/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | pairingsession.h | 45 // Waiting for the secret challenge messsage or response from the peer. 77 // Sets the secret entered by the user. This must be invoked when, and only 79 // @return Whether the secret was successfully set. If the given secret is 81 bool SetSecret(const Gamma& secret); 83 // Gets the encoder used for encoding and decoding the secret challenge. This 173 // Verifies that the given secret is correct. 174 bool VerifySecret(const Alpha& secret) const; 177 // Whether to verify the secret ack. This is not currently required since 178 // the ack means the peer already verified the secret [all...] |
/external/mdnsresponder/mDNSShared/ |
H A D | dnsextd_lexer.l | 67 secret return SECRET;
|
H A D | dnsextd_parser.y | 62 char secret[ 256 ]; 211 strncpy( keySpec->secret, $5, sizeof( keySpec->secret ) ); 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
|
/external/mtpd/ |
H A D | l2tp.c | 104 static char *secret; variable 270 if (!secret || !vector || length < 2) { 280 MD5_Update(&ctx, secret, secret_length); 288 MD5_Update(&ctx, secret, secret_length); 341 secret = arguments[2]; 379 MD5_Update(&ctx, secret, secret_length); 387 if (secret) { 401 if (secret) { 565 .usage = "<server> <port> <secret>",
|
/external/ppp/pppd/ |
H A D | auth.c | 766 error("No secret found for PAP login"); 1261 "but I couldn't find any suitable secret (password) for it to use to do so."); 1348 char secret[MAXWORDLEN]; 1380 * Open the file of pap secrets and scan for a suitable secret 1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1393 warn("no PAP secret found for %s", user); 1396 * If the secret is "@login", it means to check 1399 int login_secret = strcmp(secret, "@login") == 0; 1402 /* login option or secret is @login */ 1406 if (secret[ 1694 char secret[MAXWORDLEN]; local 1744 char secret[MAXWORDLEN]; local [all...] |
H A D | chap-new.c | 403 unsigned char secret[MAXSECRETLEN]; local 406 /* Get the secret that the peer is supposed to know */ 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 408 error("No CHAP secret found for authenticating %q", name); 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 414 memset(secret, 0, sizeof(secret)); 431 char secret[MAXSECRETLEN+1]; local 447 /* get secret for authenticating ourselves with the specified host */ 448 if (!get_secret(0, cs->name, rname, secret, [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 12 public $secret; variable 14 function __construct($key, $secret, $callback_url=NULL) { 16 $this->secret = $secret; variable 21 return "OAuthConsumer[key=$this->key,secret=$this->secret]"; 28 public $secret; variable 32 * secret = the token secret 34 function __construct($key, $secret) { 36 $this->secret = $secret; variable [all...] |
/external/chromium_org/chromeos/cryptohome/ |
H A D | cryptohome_parameters.cc | 126 KeyDefinition::KeyDefinition(const std::string& secret, argument 133 secret(secret) { 166 : key(key_def.secret),
|
H A D | homedir_methods.cc | 30 key->set_secret(key_def.secret); 70 KeyAuthorizationSecret* secret = auth_data->add_secrets(); local 71 secret->mutable_usage()->set_encrypt(secret_it->encrypt); 72 secret->mutable_usage()->set_sign(secret_it->sign); 74 secret->set_symmetric_key(secret_it->symmetric_key); 76 secret->set_public_key(secret_it->public_key); 77 secret->set_wrapped(secret_it->wrapped); 345 key_definitions.push_back(KeyDefinition(std::string() /* secret */,
|
/external/chromium_org/remoting/protocol/ |
H A D | authenticator.h | 22 typedef base::Callback<void(const std::string& secret)> SecretFetchedCallback;
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
H A D | PairingSession.java | 59 * The listener implementation is responsible for showing the shared secret 68 * wait for the secret. The listener, or some activity resulting from it, must 69 * publish the input secret to the session via 89 * Controls whether to verify the secret portion of the SecretAck message. 91 * NOTE(mikey): One implementation does not send the secret back in 99 * Timeout, in milliseconds, for polling the secret queue for a response from 181 * Threadsafe queue for receiving the messages sent by peer, user-given secret 271 // Unblock the blocking wait on the secret queue. 451 * Sets the secret, as received from a user. This method is only meaningful 454 * @param secret th 457 setSecret(byte[] secret) argument 693 QueueMessage( PoloMessage message, byte[] secret, PoloException exception) argument 717 QueueMessage(byte[] secret) argument [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/ |
