Searched refs:secret (Results 51 - 75 of 154) sorted by relevance

1234567

/external/ppp/pppd/
H A Dchap_ms.c194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
535 MD4Update(&md4Context, (unsigned char *)secret, mdle
193 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
243 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
322 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
332 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
541 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
555 ChapMS2_NT(char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
576 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
643 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
692 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
807 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
823 ChapMS(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
H A D__init__.py113 provider gives the consumer a *key* and a *secret* with which the consumer
115 key in each request to identify itself, but will use its secret only when
125 secret = None variable in class:Consumer
127 def __init__(self, key, secret):
129 self.secret = secret
131 if self.key is None or self.secret is None:
132 raise ValueError("Key and secret must be set.")
136 'oauth_consumer_secret': self.secret}
145 Tokens in OAuth comprise a *key* and a *secret*
157 secret = None variable in class:Token
[all...]
/external/chromium_org/chrome/browser/signin/
H A Deasy_unlock_auth_attempt.cc21 // Fake secret used to force invalid login.
24 // Decrypts the secret that should be used to login from |wrapped_secret| using
44 std::string secret;
45 if (!encryptor.Decrypt(wrapped_secret, &secret))
48 return secret;
136 // If secret is not set, set it to an arbitrary value, otherwise there will
/external/clang/test/Index/
H A Dannotate-nested-name-specifier.cpp46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
/external/chromium_org/chromeos/login/auth/
H A Dkey.h35 Key(KeyType key_type, const std::string& salt, const std::string& secret);
H A Dkey.cc39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) argument
40 : key_type_(key_type), salt_(salt), secret_(secret) {
85 // plain text secret cannot be reconstructed even if the hashing is
/external/chromium_org/crypto/
H A Dhkdf.h21 // |secret|: the input shared secret (or, from RFC 5869, the IKM).
22 // |salt|: an (optional) public salt / non-secret random value. While
33 // |subkey_secret_bytes_to_generate|: the number of bytes of subkey secret to
35 HKDF(const base::StringPiece& secret,
H A Dhkdf.cc15 HKDF::HKDF(const base::StringPiece& secret, argument
39 result = prk_hmac.Sign(secret, prk, sizeof(prk));
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha256.h23 void tls_prf_sha256(const u8 *secret, size_t secret_len,
/external/chromium_org/chrome/test/ispy/client/
H A Dboto_bucket.py24 def __init__(self, key, secret, bucket_name):
25 """Initializes the bucket with a key, secret, and bucket_name.
29 secret: the API secret to access GS.
33 conn = uri.connect(key, secret)
/external/chromium_org/remoting/webapp/
H A Dthird_party_token_fetcher.js10 * token and a shared secret from a third-party server. The server can then
14 * secret in its fragment. The client then sends only the token to the host.
16 * the token for the shared secret. Once both client and host have the shared
17 * secret, they use a zero-disclosure mutual authentication protocol to
119 // its private key) is called the 'shared secret'.
121 // 'shared secret', along with the 'token' from the redirect URL fragment.
141 // obtain both the code and the shared secret in a single request.
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.c351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument
354 if (secret) {
368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument
400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
410 addr[3] = secret;
423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument
442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
448 addr[1] = secret;
462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument
483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius.c351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument
354 if (secret) {
368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument
400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
410 addr[3] = secret;
423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument
442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
448 addr[1] = secret;
462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument
483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius.c351 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument
354 if (secret) {
368 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
382 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument
400 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
410 addr[3] = secret;
423 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument
442 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
448 addr[1] = secret;
462 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument
483 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) argument
504 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
526 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument
775 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument
824 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument
972 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument
1045 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
1094 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1135 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument
1164 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument
1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1484 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument
[all...]
/external/tcpdump/
H A Dprint-esp.c89 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
134 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0)
205 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
271 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
276 if (i < sizeof(sa->secret)) {
277 memcpy(sa->secret, colon, i);
280 memcpy(sa->secret, colon, sizeof(sa->secret));
281 sa->secretlen = sizeof(sa->secret);
556 u_char *secret; local
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/
H A DKeyAgreementSpi.java54 // RFC 2631 (2.1.2) specifies that the secret should be padded with leading zeros if necessary
138 byte[] secret = bigIntToBytes(result);
140 if (sharedSecret.length - offset < secret.length)
145 System.arraycopy(secret, 0, sharedSecret, offset, secret.length);
147 return secret.length;
/external/chromium_org/cloud_print/gcp20/prototype/
H A Dx_privet_token_unittest.cc20 std::string secret = "E3E92296-E290-4E77-B678-6AEF256C30C8"; local
24 XPrivetToken xtoken(secret, base::Time::FromTimeT(gen_time));
27 std::string sha1_val = base::SHA1HashString(secret + ":" + issue_time_str);
102 // Tokens with different secret:
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/
H A D_macos.h499 #define _MD_SEND(fd,buf,amount,flags,timeout) macsock_send(fd->secret->md.osfd,buf,amount,flags)
500 #define _MD_SENDTO(fd,buf,amount,flags,addr,addrlen,timeout) macsock_sendto(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen)
501 #define _MD_RECV(fd,buf,amount,flags,timeout) macsock_recv(fd->secret->md.osfd,buf,amount,flags)
502 #define _MD_RECVFROM(fd,buf,amount,flags,addr,addrlen,timeout) macsock_recvfrom(fd->secret->md.osfd,buf,amount,flags,(struct sockaddr *)addr,addrlen)
506 #define _MD_ACCEPT(fd,addr,addrlen,timeout) macsock_accept(fd->secret->md.osfd,(struct sockaddr *)addr,addrlen)
507 #define _MD_CONNECT(fd,name,namelen,timeout) macsock_connect(fd->secret->md.osfd,(struct sockaddr *)name,namelen)
508 #define _MD_BIND(fd,name,namelen) macsock_bind(fd->secret->md.osfd,(struct sockaddr *)name,namelen)
509 #define _MD_GETSOCKNAME(fd,name,namelen) macsock_getsockname(fd->secret->md.osfd,(struct sockaddr *)name,namelen)
510 #define _MD_GETPEERNAME(fd,name,namelen) macsock_getpeername(fd->secret->md.osfd,(struct sockaddr *)name,namelen)
511 #define _MD_GETSOCKOPT(fd,level,optname,optval,optlen) macsock_getsockopt(fd->secret
[all...]
/external/ppp/pppd/plugins/radius/
H A Dconfig.c450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
/external/chromium_org/chromeos/cryptohome/
H A Dcryptohome_parameters.h101 KeyDefinition(const std::string& secret,
113 std::string secret; member in struct:cryptohome::KeyDefinition

Completed in 560 milliseconds

1234567