HomeSort by relevance Sort by last modified time
    Searched full:secret (Results 1 - 25 of 529) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/hostapd/
hostapd.radius_clients 2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
  /external/wpa_supplicant_8/src/crypto/
sha256-tlsprf.c 17 * @secret: Key for PRF
29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A)
    [all...]
sha1-tlsprf.c 18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label,
61 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
67 S1 = secret;
68 S2 = secret + L_S1;
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 51 String secret = "secret string"; local
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string"; local
77 new SealedObject(secret, null);
96 String secret = "secret string" local
114 String secret = "secret string"; local
142 String secret = "secret string"; local
177 String secret = "secret string"; local
216 String secret = "secret string"; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 11 psk="secret passphrase"
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
PRF.java 68 * @param secret: the buffer containing the secret value to generate prf.
71 static synchronized void computePRF_SSLv3(byte[] out, byte[] secret, byte[] seed) {
82 sha.update(secret);
84 md5.update(secret);
100 * @param secret: the buffer containing the secret value to generate prf.
104 synchronized static void computePRF(byte[] out, byte[] secret,
124 if ((secret == null) || (secret.length == 0))
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 71 String secret = "secret string"; local
72 SealedObject so = new SealedObject(secret, new NullCipher());
81 assertEquals("The secret content of deserialized object "
82 + "should be equal to the secret content of initial object",
83 secret, so_des.getObject(new NullCipher()));
95 String secret = "secret string"; local
97 new SealedObject(secret, null);
112 SealedObject so = new SealedObject(secret, cipher)
137 String secret = "secret string"; local
155 String secret = "secret string"; local
183 String secret = "secret string"; local
227 String secret = "secret string"; local
272 String secret = "secret string"; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
CipherKeyGenerator.java 6 * The base class for symmetric, or secret, cipher key generators.
26 * generate a secret key.
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
23 addr[1] = secret;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /libcore/luni/src/main/java/javax/crypto/
SecretKeyFactorySpi.java 37 * Generate a secret key from the specified key specification.
41 * @return a secret key.
44 * a secret key.
50 * Returns the key specification of the specified secret key.
53 * the secret key to get the specification from.
58 * if the specified secret key cannot be transformed into the
66 * Translates the specified secret key into an instance of the corresponding
70 * the secret key to translate.
SecretKeyFactory.java 33 * Secret key factories provide the following functionality:
64 * the algorithm name for the secret key.
74 * Returns the name of the secret key algorithm.
76 * @return the name of the secret key algorithm.
97 * @return a secret key factory for the specified key algorithm.
121 * @return a secret key factory for the specified key algorithm from the
152 * @return a secret key factory for the specified key algorithm from the
175 * Generate a secret key from the specified key specification.
179 * @return a secret key.
182 * a secret key
    [all...]
KeyAgreementSpi.java 60 * Generates the shared secret.
62 * @return the generated shared secret.
70 * Generates the shared secret and stores it into the buffer {@code
74 * the buffer to store the shared secret.
81 * if the specified buffer is too small for the shared secret.
87 * Generates the shared secret.
91 * @return the shared secret as a {@code SecretKey} of the specified
96 * if the specified algorithm for the secret key does not
100 * created using the generated shared secret.
  /external/chromium/net/base/
nss_memio.c 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret->readbuf
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
    [all...]
  /external/openssl/crypto/jpake/
jpaketest.c 120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
  /external/wpa_supplicant_8/src/radius/
radius.h 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
228 const u8 *secret, size_t secret_len);
231 const u8 *secret, size_t secret_len)
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/
README 9 developer OAuth access token, and its token secret, respectively.
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/agreement/
ECDHBasicAgreement.java 14 * ECSVDP-DH is Elliptic Curve Secret Value Derivation Primitive,
16 * and [Kob87]. This primitive derives a shared secret value from one
20 * primitive can be invoked by a scheme to derive a shared secret key;
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_shared_secret.c 21 Create a DSA shared secret between two keys
25 @param out [out] Destination of the shared secret
26 @param outlen [in/out] The max size and resulting size of the shared secret
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyRepTypeTest.java 54 assertEquals(KeyRep.Type.SECRET, KeyRep.Type.valueOf(KeyRep.Type.SECRET
62 KeyRep.Type[] types = new KeyRep.Type[] { KeyRep.Type.SECRET,
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/dh/
DhGroupExchange.java 35 /* Shared secret */
65 * @return Returns the shared secret k.
70 throw new IllegalStateException("Shared secret not yet known, need f first!");
76 * Sets f and calculates the shared secret.
  /external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/extensions/wave/
chrome_ex_oauth.js 14 * @param {String} consumer_secret The OAuth consumer secret.
59 * "consumer_secret" {String} OAuth consumer secret.
96 * secret {String} The OAuth access token secret.
102 window.chromeExOAuthOnAuthorize = function(token, secret) {
103 callback(token, secret);
172 var secret = this.getTokenSecret();
173 if (!token || !secret) {
174 throw new Error("No oauth token or token secret");
186 oauth_secret : secret,
    [all...]

Completed in 785 milliseconds

1 2 3 4 5 6 7 8 91011>>