H A D | ProtobufWireAdapter.java | 424 PoloProto.Secret secret = new PoloProto.Secret(); 425 secret.secret = poloMessage.getSecret(); 426 return secret; 434 secretAck.secret = poloMessage.getSecret(); 542 return new SecretMessage(protoMessage.secret); 549 return new SecretAckMessage(protoMessage.secret);
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
H A D | OAuthSignatureMethod.java | 92 String secret = accessor.consumer.consumerSecret; 102 secret = accessorSecret.toString(); 105 if (secret == null) { 106 secret = ""; 108 setConsumerSecret(secret);
|
/external/openssl/crypto/jpake/ |
H A D | jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 77 const BIGNUM *secret) 84 ctx->secret = BN_dup(secret); 105 BN_clear_free(ctx->secret); 117 const BIGNUM *secret) 121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 398 BN_sub(t2, ctx->p.q, ctx->secret); 74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument 115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument [all...] |
H A D | jpake.h | 60 const BIGNUM *secret);
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/ |
H A D | XmlMessageBuilder.java | 96 private static final String MESSAGE_CONTAINER_NAME_SECRET = "secret"; 346 String secret; 348 secret = body.getJSONObject(MESSAGE_CONTAINER_NAME_SECRET) 353 byte[] secretBytes = PoloUtil.hexStringToBytes(secret); 562 JSONObject secret = new JSONObject(); 564 secret.put(SECRET_FIELD_SECRET, bytesStr); 565 jsonObj.put(MESSAGE_CONTAINER_NAME_SECRET, secret);
|
/external/chromium_org/components/gcm_driver/ |
H A D | gcm_client_impl.cc | 219 : android_id(0), secret(0), accounts_set(false) { 237 secret = 0; 309 device_checkin_info_.secret = result->device_security_token; 374 device_checkin_info_.secret = checkin_info.secret; 379 checkin_info.android_id, checkin_info.secret, 398 device_checkin_info_.secret); 465 device_checkin_info_.secret, 496 checkin_info.secret = checkin_response.security_token(); 505 DCHECK_EQ(device_checkin_info_.secret, checkin_inf [all...] |
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | MessageDigestAlgorithm.java | 191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data)) 194 * @param secret secret 195 * @return H(concat(secret, ":", data)); 197 private static String KD(String secret, String data) { argument 198 return H(secret + ":" + data);
|
/external/chromium_org/chrome/browser/chromeos/login/supervised/ |
H A D | supervised_user_authentication.cc | 299 ac::chrome::managedaccounts::account::Secret secret; local 300 secret.set_revision(revision); 301 secret.set_secret(password); 303 if (!secret.SerializeToString(&buffer))
|
/external/chromium_org/ipc/ |
H A D | ipc_channel_win.h | 54 int32* secret); 94 // Determines if we should validate a client's secret on connection.
|
/external/chromium_org/remoting/client/jni/ |
H A D | chromoting_jni_runtime.h | 84 const std::string& secret);
|
/external/chromium_org/remoting/host/ |
H A D | pairing_registry_delegate_win.cc | 193 // Read the shared secret. 195 scoped_ptr<base::DictionaryValue> secret = ReadValue(privileged_, local 197 if (!secret) 201 pairing->MergeDictionary(secret.get()); 217 // Extract the shared secret to a separate dictionary.
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | derive.c | 48 * SSL Key generation given pre master secret 82 unsigned int macSize; /* size of MAC secret */ 347 SECItem secret ; local 350 secret.type = siBuffer; 358 secret.data = &key_block[i]; 359 secret.len = effKeySize; 363 status = TLS_PRF(&secret, "client write key", &crsr, &keyblk, isFIPS); 377 secret.data = &key_block[i]; 378 secret.len = effKeySize; 382 status = TLS_PRF(&secret, "serve [all...] |
/external/chromium_org/chrome/browser/signin/ |
H A D | screenlock_bridge.h | 128 const std::string& secret,
|
/external/chromium_org/chrome/browser/ui/webui/signin/ |
H A D | user_manager_screen_handler.h | 64 const std::string& secret,
|