/external/chromium_org/net/base/ |
H A D | nss_memio.h | 58 int memio_GetReadRequest(memio_Private *secret); 64 int memio_GetReadParams(memio_Private *secret, char **buf); 69 int memio_GetReadableBufferSize(memio_Private *secret); 79 void memio_PutReadResult(memio_Private *secret, int bytes_read); 86 int memio_GetWriteParams(memio_Private *secret, 96 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
|
H A D | nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 196 struct PRFilePrivate *secret = fd->secret; local 197 memio_buffer_destroy(&secret->readbuf); 198 memio_buffer_destroy(&secret->writebuf); 199 free(secret); 217 struct PRFilePrivate *secret; local 226 secret = fd->secret; 227 mb = &secret 261 struct PRFilePrivate *secret; local 295 struct PRFilePrivate *secret = fd->secret; local 377 struct PRFilePrivate *secret; local 395 struct PRFilePrivate *secret = memiofd->secret; local 402 struct PRFilePrivate *secret = memiofd->secret; local 406 memio_GetReadRequest(memio_Private *secret) argument 411 memio_GetReadParams(memio_Private *secret, char **buf) argument 420 memio_GetReadableBufferSize(memio_Private *secret) argument 428 memio_PutReadResult(memio_Private *secret, int bytes_read) argument 445 memio_GetWriteParams(memio_Private *secret, const char **buf1, unsigned int *len1, const char **buf2, unsigned int *len2) argument 462 memio_PutWriteResult(memio_Private *secret, int bytes_written) argument [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
H A D | hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); 25 secret[0] = 0xAA; 26 secret[1] = 0xBB; 27 secret[2] = 0xCC; 28 secret[3] = 0xDD; 30 std::string result = encoder.EncodeToString(secret); 38 std::string secret("AABBCCDD"); 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret);
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
H A D | hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); 33 const std::string& secret) const { 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes);
|
H A D | hexadecimalencoder.h | 26 // Encodes and decodes secret challenges as hexadecimal strings. 31 const std::vector<uint8_t>& secret) const; 35 const std::string& secret) const;
|
H A D | secretencoder.h | 25 // Encodes and decodes secret challenges. The decoded secret is displayed to the 27 // secret is encoded for transmission on the wire and used for computing pairing 33 // Encodes a byte array representation of a secret to a string. 34 // @param secret the secret bytes 35 // @return a string representation of the given secret 37 const std::vector<uint8_t>& secret) const = 0; 39 // Decodes the string representation of the secret to a byte array. 40 // @param secret [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
H A D | secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) argument 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
H A D | secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) argument 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
H A D | secretackmessage.h | 27 // Ack for a secret message. 30 // Creates a new ack for the given secret. 31 // @param secret the secret 32 explicit SecretAckMessage(const std::vector<uint8_t>& secret); 34 // Gets the secret. 35 const std::vector<uint8_t>& secret() const;
|
H A D | secretmessage.h | 27 // Message used to pass the pairing secret. The secret consists of encoded 31 // Creates a new message for the given secret. 32 // @param secret the secret 33 explicit SecretMessage(const std::vector<uint8_t>& secret); 35 // Gets the secret. 36 const std::vector<uint8_t>& secret() const;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
H A D | SealedObjectTest.java | 51 String secret = "secret string"; 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; 77 new SealedObject(secret, null); 96 String secret [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | MacTest.java | 31 final String secret = "-HMAC-test1"; 42 SecretKey key1 = engine.getSecretKeyById(secret, "HmacSHA256"); 43 SecretKey key1dupe = engine.getSecretKeyById(secret, "HmacSHA256"); 46 SecretKey key2 = new SecretKeySpec(secret.getBytes(), "HmacSHA256"); 54 assertEquals(Arrays.toString(secret.getBytes()), Arrays.toString(key2.getEncoded()));
|
/external/ipsec-tools/src/racoon/ |
H A D | safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/external/ppp/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 217 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 219 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 221 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 224 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 226 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 229 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 231 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 239 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 250 const u8 *secret, size_ [all...] |