HomeSort by relevance Sort by last modified time
    Searched defs:secret (Results 1 - 25 of 42) sorted by null

1 2

  /external/chromium_org/cloud_print/gcp20/prototype/
x_privet_token_unittest.cc 20 std::string secret = "E3E92296-E290-4E77-B678-6AEF256C30C8"; local
24 XPrivetToken xtoken(secret, base::Time::FromTimeT(gen_time));
27 std::string sha1_val = base::SHA1HashString(secret + ":" + issue_time_str);
102 // Tokens with different secret:
  /external/chromium_org/net/spdy/
spdy_credential_builder.cc 33 std::string secret = SpdyCredentialBuilder::GetCredentialSecret(tls_unique); local
61 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()),
62 secret.length(), &der_signature);
80 std::string secret(prefix, arraysize(prefix));
81 secret.append(tls_unique);
83 return secret;
spdy_credential_builder_unittest.cc 142 std::string secret = GetCredentialSecret(); local
143 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()),
144 secret.length(), &proof_data);
  /external/chromium_org/crypto/
ec_signature_creator_nss.cc 73 SECItem secret; local
74 secret.type = siBuffer;
75 secret.len = data_len;
76 secret.data = const_cast<unsigned char*>(data);
84 // Sign the secret data and save it to |result|.
86 SignData(&result, &secret, key_->key(), HASH_AlgSHA256, &signature_len_);
  /external/chromium_org/third_party/openssl/openssl/crypto/jpake/
jpaketest.c 120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
jpake.c 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
    [all...]
  /external/openssl/crypto/jpake/
jpaketest.c 120 BIGNUM *secret = BN_new(); local
150 BN_rand(secret, 32, -1, 0);
153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
167 BN_add_word(secret, 1);
168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
172 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
179 BN_free(secret);
jpake.c 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
    [all...]
  /external/chromium_org/sync/util/
cryptographer_unittest.cc 198 const char secret[] = "secret"; local
200 EXPECT_TRUE(other_cryptographer.EncryptString(secret, &encrypted));
  /cts/tests/tests/security/jni/
android_security_cts_NativeCodeTest.cpp 79 static int secret; variable
91 secret = 0xbaadadd4;
120 syscall(__NR_ptrace, PTRACE_PEEKDATA, child, &secret, addr);
129 syscall(__NR_ptrace, PTRACE_PEEKDATA, child, &secret, addr2);
  /external/chromium_org/remoting/host/
pairing_registry_delegate_win.cc 180 // Read the shared secret.
182 scoped_ptr<base::DictionaryValue> secret = ReadValue(privileged_, local
184 if (!secret)
188 pairing->MergeDictionary(secret.get());
204 // Extract the shared secret to a separate dictionary.
  /external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
SealedObjectTest.java 51 String secret = "secret string"; local
52 SealedObject so = new SealedObject(secret, new NullCipher());
61 assertEquals("The secret content of deserialized object "
62 + "should be equal to the secret content of initial object",
63 secret, so_des.getObject(new NullCipher()));
75 String secret = "secret string"; local
77 new SealedObject(secret, null);
96 String secret = "secret string" local
114 String secret = "secret string"; local
142 String secret = "secret string"; local
177 String secret = "secret string"; local
216 String secret = "secret string"; local
    [all...]
  /external/chromium_org/ipc/
ipc_channel_win.cc 162 int32 secret; local
163 failed = it.ReadInt(&secret) ? (secret != client_secret_) : true;
186 const std::string& channel_id, int32* secret) {
189 // Prevent the shared secret from ending up in the pipe name.
192 if (secret) // Retrieve the secret if asked for.
193 base::StringToInt(channel_id.substr(index + 1), secret);
198 if (secret)
199 *secret = 0
276 int32 secret = validate_client_ ? 0 : client_secret_; local
508 int secret; local
    [all...]
  /external/clang/test/Index/
annotate-nested-name-specifier.cpp 46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
  /libcore/crypto/src/test/java/org/conscrypt/
MacTest.java 31 final String secret = "-HMAC-test1"; local
42 SecretKey key1 = engine.getSecretKeyById(secret, "HmacSHA256");
43 SecretKey key1dupe = engine.getSecretKeyById(secret, "HmacSHA256");
46 SecretKey key2 = new SecretKeySpec(secret.getBytes(), "HmacSHA256");
54 assertEquals(Arrays.toString(secret.getBytes()), Arrays.toString(key2.getEncoded()));
  /external/chromium/net/base/
