/external/openssl/crypto/jpake/ |
jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 77 const BIGNUM *secret) 84 ctx->secret = BN_dup(secret); 105 BN_clear_free(ctx->secret); 117 const BIGNUM *secret) 121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 398 BN_sub(t2, ctx->p.q, ctx->secret); [all...] |
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 51 String secret = "secret string"; local 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; local 77 new SealedObject(secret, null); 96 String secret = "secret string" local 114 String secret = "secret string"; local 142 String secret = "secret string"; local 177 String secret = "secret string"; local 216 String secret = "secret string"; local [all...] |
/external/clang/test/Index/ |
annotate-nested-name-specifier.cpp | 46 namespace secret { namespace in namespace:outer::inner 51 using namespace outer_alias::inner::secret; 52 namespace super_secret = outer_alias::inner::secret; 238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15 248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 68 String secret = "secret string"; local 69 SealedObject so = new SealedObject(secret, new NullCipher()); 78 assertEquals("The secret content of deserialized object " 79 + "should be equal to the secret content of initial object", 80 secret, so_des.getObject(new NullCipher())); 92 String secret = "secret string"; local 94 new SealedObject(secret, null); 109 SealedObject so = new SealedObject(secret, cipher) 134 String secret = "secret string"; local 152 String secret = "secret string"; local 180 String secret = "secret string"; local 224 String secret = "secret string"; local 269 String secret = "secret string"; local [all...] |
/external/chromium/net/base/ |
nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 191 struct PRFilePrivate *secret = fd->secret; local 192 memio_buffer_destroy(&secret->readbuf); 193 memio_buffer_destroy(&secret->writebuf); 194 free(secret); 212 struct PRFilePrivate *secret; local 221 secret = fd->secret; 222 mb = &secret->readbuf 245 struct PRFilePrivate *secret; local 274 struct PRFilePrivate *secret = fd->secret; local 356 struct PRFilePrivate *secret; local 374 struct PRFilePrivate *secret = memiofd->secret; local 381 struct PRFilePrivate *secret = memiofd->secret; local [all...] |
/external/dbus/dbus/ |
dbus-keyring.c | 2 /* dbus-keyring.c Store secret cookies in your homedir 42 * The secret keys are not kept in locked memory, and are written to a 101 DBusString secret; /**< the actual key */ member in struct:__anon5448 169 _dbus_string_free (&keys[i].secret); 351 if (!_dbus_string_init (&keys[n_keys-1].secret)) 363 &keys[n_keys-1].secret, 367 _dbus_string_free (&keys[n_keys-1].secret); 461 _dbus_warn ("Secret keyring file contains non-ASCII! Ignoring existing contents\n"); 485 _dbus_verbose ("could not parse secret key ID at start of line\n"); 491 _dbus_verbose ("invalid secret key ID at start of line\n") [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
OAuthSignatureMethod.java | 92 String secret = accessor.consumer.consumerSecret; local 94 // This code supports the 'Accessor Secret' extensions 102 secret = accessorSecret.toString(); 105 if (secret == null) { 106 secret = ""; 108 setConsumerSecret(secret);
|
/external/ppp/pppd/ |
chap-new.c | 403 unsigned char secret[MAXSECRETLEN]; local 406 /* Get the secret that the peer is supposed to know */ 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 408 error("No CHAP secret found for authenticating %q", name); 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 414 memset(secret, 0, sizeof(secret)); 431 char secret[MAXSECRETLEN+1]; local 447 /* get secret for authenticating ourselves with the specified host */ 448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) [all...] |
eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 103 { "srp-pn-secret", o_string, &pn_secret, 104 "Long term pseudonym generation secret" }, 312 * Set DES key according to pseudonym-generating secret and current 1319 char secret[MAXWORDLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
auth.c | 766 error("No secret found for PAP login"); 1694 char secret[MAXWORDLEN]; local 1744 char secret[MAXWORDLEN]; local [all...] |
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); [all...] |
radiusclient.h | 358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
/external/tcpdump/ |
print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret = NULL [all...] |
/external/chromium/chrome/browser/password_manager/ |
native_backend_gnome_x.cc | 194 if (data->secret) { 195 form->password_value = UTF8ToUTF16(data->secret); 597 char* secret = gnome_keyring_item_info_get_secret(info); local 598 if (secret) { 599 method->password_ = UTF8ToUTF16(secret); 601 // of the secret, so we have to free it afterward. 602 free(secret); [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 113 provider gives the consumer a *key* and a *secret* with which the consumer 115 key in each request to identify itself, but will use its secret only when 125 secret = None variable in class:Consumer 127 def __init__(self, key, secret): 129 self.secret = secret 131 if self.key is None or self.secret is None: 132 raise ValueError("Key and secret must be set.") 136 'oauth_consumer_secret': self.secret} 145 Tokens in OAuth comprise a *key* and a *secret*. The key is included i 157 secret = None variable in class:Token [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_xauth.h | 130 vchar_t *secret; member in struct:rad_serv
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 1133 const u8 *secret; local 1136 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1138 if (secret == NULL) { 1139 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1158 os_memcpy(data->shared_secret, secret, secret_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 1134 const u8 *secret; local 1137 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1139 if (secret == NULL) { 1140 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1159 os_memcpy(data->shared_secret, secret, secret_len);
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
OAuth.php | 12 public $secret; variable 14 function __construct($key, $secret, $callback_url=NULL) { 16 $this->secret = $secret; variable 21 return "OAuthConsumer[key=$this->key,secret=$this->secret]"; 28 public $secret; variable 32 * secret = the token secret 34 function __construct($key, $secret) { 36 $this->secret = $secret; variable [all...] |
/external/mtpd/ |
l2tp.c | 104 static char *secret; variable 270 if (!secret || !vector || length < 2) { 280 MD5_Update(&ctx, secret, secret_length); 288 MD5_Update(&ctx, secret, secret_length); 341 secret = arguments[2]; 379 MD5_Update(&ctx, secret, secret_length); 387 if (secret) { 401 if (secret) { 565 .usage = "<server> <port> <secret>",
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/util/ |
FormatterTest.java | 151 private File secret; field in class:FormatterTest [all...] |