HomeSort by relevance Sort by last modified time
    Searched refs:secret (Results 1 - 25 of 72) sorted by null

1 2 3

  /external/chromium/net/base/
nss_memio.h 58 int memio_GetReadParams(memio_Private *secret, char **buf);
68 void memio_PutReadResult(memio_Private *secret, int bytes_read);
74 void memio_GetWriteParams(memio_Private *secret,
84 void memio_PutWriteResult(memio_Private *secret, int bytes_written);
nss_memio.c 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret->readbuf
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
chap.c 22 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
30 addr[1] = secret;
chap.h 20 void chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
23 addr[1] = secret;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 51 String secret = "secret string"; local
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string"; local
77 new SealedObject(secret, null);
96 String secret = "secret string" local
114 String secret = "secret string"; local
142 String secret = "secret string"; local
177 String secret = "secret string"; local
216 String secret = "secret string"; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A)
    [all...]
sha1-tlsprf.c 18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label,
61 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
67 S1 = secret;
68 S2 = secret + L_S1;
sha256.h 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
PRF.java 68 * @param secret: the buffer containing the secret value to generate prf.
71 static synchronized void computePRF_SSLv3(byte[] out, byte[] secret, byte[] seed) {
82 sha.update(secret);
84 md5.update(secret);
100 * @param secret: the buffer containing the secret value to generate prf.
104 synchronized static void computePRF(byte[] out, byte[] secret,
124 if ((secret == null) || (secret.length == 0))
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 68 String secret = "secret string"; local
69 SealedObject so = new SealedObject(secret, new NullCipher());
78 assertEquals("The secret content of deserialized object "
79 + "should be equal to the secret content of initial object",
80 secret, so_des.getObject(new NullCipher()));
92 String secret = "secret string"; local
94 new SealedObject(secret, null);
109 SealedObject so = new SealedObject(secret, cipher)
134 String secret = "secret string"; local
152 String secret = "secret string"; local
180 String secret = "secret string"; local
224 String secret = "secret string"; local
269 String secret = "secret string"; local
    [all...]
  /external/ipsec-tools/src/racoon/
safefile.c 48 safefile(path, secret)
50 int secret;
83 /* secret file should not be read by others */
84 if (secret) {
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
    [all...]
  /external/ppp/pppd/
chap-md5.c 58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
chap-new.h 102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
  /external/openssl/crypto/jpake/
jpaketest.c 120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
  /external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/extensions/wave/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius.h 191 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
193 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
195 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
203 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
206 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
214 const u8 *secret, size_t secret_len);
217 const u8 *secret, size_t secret_len);
220 const u8 *secret, size_t secret_len,
226 const u8 *secret, size_t secret_len);
230 const u8 *secret, size_t secret_len
    [all...]
  /external/tcpdump/
print-esp.c 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret = NULL
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.h 210 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
212 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
214 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
222 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
225 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
233 const u8 *secret, size_t secret_len);
236 const u8 *secret, size_t secret_len);
239 const u8 *secret, size_t secret_len,
245 const u8 *secret, size_t secret_len);
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/
KeyAgreement.java 176 byte[] secret = engineGenerateSecret();
178 if (sharedSecret.length - offset < secret.length)
180 throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes");
183 System.arraycopy(secret, 0, sharedSecret, offset, secret.length);
185 return secret.length;
192 byte[] secret = bigIntToBytes(result);
204 // DHKDFParameters params = new DHKDFParameters(new DERObjectIdentifier(algorithm), keySize, secret);
209 // secret = keyBytes;
217 return new SecretKeySpec(secret, algorithm)
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCEDHKeyAgreement.java 123 byte[] secret = bigIntToBytes(result);
125 if (sharedSecret.length - offset < secret.length)
130 System.arraycopy(secret, 0, sharedSecret, offset, secret.length);
132 return secret.length;

Completed in 1198 milliseconds

1 2 3