nss_memio.c 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
191 struct PRFilePrivate *secret = fd->secret; local
192 memio_buffer_destroy(&secret->readbuf);
193 memio_buffer_destroy(&secret->writebuf);
194 free(secret);
212 struct PRFilePrivate *secret; local
221 secret = fd->secret;
222 mb = &secret->readbuf
245 struct PRFilePrivate *secret; local
274 struct PRFilePrivate *secret = fd->secret; local
356 struct PRFilePrivate *secret; local
374 struct PRFilePrivate *secret = memiofd->secret; local
381 struct PRFilePrivate *secret = memiofd->secret; local
    [all...]
  /external/chromium_org/chrome/browser/net/gaia/
gaia_oauth_fetcher.cc 113 "anonymous", // consumer secret
115 oauth1_access_token_secret, // token secret
132 "anonymous", // consumer secret
134 "", // token secret
156 "anonymous", // consumer secret
158 oauth1_access_token_secret, // token secret
193 std::string* secret) {
209 secret->assign(decoded);
350 const std::string& secret) {
367 secret,
465 std::string secret; local
    [all...]
  /external/chromium_org/net/base/
nss_memio.c 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points
195 struct PRFilePrivate *secret = fd->secret; local
196 memio_buffer_destroy(&secret->readbuf);
197 memio_buffer_destroy(&secret->writebuf);
198 free(secret);
216 struct PRFilePrivate *secret; local
225 secret = fd->secret;
226 mb = &secret->readbuf
260 struct PRFilePrivate *secret; local
294 struct PRFilePrivate *secret = fd->secret; local
376 struct PRFilePrivate *secret; local
394 struct PRFilePrivate *secret = memiofd->secret; local
401 struct PRFilePrivate *secret = memiofd->secret; local
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
derive.c 48 * SSL Key generation given pre master secret
82 unsigned int macSize; /* size of MAC secret */
109 PRINT_BUF(100, (NULL, "Master Secret", pwSpec->msItem.data,
218 "Client Write MAC Secret");
225 "Server Write MAC Secret");
347 SECItem secret ; local
350 secret.type = siBuffer;
358 secret.data = &key_block[i];
359 secret.len = effKeySize;
363 status = TLS_PRF(&secret, "client write key", &crsr, &keyblk, isFIPS)
    [all...]
  /external/oauth/core/src/main/java/net/oauth/signature/
OAuthSignatureMethod.java 92 String secret = accessor.consumer.consumerSecret; local
94 // This code supports the 'Accessor Secret' extensions
102 secret = accessorSecret.toString();
105 if (secret == null) {
106 secret = "";
108 setConsumerSecret(secret);
  /external/openssh/
auth2-jpake.c 267 * Fetch password hashing scheme, password salt and derive shared secret
276 u_char *secret; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
356 fatal("%s: BN_bin2bn (secret)", __func__);
363 bzero(secret, secret_len);
364 xfree(secret);
  /external/ppp/pppd/
chap-new.c 403 unsigned char secret[MAXSECRETLEN]; local
406 /* Get the secret that the peer is supposed to know */
407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
408 error("No CHAP secret found for authenticating %q", name);
412 ok = digest->verify_response(id, name, secret, secret_len, challenge,
414 memset(secret, 0, sizeof(secret));
431 char secret[MAXSECRETLEN+1]; local
447 /* get secret for authenticating ourselves with the specified host */
448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0))
    [all...]
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
    [all...]
  /external/tcpdump/
print-esp.c 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
283 memcpy(sa1.secret, espsecret_key, i);
288 if (i < sizeof(sa1.secret)) {
289 memcpy(sa1.secret, colon, i);
292 memcpy(sa1.secret, colon, sizeof(sa1.secret));
293 sa1.secretlen = sizeof(sa1.secret);
356 u_char *secret; local
368 secret = NULL
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 71 String secret = "secret string"; local
72 SealedObject so = new SealedObject(secret, new NullCipher());
81 assertEquals("The secret content of deserialized object "
82 + "should be equal to the secret content of initial object",
83 secret, so_des.getObject(new NullCipher()));
95 String secret = "secret string"; local
97 new SealedObject(secret, null);
112 SealedObject so = new SealedObject(secret, cipher)
137 String secret = "secret string"; local
155 String secret = "secret string"; local
183 String secret = "secret string"; local
227 String secret = "secret string"; local
272 String secret = "secret string"; local
    [all...]

Completed in 1130 milliseconds

1 2