Searched refs:secret (Results 1 - 25 of 95) sorted by relevance

1234

/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/
H A Dhexadecimalencodertest.cc24 std::vector<unsigned char> secret(4);
25 secret[0] = 0xAA;
26 secret[1] = 0xBB;
27 secret[2] = 0xCC;
28 secret[3] = 0xDD;
30 std::string result = encoder.EncodeToString(secret);
38 std::string secret("AABBCCDD");
40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret);
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/
H A Dhexadecimalencoder.cc28 const std::vector<uint8_t>& secret) const {
29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size());
33 const std::string& secret) const {
35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes);
H A Dhexadecimalencoder.h26 // Encodes and decodes secret challenges as hexadecimal strings.
31 const std::vector<uint8_t>& secret) const;
35 const std::string& secret) const;
H A Dsecretencoder.h25 // Encodes and decodes secret challenges. The decoded secret is displayed to the
27 // secret is encoded for transmission on the wire and used for computing pairing
33 // Encodes a byte array representation of a secret to a string.
34 // @param secret the secret bytes
35 // @return a string representation of the given secret
37 const std::vector<uint8_t>& secret) const = 0;
39 // Decodes the string representation of the secret to a byte array.
40 // @param secret
[all...]
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/
H A Dsecretackmessage.cc24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) argument
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage
35 ss << "[SecretAckMessage secret="
H A Dsecretmessage.cc24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) argument
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage
35 ss << "[SecretMessage secret="
H A Dsecretackmessage.h27 // Ack for a secret message.
30 // Creates a new ack for the given secret.
31 // @param secret the secret
32 explicit SecretAckMessage(const std::vector<uint8_t>& secret);
34 // Gets the secret.
35 const std::vector<uint8_t>& secret() const;
H A Dsecretmessage.h27 // Message used to pass the pairing secret. The secret consists of encoded
31 // Creates a new message for the given secret.
32 // @param secret the secret
33 explicit SecretMessage(const std::vector<uint8_t>& secret);
35 // Gets the secret.
36 const std::vector<uint8_t>& secret() const;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
H A DSealedObjectTest.java51 String secret = "secret string";
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string";
77 new SealedObject(secret, null);
96 String secret
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_le
[all...]
/external/ipsec-tools/src/racoon/
H A Dsafefile.c48 safefile(path, secret)
50 int secret;
83 /* secret file should not be read by others */
84 if (secret) {
/external/ppp/pppd/plugins/radius/
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
H A Dauth_tkt.py62 the shared secret, the userid, and the IP address. Optionally you
95 def __init__(self, secret, userid, ip, tokens=(), user_data='',
98 self.secret = secret
119 self.ip, self.time, self.secret, self.userid, self.tokens,
150 def parse_ticket(secret, ticket, ip, digest_algo=DEFAULT_DIGEST):
179 expected = calculate_digest(ip, timestamp, secret,
193 def calculate_digest(ip, timestamp, secret, userid, tokens, user_data,
195 secret = maybe_encode(secret)
[all...]
H A Dcookie.py76 """ returns a 64 byte secret """
77 secret = ''.join(random.sample(_all_chars, 64))
79 secret = secret.encode('utf8')
80 return secret
100 ``secret``
102 This is a secret key if you want to syncronize your keys so
105 the secret key be 64 bytes since this is the block size of
106 the hashing. If you do not provide a secret key, a random
128 def __init__(self, secret
[all...]
/external/boringssl/include/openssl/
H A Dhkdf.h25 /* Computes HKDF (as specified by RFC 5869) of initial keying material |secret|
33 const uint8_t *secret, size_t secret_len,
/external/boringssl/src/include/openssl/
H A Dhkdf.h25 /* Computes HKDF (as specified by RFC 5869) of initial keying material |secret|
33 const uint8_t *secret, size_t secret_len,
/external/ppp/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, (u_char *)secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument

Completed in 1115 milliseconds

1234