HomeSort by relevance Sort by last modified time
    Searched refs:secret (Results 26 - 50 of 72) sorted by null

12 3

  /external/ppp/pppd/
chap_ms.c 194 unsigned char *secret, int secret_len,
219 ChapMS(challenge, (char *)secret, secret_len, &md);
244 unsigned char *secret, int secret_len,
262 (char *)secret, secret_len, &md,
323 unsigned char *challenge, char *secret, int secret_len,
328 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
333 unsigned char *challenge, char *secret, int secret_len,
344 our_name, secret, secret_len,
519 NTPasswordHash(char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE])
535 MD4Update(&md4Context, (unsigned char *)secret, mdlen)
    [all...]
auth.c 766 error("No secret found for PAP login");
1694 char secret[MAXWORDLEN]; local
1744 char secret[MAXWORDLEN]; local
    [all...]
chap-new.c 403 unsigned char secret[MAXSECRETLEN]; local
406 /* Get the secret that the peer is supposed to know */
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
408 error("No CHAP secret found for authenticating %q", name);
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
414 memset(secret, 0, sizeof(secret));
431 char secret[MAXSECRETLEN+1]; local
447 /* get secret for authenticating ourselves with the specified host */
448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 296 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
299 if (secret) {
313 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
327 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
345 hmac_md5(secret, secret_len, msg->buf, msg->buf_used,
348 /* ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) */
355 addr[3] = secret;
368 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
378 addr[1] = secret;
585 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1.h 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
  /external/wpa_supplicant_8/src/radius/
radius.c 337 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
340 if (secret) {
354 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
368 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
386 hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
389 /* ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) */
396 addr[3] = secret;
409 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
419 addr[1] = secret;
622 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
    [all...]
  /external/dbus/dbus/
dbus-keyring.c 2 /* dbus-keyring.c Store secret cookies in your homedir
42 * The secret keys are not kept in locked memory, and are written to a
101 DBusString secret; /**< the actual key */ member in struct:__anon6018
169 _dbus_string_free (&keys[i].secret);
351 if (!_dbus_string_init (&keys[n_keys-1].secret))
363 &keys[n_keys-1].secret,
367 _dbus_string_free (&keys[n_keys-1].secret);
461 _dbus_warn ("Secret keyring file contains non-ASCII! Ignoring existing contents\n");
485 _dbus_verbose ("could not parse secret key ID at start of line\n");
491 _dbus_verbose ("invalid secret key ID at start of line\n")
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
OAuth.php 12 public $secret; variable
14 function __construct($key, $secret, $callback_url=NULL) {
16 $this->secret = $secret; variable
21 return "OAuthConsumer[key=$this->key,secret=$this->secret]";
28 public $secret; variable
32 * secret = the token secret
34 function __construct($key, $secret) {
36 $this->secret = $secret; variable
    [all...]
  /external/clang/test/Index/
annotate-nested-name-specifier.cpp 46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
  /external/ppp/pppd/plugins/radius/
config.c 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret)
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
radius.c 200 * 1 -- we are ALWAYS willing to supply a secret. :-)
344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */
746 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
754 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
810 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
825 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 113 provider gives the consumer a *key* and a *secret* with which the consumer
115 key in each request to identify itself, but will use its secret only when
125 secret = None variable in class:Consumer
127 def __init__(self, key, secret):
129 self.secret = secret
131 if self.key is None or self.secret is None:
132 raise ValueError("Key and secret must be set.")
136 'oauth_consumer_secret': self.secret}
145 Tokens in OAuth comprise a *key* and a *secret*. The key is included i
157 secret = None variable in class:Token
    [all...]
  /external/mdnsresponder/mDNSShared/
dnsextd_lexer.l 67 secret return SECRET;
dnsextd_parser.y 62 char secret[ 256 ];
113 %token SECRET
198 KEY QUOTEDSTRING OBRACE SECRET QUOTEDSTRING SEMICOLON EBRACE
211 strncpy( keySpec->secret, $5, sizeof( keySpec->secret ) );
490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
  /external/mtpd/
l2tp.c 104 static char *secret; variable
270 if (!secret || !vector || length < 2) {
280 MD5_Update(&ctx, secret, secret_length);
288 MD5_Update(&ctx, secret, secret_length);
341 secret = arguments[2];
379 MD5_Update(&ctx, secret, secret_length);
387 if (secret) {
401 if (secret) {
565 .usage = "<server> <port> <secret>",
  /development/samples/ToyVpn/src/com/example/android/toyvpn/
ToyVpnClient.java 40 mSharedSecret = (TextView) findViewById(R.id.secret);
62 .putExtra(prefix + ".SECRET", mSharedSecret.getText().toString());
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha1.h 28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
  /external/oauth/core/src/main/java/net/oauth/signature/
OAuthSignatureMethod.java 92 String secret = accessor.consumer.consumerSecret; local
94 // This code supports the 'Accessor Secret' extensions
102 secret = accessorSecret.toString();
105 if (secret == null) {
106 secret = "";
108 setConsumerSecret(secret);
  /external/openssl/crypto/jpake/
jpake.c 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
    [all...]
jpake.h 60 const BIGNUM *secret);
  /development/samples/ToyVpn/server/linux/
ToyVpnServer.cpp 49 // # Create a server on port 8000 with shared secret "test".
84 static int get_tunnel(char *port, char *secret)
107 // Receive packets till the secret matches.
118 } while (packet[0] != 0 || strcmp(secret, &packet[1]));
165 printf("Usage: %s <tunN> <port> <secret> options...\n"
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data))
194 * @param secret secret
195 * @return H(concat(secret, ":", data));
197 private static String KD(String secret, String data) {
198 return H(secret + ":" + data);
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
  /external/openssh/
auth2-jpake.c 267 * Fetch password hashing scheme, password salt and derive shared secret
276 u_char *secret; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
356 fatal("%s: BN_bin2bn (secret)", __func__);
363 bzero(secret, secret_len);
364 xfree(secret);
  /external/openssl/apps/
apps.h 330 void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
331 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);

Completed in 638 milliseconds

12 3