Searched refs:secret (Results 76 - 100 of 154) sorted by relevance

1234567

/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dpairingsession.h45 // Waiting for the secret challenge messsage or response from the peer.
77 // Sets the secret entered by the user. This must be invoked when, and only
79 // @return Whether the secret was successfully set. If the given secret is
81 bool SetSecret(const Gamma& secret);
83 // Gets the encoder used for encoding and decoding the secret challenge. This
173 // Verifies that the given secret is correct.
174 bool VerifySecret(const Alpha& secret) const;
177 // Whether to verify the secret ack. This is not currently required since
178 // the ack means the peer already verified the secret
[all...]
/external/mdnsresponder/mDNSShared/
H A Ddnsextd_lexer.l67 secret return SECRET;
H A Ddnsextd_parser.y62 char secret[ 256 ];
211 strncpy( keySpec->secret, $5, sizeof( keySpec->secret ) );
490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
/external/mtpd/
H A Dl2tp.c104 static char *secret; variable
270 if (!secret || !vector || length < 2) {
280 MD5_Update(&ctx, secret, secret_length);
288 MD5_Update(&ctx, secret, secret_length);
341 secret = arguments[2];
379 MD5_Update(&ctx, secret, secret_length);
387 if (secret) {
401 if (secret) {
565 .usage = "<server> <port> <secret>",
/external/ppp/pppd/
H A Dauth.c766 error("No secret found for PAP login");
1261 "but I couldn't find any suitable secret (password) for it to use to do so.");
1348 char secret[MAXWORDLEN];
1380 * Open the file of pap secrets and scan for a suitable secret
1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1393 warn("no PAP secret found for %s", user);
1396 * If the secret is "@login", it means to check
1399 int login_secret = strcmp(secret, "@login") == 0;
1402 /* login option or secret is @login */
1406 if (secret[
1694 char secret[MAXWORDLEN]; local
1744 char secret[MAXWORDLEN]; local
[all...]
H A Dchap-new.c403 unsigned char secret[MAXSECRETLEN]; local
406 /* Get the secret that the peer is supposed to know */
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
408 error("No CHAP secret found for authenticating %q", name);
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
414 memset(secret, 0, sizeof(secret));
431 char secret[MAXSECRETLEN+1]; local
447 /* get secret for authenticating ourselves with the specified host */
448 if (!get_secret(0, cs->name, rname, secret,
[all...]
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
H A DOAuth.php12 public $secret; variable
14 function __construct($key, $secret, $callback_url=NULL) {
16 $this->secret = $secret; variable
21 return "OAuthConsumer[key=$this->key,secret=$this->secret]";
28 public $secret; variable
32 * secret = the token secret
34 function __construct($key, $secret) {
36 $this->secret = $secret; variable
[all...]
/external/chromium_org/chromeos/cryptohome/
H A Dcryptohome_parameters.cc126 KeyDefinition::KeyDefinition(const std::string& secret, argument
133 secret(secret) {
166 : key(key_def.secret),
H A Dhomedir_methods.cc30 key->set_secret(key_def.secret);
70 KeyAuthorizationSecret* secret = auth_data->add_secrets(); local
71 secret->mutable_usage()->set_encrypt(secret_it->encrypt);
72 secret->mutable_usage()->set_sign(secret_it->sign);
74 secret->set_symmetric_key(secret_it->symmetric_key);
76 secret->set_public_key(secret_it->public_key);
77 secret->set_wrapped(secret_it->wrapped);
345 key_definitions.push_back(KeyDefinition(std::string() /* secret */,
/external/chromium_org/remoting/protocol/
H A Dauthenticator.h22 typedef base::Callback<void(const std::string& secret)> SecretFetchedCallback;
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
H A DPairingSession.java59 * The listener implementation is responsible for showing the shared secret
68 * wait for the secret. The listener, or some activity resulting from it, must
69 * publish the input secret to the session via
89 * Controls whether to verify the secret portion of the SecretAck message.
91 * NOTE(mikey): One implementation does not send the secret back in
