/external/chromium_org/remoting/client/ |
H A D | token_fetcher_proxy.cc | 30 const std::string& token, const std::string& shared_secret) { 32 token_fetched_callback_.Run(token, shared_secret); 29 OnTokenFetched( const std::string& token, const std::string& shared_secret) argument
|
/external/chromium_org/remoting/protocol/ |
H A D | it2me_host_authenticator_factory.cc | 17 const std::string& shared_secret) 20 shared_secret_(shared_secret) { 14 It2MeHostAuthenticatorFactory( const std::string& local_cert, scoped_refptr<RsaKeyPair> key_pair, const std::string& shared_secret) argument
|
H A D | third_party_client_authenticator.h | 24 // request a |token| and |shared_secret| from that url. If the server requires 27 // to the host, and uses the |shared_secret| to create an underlying 35 // directly to the host. |shared_secret| should be used by the client to 37 // an empty |token| and |shared_secret|. 40 const std::string& shared_secret)> TokenFetchedCallback; 73 const std::string& shared_secret);
|
H A D | third_party_client_authenticator.cc | 68 const std::string& shared_secret) { 70 if (token_.empty() || shared_secret.empty()) { 76 shared_secret, MESSAGE_READY); 65 OnThirdPartyTokenFetched( const base::Closure& resume_callback, const std::string& third_party_token, const std::string& shared_secret) argument
|
H A D | v2_authenticator.h | 28 const std::string& shared_secret, 34 const std::string& shared_secret, 53 const std::string& shared_secret,
|
H A D | third_party_host_authenticator.cc | 79 const std::string& shared_secret) { 80 if (shared_secret.empty()) { 90 local_cert_, key_pair_, shared_secret, WAITING_MESSAGE); 76 OnThirdPartyTokenValidated( const buzz::XmlElement* message, const base::Closure& resume_callback, const std::string& shared_secret) argument
|
H A D | auth_util.h | 49 const base::StringPiece& shared_secret);
|
H A D | authentication_method.cc | 55 const std::string& shared_secret) { 58 return shared_secret; 68 if (!response.Sign(shared_secret, out_bytes, sizeof(out_bytes))) { 77 return shared_secret; 52 ApplyHashFunction( HashFunction hash_function, const std::string& tag, const std::string& shared_secret) argument
|
H A D | it2me_host_authenticator_factory.h | 29 const std::string& shared_secret);
|
H A D | token_validator.h | 26 // authentication finishes. |shared_secret| should be used by the host to 28 // an empty |shared_secret|. 30 const std::string& shared_secret)> TokenValidatedCallback; 34 // Validates |token| with the server and exchanges it for a |shared_secret|.
|
H A D | auth_util.cc | 44 const base::StringPiece& shared_secret) { 61 if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) { 42 GetAuthBytes(net::SSLSocket* socket, const base::StringPiece& label, const base::StringPiece& shared_secret) argument
|
H A D | negotiating_client_authenticator.h | 29 const std::string& shared_secret, 63 // |shared_secret|, then runs |resume_callback|. 67 const std::string& shared_secret);
|
H A D | pairing_registry.cc | 35 const std::string& shared_secret) 39 shared_secret_(shared_secret) { 49 std::string shared_secret; local 53 &shared_secret); local 54 return Pairing(created_time, client_name, client_id, shared_secret); 65 std::string shared_secret; local 66 pairing.GetString(kSharedSecretKey, &shared_secret); 68 return Pairing(created_time, client_name, client_id, shared_secret); 80 if (!shared_secret().empty()) 81 pairing->SetString(kSharedSecretKey, shared_secret()); 32 Pairing(const base::Time& created_time, const std::string& client_name, const std::string& client_id, const std::string& shared_secret) argument [all...] |
/external/chromium_org/remoting/host/ |
H A D | token_validator_factory_impl_unittest.cc | 74 void SuccessCallback(const std::string& shared_secret) { argument 75 EXPECT_FALSE(shared_secret.empty()); 79 void FailureCallback(const std::string& shared_secret) { argument 80 EXPECT_TRUE(shared_secret.empty()); 84 void DeleteOnFailureCallback(const std::string& shared_secret) { argument 85 EXPECT_TRUE(shared_secret.empty()); 108 response_dict.SetString("token_type", "shared_secret");
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.h | 39 const u8 *shared_secret; member in struct:radius_das_conf
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.h | 39 const u8 *shared_secret; member in struct:radius_das_conf
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.h | 39 const u8 *shared_secret; member in struct:radius_das_conf
|
H A D | radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|
H A D | radius_das.c | 21 u8 *shared_secret; member in struct:radius_das_data 223 if (radius_msg_verify_das_req(msg, das->shared_secret, 287 if (radius_msg_finish_das_resp(reply, das->shared_secret, 342 if (conf->port == 0 || conf->shared_secret == NULL || 358 das->shared_secret = os_malloc(conf->shared_secret_len); 359 if (das->shared_secret == NULL) { 363 os_memcpy(das->shared_secret, conf->shared_secret, 395 os_free(das->shared_secret);
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/gdocs/ |
H A D | chrome_ex_oauthsimple.js | 46 * shared_secret is the shared secret (duh). 48 * Both the api_key and shared_secret are generally provided by the site 65 shared_secret:'xyz-5309' 79 * @param shared_secret (string) The shared secret. This value is also usually provided by the site you wish to use. 81 OAuthSimple = function (consumer_key,shared_secret) 85 if (shared_secret == undefined) 86 throw("Missing argument: shared_secret (shared secret) for OAuthSimple. This is usually provided by the hosting site."); 94 if (shared_secret !== undefined) { 95 this._secrets['shared_secret'] = shared_secret; [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
H A D | chrome_ex_oauthsimple.js | 46 * shared_secret is the shared secret (duh). 48 * Both the api_key and shared_secret are generally provided by the site 65 shared_secret:'xyz-5309' 79 * @param shared_secret (string) The shared secret. This value is also usually provided by the site you wish to use. 81 OAuthSimple = function (consumer_key,shared_secret) 85 if (shared_secret == undefined) 86 throw("Missing argument: shared_secret (shared secret) for OAuthSimple. This is usually provided by the hosting site."); 94 if (shared_secret !== undefined) { 95 this._secrets['shared_secret'] = shared_secret; [all...] |