/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
H A D | hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); 25 secret[0] = 0xAA; 26 secret[1] = 0xBB; 27 secret[2] = 0xCC; 28 secret[3] = 0xDD; 30 std::string result = encoder.EncodeToString(secret); 38 std::string secret("AABBCCDD"); 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret);
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
H A D | hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); 33 const std::string& secret) const { 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes);
|
H A D | hexadecimalencoder.h | 26 // Encodes and decodes secret challenges as hexadecimal strings. 31 const std::vector<uint8_t>& secret) const; 35 const std::string& secret) const;
|
H A D | secretencoder.h | 25 // Encodes and decodes secret challenges. The decoded secret is displayed to the 27 // secret is encoded for transmission on the wire and used for computing pairing 33 // Encodes a byte array representation of a secret to a string. 34 // @param secret the secret bytes 35 // @return a string representation of the given secret 37 const std::vector<uint8_t>& secret) const = 0; 39 // Decodes the string representation of the secret to a byte array. 40 // @param secret [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
H A D | secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) argument 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
H A D | secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) argument 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
H A D | secretackmessage.h | 27 // Ack for a secret message. 30 // Creates a new ack for the given secret. 31 // @param secret the secret 32 explicit SecretAckMessage(const std::vector<uint8_t>& secret); 34 // Gets the secret. 35 const std::vector<uint8_t>& secret() const;
|
H A D | secretmessage.h | 27 // Message used to pass the pairing secret. The secret consists of encoded 31 // Creates a new message for the given secret. 32 // @param secret the secret 33 explicit SecretMessage(const std::vector<uint8_t>& secret); 35 // Gets the secret. 36 const std::vector<uint8_t>& secret() const;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
H A D | SealedObjectTest.java | 51 String secret = "secret string"; 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; 77 new SealedObject(secret, null); 96 String secret [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/external/ppp/pppd/plugins/radius/ |
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | auth_tkt.py | 62 the shared secret, the userid, and the IP address. Optionally you 95 def __init__(self, secret, userid, ip, tokens=(), user_data='', 98 self.secret = secret 119 self.ip, self.time, self.secret, self.userid, self.tokens, 150 def parse_ticket(secret, ticket, ip, digest_algo=DEFAULT_DIGEST): 179 expected = calculate_digest(ip, timestamp, secret, 193 def calculate_digest(ip, timestamp, secret, userid, tokens, user_data, 195 secret = maybe_encode(secret) [all...] |
H A D | cookie.py | 76 """ returns a 64 byte secret """ 77 secret = ''.join(random.sample(_all_chars, 64)) 79 secret = secret.encode('utf8') 80 return secret 100 ``secret`` 102 This is a secret key if you want to syncronize your keys so 105 the secret key be 64 bytes since this is the block size of 106 the hashing. If you do not provide a secret key, a random 128 def __init__(self, secret [all...] |
/external/boringssl/include/openssl/ |
H A D | hkdf.h | 25 /* Computes HKDF (as specified by RFC 5869) of initial keying material |secret| 33 const uint8_t *secret, size_t secret_len,
|
/external/boringssl/src/include/openssl/ |
H A D | hkdf.h | 25 /* Computes HKDF (as specified by RFC 5869) of initial keying material |secret| 33 const uint8_t *secret, size_t secret_len,
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, (u_char *)secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|