HomeSort by relevance Sort by last modified time
    Searched refs:shared_secret (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/chromium_org/remoting/client/plugin/
pepper_token_fetcher.cc 33 const std::string& token, const std::string& shared_secret) {
35 token_fetched_callback_.Run(token, shared_secret);
pepper_token_fetcher.h 31 const std::string& shared_secret);
  /external/chromium_org/remoting/protocol/
it2me_host_authenticator_factory.cc 17 const std::string& shared_secret)
20 shared_secret_(shared_secret) {
third_party_client_authenticator.h 24 // request a |token| and |shared_secret| from that url. If the server requires
27 // to the host, and uses the |shared_secret| to create an underlying
35 // directly to the host. |shared_secret| should be used by the client to
37 // an empty |token| and |shared_secret|.
40 const std::string& shared_secret)> TokenFetchedCallback;
73 const std::string& shared_secret);
third_party_client_authenticator.cc 68 const std::string& shared_secret) {
70 if (token_.empty() || shared_secret.empty()) {
76 shared_secret, MESSAGE_READY);
v2_authenticator.h 28 const std::string& shared_secret,
34 const std::string& shared_secret,
52 const std::string& shared_secret,
third_party_host_authenticator.cc 78 const std::string& shared_secret) {
79 if (shared_secret.empty()) {
89 local_cert_, key_pair_, shared_secret, WAITING_MESSAGE);
auth_util.h 49 const base::StringPiece& shared_secret);
authentication_method.cc 55 const std::string& shared_secret) {
58 return shared_secret;
68 if (!response.Sign(shared_secret, out_bytes, sizeof(out_bytes))) {
77 return shared_secret;
it2me_host_authenticator_factory.h 29 const std::string& shared_secret);
auth_util.cc 46 const base::StringPiece& shared_secret) {
63 if (!response.Sign(shared_secret, out_bytes, kAuthDigestLength)) {
negotiating_client_authenticator.h 29 const std::string& shared_secret,
63 // |shared_secret|, then runs |resume_callback|.
67 const std::string& shared_secret);
third_party_host_authenticator.h 25 // validate it, and exchange it for a |shared_secret|. Once the |TokenValidator|
26 // returns, the host uses the |shared_secret| to create an underlying
33 // authentication finishes. |shared_secret| should be used by the host to
35 // an empty |shared_secret|.
37 const std::string& shared_secret)> TokenValidatedCallback;
41 // Validates |token| with the server and exchanges it for a |shared_secret|.
87 const std::string& shared_secret);
pairing_registry.cc 35 const std::string& shared_secret)
39 shared_secret_(shared_secret) {
49 std::string shared_secret; local
53 &shared_secret)) {
56 return Pairing(created_time, client_name, client_id, shared_secret);
67 std::string shared_secret; local
68 pairing.GetString(kSharedSecretKey, &shared_secret);
70 return Pairing(created_time, client_name, client_id, shared_secret);
82 if (!shared_secret().empty())
83 pairing->SetString(kSharedSecretKey, shared_secret());
    [all...]
  /external/openssh/
kexdhc.c 50 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
123 if ((shared_secret = BN_new()) == NULL)
125 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
139 shared_secret,
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
159 BN_clear_free(shared_secret);
kexdhs.c 53 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
116 if ((shared_secret = BN_new()) == NULL)
118 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
134 shared_secret,
165 kex_derive_keys(kex, hash, hashlen, shared_secret);
166 BN_clear_free(shared_secret);
kexecdhc.c 55 BIGNUM *shared_secret; local
121 if ((shared_secret = BN_new()) == NULL)
123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
139 shared_secret,
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
159 BN_clear_free(shared_secret);
kexecdhs.c 57 BIGNUM *shared_secret; local
103 /* Calculate shared_secret */
113 if ((shared_secret = BN_new()) == NULL)
115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL)
132 shared_secret,
163 kex_derive_keys(kex, hash, hashlen, shared_secret);
164 BN_clear_free(shared_secret);
kexgexc.c 52 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local
161 if ((shared_secret = BN_new()) == NULL)
163 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
183 shared_secret,
203 kex_derive_keys(kex, hash, hashlen, shared_secret);
204 BN_clear_free(shared_secret);
kexgexs.c 56 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local
153 if ((shared_secret = BN_new()) == NULL)
155 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL)
177 shared_secret,
209 kex_derive_keys(kex, hash, hashlen, shared_secret);
210 BN_clear_free(shared_secret);
kexdh.c 49 BIGNUM *shared_secret,
72 buffer_put_bignum2(&b, shared_secret);
  /external/chromium_org/remoting/host/
token_validator_factory_impl_unittest.cc 40 void SuccessCallback(const std::string& shared_secret) {
41 EXPECT_FALSE(shared_secret.empty());
45 void FailureCallback(const std::string& shared_secret) {
46 EXPECT_TRUE(shared_secret.empty());
50 void DeleteOnFailureCallback(const std::string& shared_secret) {
51 EXPECT_TRUE(shared_secret.empty());
69 response_dict.SetString("token_type", "shared_secret");
token_validator_factory_impl.cc 63 const std::string& shared_secret)>& on_token_validated) OVERRIDE {
150 std::string shared_secret; local
152 dict->GetStringWithoutPathExpansion("access_token", &shared_secret);
153 return shared_secret;
162 base::Callback<void(const std::string& shared_secret)> on_token_validated_;
  /external/wpa_supplicant_8/src/radius/
radius_das.h 32 const u8 *shared_secret; member in struct:radius_das_conf
radius_client.h 39 * shared_secret - Shared secret for authenticating RADIUS messages
41 u8 *shared_secret; member in struct:hostapd_radius_server
44 * shared_secret_len - Length of shared_secret in octets
241 const u8 *shared_secret, size_t shared_secret_len,

Completed in 227 milliseconds

1 2 3