/dalvik/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 40 return "secret";
|
/development/tools/apkcheck/src/com/android/apkcheck/ |
ApiDescrHandler.java | 103 * also already have the "secret" first parameter
|
/external/clearsilver/cs/ |
test.hdf | 17 UrlArg = Secret Password~!@#$%^&*()+=-_|\[]{}:";'<>,.?
|
/external/ipsec-tools/src/racoon/ |
plainrsa-gen.8 | 88 This is the secret
|
handler.h | 152 vchar_t *dhgxy; /* DH; shared secret */ 297 vchar_t *dhgxy; /* DH; shared secret */
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_write.c | 288 "memory for secret (Diffie-Hellman)"); 305 conn->dh_secret[0] = 0; /* make sure secret < p */ 315 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH server's secret value", 318 /* Ys = g^secret mod p */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 1133 const u8 *secret; local 1136 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1138 if (secret == NULL) { 1139 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1158 os_memcpy(data->shared_secret, secret, secret_len);
|
/external/openssl/apps/ |
apps.h | 342 void jpake_client_auth(BIO *out, BIO *conn, const char *secret); 343 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
/external/openssl/crypto/evp/ |
digest.c | 327 /* The caller can assume that this removes any secret data from the context */ 336 /* The caller can assume that this removes any secret data from the context */
|
/external/openssl/include/openssl/ |
tls1.h | 382 #define TLS_MD_MASTER_SECRET_CONST "master secret" 401 #define TLS_MD_MASTER_SECRET_CONST "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74" /*master secret*/
|
dh.h | 85 * modular exponentiation for secret exponents
|
/external/openssl/ssl/ |
tls1.h | 382 #define TLS_MD_MASTER_SECRET_CONST "master secret" 401 #define TLS_MD_MASTER_SECRET_CONST "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74" /*master secret*/
|
/external/tcpdump/ |
sctpConstants.h | 438 /* This is how long a secret lives, NOT how long a cookie lives */ 439 #define SCTP_HOW_LONG_COOKIE_LIVE 3600 /* how many seconds the current secret will live */
|
/external/wpa_supplicant/ |
common.h | 342 * like wpa_hexdump(), but by default, does not include secret keys (passwords, 375 * default, does not include secret keys (passwords, etc.) in debug output.
|
tls_gnutls.c | 43 /* GnuTLS 1.3.2 added functions for using master secret. Older versions require 124 /* Session keys generated in the current phase for inner secret 1110 "inner secret: %s", 1304 wpa_printf(MSG_DEBUG, "%s: Failed to permute inner secret: %s", [all...] |
/bionic/libc/bionic/ |
arc4random.c | 26 * which is a trade secret). The same algorithm is used as a stream
|
/cts/tests/tests/text/src/android/text/util/cts/ |
Rfc822TokenTest.java | 133 comment = "secret";
|
/dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionImpl.java | 148 * Master secret
|
/external/e2fsprogs/lib/ext2fs/ |
dirhash.c | 181 * The seed is an 4 longword (32 bits) "secret" which can be used to
|
/external/openssl/crypto/dh/ |
dh.h | 85 * modular exponentiation for secret exponents
|
dh_key.c | 143 l = dh->length ? dh->length : BN_num_bits(dh->p)-1; /* secret exponent length */
|
/external/openssl/crypto/rsa/ |
rsa_lib.c | 204 /* if PRNG is not properly seeded, resort to secret
|
/external/webkit/WebKit/gtk/webkit/ |
webkitprivate.h | 26 * This file knows the shared secret of WebKitWebView, WebKitWebFrame,
|
/external/webkit/WebKit/mac/Carbon/ |
CarbonWindowFrame.m | 40 @interface NSView(Secret)
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 47 /* GnuTLS 1.3.2 added functions for using master secret. Older versions require 128 /* Session keys generated in the current phase for inner secret 1176 "inner secret: %s", [all...] |