HomeSort by relevance Sort by last modified time
    Searched defs:secret (Results 1 - 25 of 29) sorted by null

1 2

  /external/openssl/crypto/jpake/
jpaketest.c 120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
jpake.c 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
    [all...]
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 51 String secret = "secret string"; local
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string"; local
77 new SealedObject(secret, null);
96 String secret = "secret string" local
114 String secret = "secret string"; local
142 String secret = "secret string"; local
177 String secret = "secret string"; local
216 String secret = "secret string"; local
    [all...]
  /external/clang/test/Index/
annotate-nested-name-specifier.cpp 46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
  /external/chromium/net/base/
nss_memio.c 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret->readbuf
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
    [all...]
  /external/dbus/dbus/
dbus-keyring.c 2 /* dbus-keyring.c Store secret cookies in your homedir
42 * The secret keys are not kept in locked memory, and are written to a
101 DBusString secret; /**< the actual key */ member in struct:__anon6550
169 _dbus_string_free (&keys[i].secret);
351 if (!_dbus_string_init (&keys[n_keys-1].secret))
363 &keys[n_keys-1].secret,
367 _dbus_string_free (&keys[n_keys-1].secret);
461 _dbus_warn ("Secret keyring file contains non-ASCII! Ignoring existing contents\n");
485 _dbus_verbose ("could not parse secret key ID at start of line\n");
491 _dbus_verbose ("invalid secret key ID at start of line\n")
    [all...]
  /external/oauth/core/src/main/java/net/oauth/signature/
OAuthSignatureMethod.java 92 String secret = accessor.consumer.consumerSecret; local
94 // This code supports the 'Accessor Secret' extensions
102 secret = accessorSecret.toString();
105 if (secret == null) {
106 secret = "";
108 setConsumerSecret(secret);
  /external/openssh/
auth2-jpake.c 267 * Fetch password hashing scheme, password salt and derive shared secret
276 u_char *secret; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
356 fatal("%s: BN_bin2bn (secret)", __func__);
363 bzero(secret, secret_len);
364 xfree(secret);
sshconnect2.c 988 u_char *secret; local
1010 &secret, &secret_len) != 0)
1018 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL)
1019 fatal("%s: BN_bin2bn (secret)", __func__);
1020 bzero(secret, secret_len);
1021 xfree(secret);
1055 /* Obtain password and derive secret */
    [all...]
  /external/ppp/pppd/
chap-new.c 403 unsigned char secret[MAXSECRETLEN]; local
406 /* Get the secret that the peer is supposed to know */
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
408 error("No CHAP secret found for authenticating %q", name);
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
414 memset(secret, 0, sizeof(secret));
431 char secret[MAXSECRETLEN+1]; local
447 /* get secret for authenticating ourselves with the specified host */
448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0))
    [all...]
eap.c 83 static char *pn_secret = NULL; /* Pseudonym generating secret */
103 { "srp-pn-secret", o_string, &pn_secret,
104 "Long term pseudonym generation secret" },
312 * Set DES key according to pseudonym-generating secret and current
1319 char secret[MAXWORDLEN]; local
1729 char secret[MAXSECRETLEN]; local
    [all...]
auth.c 766 error("No secret found for PAP login");
1694 char secret[MAXWORDLEN]; local
1744 char secret[MAXWORDLEN]; local
    [all...]
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
    [all...]
radiusclient.h 358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
  /external/tcpdump/
print-esp.c 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret = NULL
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 71 String secret = "secret string"; local
72 SealedObject so = new SealedObject(secret, new NullCipher());
81 assertEquals("The secret content of deserialized object "
82 + "should be equal to the secret content of initial object",
83 secret, so_des.getObject(new NullCipher()));
95 String secret = "secret string"; local
97 new SealedObject(secret, null);
112 SealedObject so = new SealedObject(secret, cipher)
137 String secret = "secret string"; local
155 String secret = "secret string"; local
183 String secret = "secret string"; local
227 String secret = "secret string"; local
272 String secret = "secret string"; local
    [all...]
  /external/chromium/chrome/browser/password_manager/
native_backend_gnome_x.cc 194 if (data->secret) {
195 form->password_value = UTF8ToUTF16(data->secret);
597 char* secret = gnome_keyring_item_info_get_secret(info); local
598 if (secret) {
599 method->password_ = UTF8ToUTF16(secret);
601 // of the secret, so we have to free it afterward.
602 free(secret);
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 113 provider gives the consumer a *key* and a *secret* with which the consumer
115 key in each request to identify itself, but will use its secret only when
125 secret = None variable in class:Consumer
127 def __init__(self, key, secret):
129 self.secret = secret
131 if self.key is None or self.secret is None:
132 raise ValueError("Key and secret must be set.")
136 'oauth_consumer_secret': self.secret}
145 Tokens in OAuth comprise a *key* and a *secret*. The key is included i
157 secret = None variable in class:Token
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 1133 const u8 *secret; local
1136 secret = data->get_shared_secret(data->cb_ctx, data->IDr,
1138 if (secret == NULL) {
1139 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - "
1158 os_memcpy(data->shared_secret, secret, secret_len);
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 1128 const u8 *secret; local
1131 secret = data->get_shared_secret(data->cb_ctx, data->IDr,
1133 if (secret == NULL) {
1134 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - "
1153 os_memcpy(data->shared_secret, secret, secret_len);
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
OAuth.php 12 public $secret; variable
14 function __construct($key, $secret, $callback_url=NULL) {
16 $this->secret = $secret; variable
21 return "OAuthConsumer[key=$this->key,secret=$this->secret]";
28 public $secret; variable
32 * secret = the token secret
34 function __construct($key, $secret) {
36 $this->secret = $secret; variable
    [all...]
  /external/mtpd/
l2tp.c 104 static char *secret; variable
270 if (!secret || !vector || length < 2) {
280 MD5_Update(&ctx, secret, secret_length);
288 MD5_Update(&ctx, secret, secret_length);
341 secret = arguments[2];
379 MD5_Update(&ctx, secret, secret_length);
387 if (secret) {
401 if (secret) {
565 .usage = "<server> <port> <secret>",
  /external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/util/
FormatterTest.java 151 private File secret; field in class:FormatterTest
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 569 char *secret; local
571 secret = os_strchr(val, ' ');
572 if (secret == NULL)
575 secret++;
581 bss->radius_das_shared_secret = (u8 *) os_strdup(secret);
584 bss->radius_das_shared_secret_len = os_strlen(secret);
    [all...]
  /tools/motodev/src/plugins/android/
commons-net-1.4.1.jar 

Completed in 874 milliseconds

1 2