99 * Timeout, in milliseconds, for polling the secret queue for a response from
181 * Threadsafe queue for receiving the messages sent by peer, user-given secret
271 // Unblock the blocking wait on the secret queue.
451 * Sets the secret, as received from a user. This method is only meaningful
454 * @param secret th
457 setSecret(byte[] secret) argument
693 QueueMessage( PoloMessage message, byte[] secret, PoloException exception) argument
717 QueueMessage(byte[] secret) argument
[all...]
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/
H A DProtobufWireAdapter.java424 PoloProto.Secret secret = new PoloProto.Secret();
425 secret.secret = poloMessage.getSecret();
426 return secret;
434 secretAck.secret = poloMessage.getSecret();
542 return new SecretMessage(protoMessage.secret);
549 return new SecretAckMessage(protoMessage.secret);
/external/oauth/core/src/main/java/net/oauth/signature/
H A DOAuthSignatureMethod.java92 String secret = accessor.consumer.consumerSecret;
102 secret = accessorSecret.toString();
105 if (secret == null) {
106 secret = "";
108 setConsumerSecret(secret);
/external/openssl/crypto/jpake/
H A Djpake.c27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
[all...]
H A Djpake.h60 const BIGNUM *secret);
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/
H A DXmlMessageBuilder.java96 private static final String MESSAGE_CONTAINER_NAME_SECRET = "secret";
346 String secret;
348 secret = body.getJSONObject(MESSAGE_CONTAINER_NAME_SECRET)
353 byte[] secretBytes = PoloUtil.hexStringToBytes(secret);
562 JSONObject secret = new JSONObject();
564 secret.put(SECRET_FIELD_SECRET, bytesStr);
565 jsonObj.put(MESSAGE_CONTAINER_NAME_SECRET, secret);
/external/chromium_org/components/gcm_driver/
H A Dgcm_client_impl.cc219 : android_id(0), secret(0), accounts_set(false) {
237 secret = 0;
309 device_checkin_info_.secret = result->device_security_token;
374 device_checkin_info_.secret = checkin_info.secret;
379 checkin_info.android_id, checkin_info.secret,
398 device_checkin_info_.secret);
465 device_checkin_info_.secret,
496 checkin_info.secret = checkin_response.security_token();
505 DCHECK_EQ(device_checkin_info_.secret, checkin_inf
[all...]
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DMessageDigestAlgorithm.java191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data))
194 * @param secret secret
195 * @return H(concat(secret, ":", data));
197 private static String KD(String secret, String data) { argument
198 return H(secret + ":" + data);
/external/chromium_org/chrome/browser/chromeos/login/supervised/
H A Dsupervised_user_authentication.cc299 ac::chrome::managedaccounts::account::Secret secret; local
300 secret.set_revision(revision);
301 secret.set_secret(password);
303 if (!secret.SerializeToString(&buffer))
/external/chromium_org/ipc/
H A Dipc_channel_win.h54 int32* secret);
94 // Determines if we should validate a client's secret on connection.
/external/chromium_org/remoting/client/jni/
H A Dchromoting_jni_runtime.h84 const std::string& secret);
/external/chromium_org/remoting/host/
H A Dpairing_registry_delegate_win.cc193 // Read the shared secret.
195 scoped_ptr<base::DictionaryValue> secret = ReadValue(privileged_, local
197 if (!secret)
201 pairing->MergeDictionary(secret.get());
217 // Extract the shared secret to a separate dictionary.
/external/chromium_org/net/third_party/nss/ssl/
H A Dderive.c48 * SSL Key generation given pre master secret
82 unsigned int macSize; /* size of MAC secret */
347 SECItem secret ; local
350 secret.type = siBuffer;
358 secret.data = &key_block[i];
359 secret.len = effKeySize;
363 status = TLS_PRF(&secret, "client write key", &crsr, &keyblk, isFIPS);
377 secret.data = &key_block[i];
378 secret.len = effKeySize;
382 status = TLS_PRF(&secret, "serve
[all...]
/external/chromium_org/chrome/browser/signin/
H A Dscreenlock_bridge.h128 const std::string& secret,
/external/chromium_org/chrome/browser/ui/webui/signin/
H A Duser_manager_screen_handler.h64 const std::string& secret,

Completed in 7706 milliseconds

1234567