/external/chromium_org/remoting/client/plugin/ |
pepper_token_fetcher.cc | 33 const std::string& token, const std::string& shared_secret) { 35 token_fetched_callback_.Run(token, shared_secret);
|
pepper_token_fetcher.h | 31 const std::string& shared_secret);
|
/external/chromium_org/remoting/protocol/ |
it2me_host_authenticator_factory.cc | 17 const std::string& shared_secret) 20 shared_secret_(shared_secret) {
|
third_party_client_authenticator.h | 24 // request a |token| and |shared_secret| from that url. If the server requires 27 // to the host, and uses the |shared_secret| to create an underlying 35 // directly to the host. |shared_secret| should be used by the client to 37 // an empty |token| and |shared_secret|. 40 const std::string& shared_secret)> TokenFetchedCallback; 73 const std::string& shared_secret);
|
third_party_client_authenticator.cc | 68 const std::string& shared_secret) { 70 if (token_.empty() || shared_secret.empty()) { 76 shared_secret, MESSAGE_READY);
|
v2_authenticator.h | 28 const std::string& shared_secret, 34 const std::string& shared_secret, 52 const std::string& shared_secret,
|
third_party_host_authenticator.cc | 78 const std::string& shared_secret) { 79 if (shared_secret.empty()) { 89 local_cert_, key_pair_, shared_secret, WAITING_MESSAGE);
|
auth_util.h | 49 const base::StringPiece& shared_secret);
|
authentication_method.cc | 55 const std::string& shared_secret) { 58 return shared_secret; 68 if (!response.Sign(shared_secret, out_bytes, sizeof(out_bytes))) { 77 return shared_secret;
|
it2me_host_authenticator_factory.h | 29 const std::string& shared_secret);
|
auth_util.cc | 46 const base::StringPiece& shared_secret) { 63 if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) {
|
negotiating_client_authenticator.h | 29 const std::string& shared_secret, 63 // |shared_secret|, then runs |resume_callback|. 67 const std::string& shared_secret);
|
third_party_host_authenticator.h | 25 // validate it, and exchange it for a |shared_secret|. Once the |TokenValidator| 26 // returns, the host uses the |shared_secret| to create an underlying 33 // authentication finishes. |shared_secret| should be used by the host to 35 // an empty |shared_secret|. 37 const std::string& shared_secret)> TokenValidatedCallback; 41 // Validates |token| with the server and exchanges it for a |shared_secret|. 87 const std::string& shared_secret);
|
pairing_registry.cc | 35 const std::string& shared_secret) 39 shared_secret_(shared_secret) { 49 std::string shared_secret; local 53 &shared_secret)) { 56 return Pairing(created_time, client_name, client_id, shared_secret); 67 std::string shared_secret; local 68 pairing.GetString(kSharedSecretKey, &shared_secret); 70 return Pairing(created_time, client_name, client_id, shared_secret); 82 if (!shared_secret().empty()) 83 pairing->SetString(kSharedSecretKey, shared_secret()); [all...] |
/external/openssh/ |
kexdhc.c | 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 123 if ((shared_secret = BN_new()) == NULL) 125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexdhs.c | 53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 116 if ((shared_secret = BN_new()) == NULL) 118 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 134 shared_secret, 165 kex_derive_keys(kex, hash, hashlen, shared_secret); 166 BN_clear_free(shared_secret);
|
kexecdhc.c | 55 BIGNUM *shared_secret; local 121 if ((shared_secret = BN_new()) == NULL) 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
kexecdhs.c | 57 BIGNUM *shared_secret; local 103 /* Calculate shared_secret */ 113 if ((shared_secret = BN_new()) == NULL) 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 132 shared_secret, 163 kex_derive_keys(kex, hash, hashlen, shared_secret); 164 BN_clear_free(shared_secret);
|
kexgexc.c | 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 161 if ((shared_secret = BN_new()) == NULL) 163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 183 shared_secret, 203 kex_derive_keys(kex, hash, hashlen, shared_secret); 204 BN_clear_free(shared_secret);
|
kexgexs.c | 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 153 if ((shared_secret = BN_new()) == NULL) 155 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 177 shared_secret, 209 kex_derive_keys(kex, hash, hashlen, shared_secret); 210 BN_clear_free(shared_secret);
|
kexdh.c | 49 BIGNUM *shared_secret, 72 buffer_put_bignum2(&b, shared_secret);
|
/external/chromium_org/remoting/host/ |
token_validator_factory_impl_unittest.cc | 40 void SuccessCallback(const std::string& shared_secret) { 41 EXPECT_FALSE(shared_secret.empty()); 45 void FailureCallback(const std::string& shared_secret) { 46 EXPECT_TRUE(shared_secret.empty()); 50 void DeleteOnFailureCallback(const std::string& shared_secret) { 51 EXPECT_TRUE(shared_secret.empty()); 69 response_dict.SetString("token_type", "shared_secret");
|
token_validator_factory_impl.cc | 63 const std::string& shared_secret)>& on_token_validated) OVERRIDE { 150 std::string shared_secret; local 152 dict->GetStringWithoutPathExpansion("access_token", &shared_secret); 153 return shared_secret; 162 base::Callback<void(const std::string& shared_secret)> on_token_validated_;
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.h | 32 const u8 *shared_secret; member in struct:radius_das_conf
|
radius_client.h | 39 * shared_secret - Shared secret for authenticating RADIUS messages 41 u8 *shared_secret; member in struct:hostapd_radius_server 44 * shared_secret_len - Length of shared_secret in octets 241 const u8 *shared_secret, size_t shared_secret_len,
|