/external/chromium_org/cloud_print/gcp20/prototype/ |
x_privet_token_unittest.cc | 20 std::string secret = "E3E92296-E290-4E77-B678-6AEF256C30C8"; local 24 XPrivetToken xtoken(secret, base::Time::FromTimeT(gen_time)); 27 std::string sha1_val = base::SHA1HashString(secret + ":" + issue_time_str); 102 // Tokens with different secret:
|
/external/chromium_org/net/spdy/ |
spdy_credential_builder.cc | 33 std::string secret = SpdyCredentialBuilder::GetCredentialSecret(tls_unique); local 61 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()), 62 secret.length(), &der_signature); 80 std::string secret(prefix, arraysize(prefix)); 81 secret.append(tls_unique); 83 return secret;
|
spdy_credential_builder_unittest.cc | 142 std::string secret = GetCredentialSecret(); local 143 creator->Sign(reinterpret_cast<const unsigned char *>(secret.data()), 144 secret.length(), &proof_data);
|
/external/chromium_org/crypto/ |
ec_signature_creator_nss.cc | 73 SECItem secret; local 74 secret.type = siBuffer; 75 secret.len = data_len; 76 secret.data = const_cast<unsigned char*>(data); 84 // Sign the secret data and save it to |result|. 86 SignData(&result, &secret, key_->key(), HASH_AlgSHA256, &signature_len_);
|
/external/chromium_org/third_party/openssl/openssl/crypto/jpake/ |
jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 77 const BIGNUM *secret) 84 ctx->secret = BN_dup(secret); 105 BN_clear_free(ctx->secret); 117 const BIGNUM *secret) 121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 398 BN_sub(t2, ctx->p.q, ctx->secret); [all...] |
/external/openssl/crypto/jpake/ |
jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|
jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 77 const BIGNUM *secret) 84 ctx->secret = BN_dup(secret); 105 BN_clear_free(ctx->secret); 117 const BIGNUM *secret) 121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 398 BN_sub(t2, ctx->p.q, ctx->secret); [all...] |
/external/chromium_org/sync/util/ |
cryptographer_unittest.cc | 198 const char secret[] = "secret"; local 200 EXPECT_TRUE(other_cryptographer.EncryptString(secret, &encrypted));
|
/cts/tests/tests/security/jni/ |
android_security_cts_NativeCodeTest.cpp | 79 static int secret; variable 91 secret = 0xbaadadd4; 120 syscall(__NR_ptrace, PTRACE_PEEKDATA, child, &secret, addr); 129 syscall(__NR_ptrace, PTRACE_PEEKDATA, child, &secret, addr2);
|
/external/chromium_org/remoting/host/ |
pairing_registry_delegate_win.cc | 180 // Read the shared secret. 182 scoped_ptr<base::DictionaryValue> secret = ReadValue(privileged_, local 184 if (!secret) 188 pairing->MergeDictionary(secret.get()); 204 // Extract the shared secret to a separate dictionary.
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 51 String secret = "secret string"; local 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; local 77 new SealedObject(secret, null); 96 String secret = "secret string" local 114 String secret = "secret string"; local 142 String secret = "secret string"; local 177 String secret = "secret string"; local 216 String secret = "secret string"; local [all...] |
/external/chromium_org/ipc/ |
ipc_channel_win.cc | 162 int32 secret; local 163 failed = it.ReadInt(&secret) ? (secret != client_secret_) : true; 186 const std::string& channel_id, int32* secret) { 189 // Prevent the shared secret from ending up in the pipe name. 192 if (secret) // Retrieve the secret if asked for. 193 base::StringToInt(channel_id.substr(index + 1), secret); 198 if (secret) 199 *secret = 0 276 int32 secret = validate_client_ ? 0 : client_secret_; local 508 int secret; local [all...] |
/external/clang/test/Index/ |
annotate-nested-name-specifier.cpp | 46 namespace secret { namespace in namespace:outer::inner 51 using namespace outer_alias::inner::secret; 52 namespace super_secret = outer_alias::inner::secret; 238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15 248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
|
/libcore/crypto/src/test/java/org/conscrypt/ |
MacTest.java | 31 final String secret = "-HMAC-test1"; local 42 SecretKey key1 = engine.getSecretKeyById(secret, "HmacSHA256"); 43 SecretKey key1dupe = engine.getSecretKeyById(secret, "HmacSHA256"); 46 SecretKey key2 = new SecretKeySpec(secret.getBytes(), "HmacSHA256"); 54 assertEquals(Arrays.toString(secret.getBytes()), Arrays.toString(key2.getEncoded()));
|
/external/chromium/net/base/ |
nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 191 struct PRFilePrivate *secret = fd->secret; local 192 memio_buffer_destroy(&secret->readbuf); 193 memio_buffer_destroy(&secret->writebuf); 194 free(secret); 212 struct PRFilePrivate *secret; local 221 secret = fd->secret; 222 mb = &secret->readbuf 245 struct PRFilePrivate *secret; local 274 struct PRFilePrivate *secret = fd->secret; local 356 struct PRFilePrivate *secret; local 374 struct PRFilePrivate *secret = memiofd->secret; local 381 struct PRFilePrivate *secret = memiofd->secret; local [all...] |
/external/chromium_org/chrome/browser/net/gaia/ |
gaia_oauth_fetcher.cc | 113 "anonymous", // consumer secret 115 oauth1_access_token_secret, // token secret 132 "anonymous", // consumer secret 134 "", // token secret 156 "anonymous", // consumer secret 158 oauth1_access_token_secret, // token secret 193 std::string* secret) { 209 secret->assign(decoded); 350 const std::string& secret) { 367 secret, 465 std::string secret; local [all...] |
/external/chromium_org/net/base/ |
nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 195 struct PRFilePrivate *secret = fd->secret; local 196 memio_buffer_destroy(&secret->readbuf); 197 memio_buffer_destroy(&secret->writebuf); 198 free(secret); 216 struct PRFilePrivate *secret; local 225 secret = fd->secret; 226 mb = &secret->readbuf 260 struct PRFilePrivate *secret; local 294 struct PRFilePrivate *secret = fd->secret; local 376 struct PRFilePrivate *secret; local 394 struct PRFilePrivate *secret = memiofd->secret; local 401 struct PRFilePrivate *secret = memiofd->secret; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 48 * SSL Key generation given pre master secret 82 unsigned int macSize; /* size of MAC secret */ 109 PRINT_BUF(100, (NULL, "Master Secret", pwSpec->msItem.data, 218 "Client Write MAC Secret"); 225 "Server Write MAC Secret"); 347 SECItem secret ; local 350 secret.type = siBuffer; 358 secret.data = &key_block[i]; 359 secret.len = effKeySize; 363 status = TLS_PRF(&secret, "client write key", &crsr, &keyblk, isFIPS) [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
OAuthSignatureMethod.java | 92 String secret = accessor.consumer.consumerSecret; local 94 // This code supports the 'Accessor Secret' extensions 102 secret = accessorSecret.toString(); 105 if (secret == null) { 106 secret = ""; 108 setConsumerSecret(secret);
|
/external/openssh/ |
auth2-jpake.c | 267 * Fetch password hashing scheme, password salt and derive shared secret 276 u_char *secret; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 356 fatal("%s: BN_bin2bn (secret)", __func__); 363 bzero(secret, secret_len); 364 xfree(secret);
|
/external/ppp/pppd/ |
chap-new.c | 403 unsigned char secret[MAXSECRETLEN]; local 406 /* Get the secret that the peer is supposed to know */ 407 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 408 error("No CHAP secret found for authenticating %q", name); 412 ok = digest->verify_response(id, name, secret, secret_len, challenge, 414 memset(secret, 0, sizeof(secret)); 431 char secret[MAXSECRETLEN+1]; local 447 /* get secret for authenticating ourselves with the specified host */ 448 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) [all...] |
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); [all...] |
/external/tcpdump/ |
print-esp.c | 78 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 272 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 283 memcpy(sa1.secret, espsecret_key, i); 288 if (i < sizeof(sa1.secret)) { 289 memcpy(sa1.secret, colon, i); 292 memcpy(sa1.secret, colon, sizeof(sa1.secret)); 293 sa1.secretlen = sizeof(sa1.secret); 356 u_char *secret; local 368 secret = NULL [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 71 String secret = "secret string"; local 72 SealedObject so = new SealedObject(secret, new NullCipher()); 81 assertEquals("The secret content of deserialized object " 82 + "should be equal to the secret content of initial object", 83 secret, so_des.getObject(new NullCipher())); 95 String secret = "secret string"; local 97 new SealedObject(secret, null); 112 SealedObject so = new SealedObject(secret, cipher) 137 String secret = "secret string"; local 155 String secret = "secret string"; local 183 String secret = "secret string"; local 227 String secret = "secret string"; local 272 String secret = "secret string"; local [all...] |