/external/chromium/net/base/ |
nss_memio.h | 58 int memio_GetReadParams(memio_Private *secret, char **buf); 68 void memio_PutReadResult(memio_Private *secret, int bytes_read); 74 void memio_GetWriteParams(memio_Private *secret, 84 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
|
nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 191 struct PRFilePrivate *secret = fd->secret; local 192 memio_buffer_destroy(&secret->readbuf); 193 memio_buffer_destroy(&secret->writebuf); 194 free(secret); 212 struct PRFilePrivate *secret; local 221 secret = fd->secret; 222 mb = &secret->readbuf 245 struct PRFilePrivate *secret; local 274 struct PRFilePrivate *secret = fd->secret; local 356 struct PRFilePrivate *secret; local 374 struct PRFilePrivate *secret = memiofd->secret; local 381 struct PRFilePrivate *secret = memiofd->secret; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
chap.c | 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 30 addr[1] = secret;
|
chap.h | 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 29 addr[1] = secret;
|
chap.h | 20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 51 String secret = "secret string"; local 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; local 77 new SealedObject(secret, null); 96 String secret = "secret string" local 114 String secret = "secret string"; local 142 String secret = "secret string"; local 177 String secret = "secret string"; local 216 String secret = "secret string"; local [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
PRF.java | 68 * @param secret: the buffer containing the secret value to generate prf. 71 static synchronized void computePRF_SSLv3(byte[] out, byte[] secret, byte[] seed) { 82 sha.update(secret); 84 md5.update(secret); 100 * @param secret: the buffer containing the secret value to generate prf. 104 synchronized static void computePRF(byte[] out, byte[] secret, 124 if ((secret == null) || (secret.length == 0)) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 68 String secret = "secret string"; local 69 SealedObject so = new SealedObject(secret, new NullCipher()); 78 assertEquals("The secret content of deserialized object " 79 + "should be equal to the secret content of initial object", 80 secret, so_des.getObject(new NullCipher())); 92 String secret = "secret string"; local 94 new SealedObject(secret, null); 109 SealedObject so = new SealedObject(secret, cipher) 134 String secret = "secret string"; local 152 String secret = "secret string"; local 180 String secret = "secret string"; local 224 String secret = "secret string"; local 269 String secret = "secret string"; local [all...] |
/external/ipsec-tools/src/racoon/ |
safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); [all...] |
/external/ppp/pppd/ |
chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len);
|
chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
chap_ms.c | 194 unsigned char *secret, int secret_len, 219 ChapMS(challenge, (char *)secret, secret_len, &md); 244 unsigned char *secret, int secret_len, 262 (char *)secret, secret_len, &md, 323 unsigned char *challenge, char *secret, int secret_len, 328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 333 unsigned char *challenge, char *secret, int secret_len, 344 our_name, secret, secret_len, 519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) 535 MD4Update(&md4Context, (unsigned char *)secret, mdlen) [all...] |
/external/openssl/crypto/jpake/ |
jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
chrome_ex_oauth.js | 14 * @param {String} consumer_secret The OAuth consumer secret. 59 * "consumer_secret" {String} OAuth consumer secret. 96 * secret {String} The OAuth access token secret. 102 window.chromeExOAuthOnAuthorize = function(token, secret) { 103 callback(token, secret); 172 var secret = this.getTokenSecret(); 173 if (!token || !secret) { 174 throw new Error("No oauth token or token secret"); 186 oauth_secret : secret, [all...] |
/external/tcpdump/ |
print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret = NULL [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-tlsprf.c | 25 * @secret: Key for PRF 37 int tls_prf(const u8 *secret, size_t secret_len, const char *label, 68 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 69 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 74 S1 = secret; 75 S2 = secret + L_S1;
|
/external/wpa_supplicant/ |
radius.h | 206 int radius_msg_finish(struct radius_msg *msg, u8 *secret, size_t secret_len); 207 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 209 void radius_msg_finish_acct(struct radius_msg *msg, u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 u8 *secret, size_t secret_len); 231 u8 *secret, size_t secret_len); 234 const u8 *secret, size_t secret_len, 240 u8 *secret, size_t secret_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.h | 210 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 212 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 214 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 222 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 225 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 233 const u8 *secret, size_t secret_len); 236 const u8 *secret, size_t secret_len); 239 const u8 *secret, size_t secret_len, 245 const u8 *secret, size_t secret_len);
|
/external/wpa_supplicant_8/src/radius/ |
radius.h | 196 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 198 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 200 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 208 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 211 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 219 const u8 *secret, size_t secret_len); 222 const u8 *secret, size_t secret_len); 225 const u8 *secret, size_t secret_len, 231 const u8 *secret, size_t secret_len);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
KeyAgreement.java | 176 byte[] secret = engineGenerateSecret(); 178 if (sharedSecret.length - offset < secret.length) 180 throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); 183 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); 185 return secret.length; 192 byte[] secret = bigIntToBytes(result); 204 // DHKDFParameters params = new DHKDFParameters(new DERObjectIdentifier(algorithm), keySize, secret); 209 // secret = keyBytes; 217 return new SecretKeySpec(secret, algorithm) [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEDHKeyAgreement.java | 123 byte[] secret = bigIntToBytes(result); 125 if (sharedSecret.length - offset < secret.length) 130 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); 132 return secret.length;
|