an arbitrary value, otherwise there will
|
/external/clang/test/Index/ |
H A D | annotate-nested-name-specifier.cpp | 46 namespace secret { namespace in namespace:outer::inner 51 using namespace outer_alias::inner::secret; 52 namespace super_secret = outer_alias::inner::secret; 238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15 248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
|
/external/chromium_org/chromeos/login/auth/ |
H A D | key.h | 35 Key(KeyType key_type, const std::string& salt, const std::string& secret);
|
H A D | key.cc | 39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) argument 40 : key_type_(key_type), salt_(salt), secret_(secret) { 85 // plain text secret cannot be reconstructed even if the hashing is
|
/external/chromium_org/crypto/ |
H A D | hkdf.h | 21 // |secret|: the input shared secret (or, from RFC 5869, the IKM). 22 // |salt|: an (optional) public salt / non-secret random value. While 33 // |subkey_secret_bytes_to_generate|: the number of bytes of subkey secret to 35 HKDF(const base::StringPiece& secret,
|
H A D | hkdf.cc | 15 HKDF::HKDF(const base::StringPiece& secret, argument 39 result = prk_hmac.Sign(secret, prk, sizeof(prk));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha256.h | 23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
/external/chromium_org/chrome/test/ispy/client/ |
H A D | boto_bucket.py | 24 def __init__(self, key, secret, bucket_name): 25 """Initializes the bucket with a key, secret, and bucket_name. 29 secret: the API secret to access GS. 33 conn = uri.connect(key, secret)
|
/external/chromium_org/remoting/webapp/ |
H A D | third_party_token_fetcher.js | 10 * token and a shared secret from a third-party server. The server can then 14 * secret in its fragment. The client then sends only the token to the host. 16 * the token for the shared secret. Once both client and host have the shared 17 * secret, they use a zero-disclosure mutual authentication protocol to 119 // its private key) is called the 'shared secret'. 121 // 'shared secret', along with the 'token' from the redirect URL fragment. 141 // obtain both the code and the shared secret in a single request.
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 354 if (secret) { 368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 410 addr[3] = secret; 423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument 442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 448 addr[1] = secret; 462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 354 if (secret) { 368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 410 addr[3] = secret; 423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument 442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 448 addr[1] = secret; 462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 354 if (secret) { 368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 410 addr[3] = secret; 423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument 442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 448 addr[1] = secret; 462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument 504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/external/tcpdump/ |
H A D | print-esp.c | 89 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 134 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) 205 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 271 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 276 if (i < sizeof(sa->secret)) { 277 memcpy(sa->secret, colon, i); 280 memcpy(sa->secret, colon, sizeof(sa->secret)); 281 sa->secretlen = sizeof(sa->secret); 556 u_char *secret; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/ |
H A D | KeyAgreementSpi.java | 54 // RFC 2631 (2.1.2) specifies that the secret should be padded with leading zeros if necessary 138 byte[] secret = bigIntToBytes(result); 140 if (sharedSecret.length - offset < secret.length) 145 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); 147 return secret.length;
|
/external/chromium_org/cloud_print/gcp20/prototype/ |
H A D | x_privet_token_unittest.cc | 20 std::string secret = "E3E92296-E290-4E77-B678-6AEF256C30C8"; local 24 XPrivetToken xtoken(secret, base::Time::FromTimeT(gen_time)); 27 std::string sha1_val = base::SHA1HashString(secret + ":" + issue_time_str); 102 // Tokens with different secret:
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/ |
H A D | _macos.h | 499 #define _MD_SEND(fd,buf,amount,flags,timeout) macsock_send(fd->secret->md.osfd,buf,amount,flags) 500 #define _MD_SENDTO(fd,buf,amount,flags,addr,addrlen,timeout) macsock_sendto(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen) 501 #define _MD_RECV(fd,buf,amount,flags,timeout) macsock_recv(fd->secret->md.osfd,buf,amount,flags) 502 #define _MD_RECVFROM(fd,buf,amount,flags,addr,addrlen,timeout) macsock_recvfrom(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen) 506 #define _MD_ACCEPT(fd,addr,addrlen,timeout) macsock_accept(fd->secret->md.osfd,(struct sockaddr *)addr,addrlen) 507 #define _MD_CONNECT(fd,name,namelen,timeout) macsock_connect(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 508 #define _MD_BIND(fd,name,namelen) macsock_bind(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 509 #define _MD_GETSOCKNAME(fd,name,namelen) macsock_getsockname(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 510 #define _MD_GETPEERNAME(fd,name,namelen) macsock_getpeername(fd->secret->md.osfd,(struct sockaddr *)name,namelen) 511 #define _MD_GETSOCKOPT(fd,level,optname,optval,optlen) macsock_getsockopt(fd->secret [all...] |
/external/ppp/pppd/plugins/radius/ |
H A D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument 492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */ 495 memset (secret, '\0', MAX_SECRET_LENGTH); 501 strncpy (secret, s, (size_t) len); 502 secret[MAX_SECRET_LENGTH] = '\0'; 538 memset (secret, '\0', sizeof (secret));
|
/external/chromium_org/chromeos/cryptohome/ |
H A D | cryptohome_parameters.h | 101 KeyDefinition(const std::string& secret, 113 std::string secret; member in struct:cryptohome::KeyDefinition
|