/external/wpa_supplicant_8/hostapd/ |
hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
secretencoder.h | 25 // Encodes and decodes secret challenges. The decoded secret is displayed to the 27 // secret is encoded for transmission on the wire and used for computing pairing 33 // Encodes a byte array representation of a secret to a string. 34 // @param secret the secret bytes 35 // @return a string representation of the given secret 37 const std::vector<uint8_t>& secret) const = 0; 39 // Decodes the string representation of the secret to a byte array. 40 // @param secret a string representation of the secre [all...] |
hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); 33 const std::string& secret) const { 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes);
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
secretmessage.h | 27 // Message used to pass the pairing secret. The secret consists of encoded 31 // Creates a new message for the given secret. 32 // @param secret the secret 33 explicit SecretMessage(const std::vector<uint8_t>& secret); 35 // Gets the secret. 36 const std::vector<uint8_t>& secret() const;
|
secretackmessage.h | 27 // Ack for a secret message. 30 // Creates a new ack for the given secret. 31 // @param secret the secret 32 explicit SecretAckMessage(const std::vector<uint8_t>& secret); 34 // Gets the secret. 35 const std::vector<uint8_t>& secret() const;
|
secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); 25 secret[0] = 0xAA; 26 secret[1] = 0xBB; 27 secret[2] = 0xCC; 28 secret[3] = 0xDD; 30 std::string result = encoder.EncodeToString(secret); 38 std::string secret("AABBCCDD"); 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret);
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) [all...] |
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
SealedObjectTest.java | 51 String secret = "secret string"; local 52 SealedObject so = new SealedObject(secret, new NullCipher()); 61 assertEquals("The secret content of deserialized object " 62 + "should be equal to the secret content of initial object", 63 secret, so_des.getObject(new NullCipher())); 75 String secret = "secret string"; local 77 new SealedObject(secret, null); 96 String secret = "secret string" local 114 String secret = "secret string"; local 142 String secret = "secret string"; local 177 String secret = "secret string"; local 216 String secret = "secret string"; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 71 String secret = "secret string"; local 72 SealedObject so = new SealedObject(secret, new NullCipher()); 81 assertEquals("The secret content of deserialized object " 82 + "should be equal to the secret content of initial object", 83 secret, so_des.getObject(new NullCipher())); 95 String secret = "secret string"; local 97 new SealedObject(secret, null); 112 SealedObject so = new SealedObject(secret, cipher) 137 String secret = "secret string"; local 155 String secret = "secret string"; local 170 String secret = "secret string"; local 211 String secret = "secret string"; local 255 String secret = "secret string"; local 300 String secret = "secret string"; local [all...] |
/external/chromium_org/cloud_print/gcp20/prototype/ |
x_privet_token.h | 23 // Generates X-Privet-Token for /privet/info request. Updates secret 36 XPrivetToken(const std::string& secret, const base::Time& gen_time); 41 // Creates new XPrivetToken secret. 44 // X-Privet-Token secret. 47 // Time of last secret generation.
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/message/ |
SecretMessage.java | 25 * 'SECRET'. 31 public SecretMessage(byte[] secret) { 32 super(PoloMessage.PoloMessageType.SECRET); 33 mSecret = secret; 45 ret.append(" secret=");
|
/external/chromium_org/net/base/ |
nss_memio.c | 40 /* The 'secret' field of a PRFileDesc created by memio_CreateIOLayer points 196 struct PRFilePrivate *secret = fd->secret; local 197 memio_buffer_destroy(&secret->readbuf); 198 memio_buffer_destroy(&secret->writebuf); 199 free(secret); 217 struct PRFilePrivate *secret; local 226 secret = fd->secret; 227 mb = &secret->readbuf 261 struct PRFilePrivate *secret; local 295 struct PRFilePrivate *secret = fd->secret; local 377 struct PRFilePrivate *secret; local 395 struct PRFilePrivate *secret = memiofd->secret; local 402 struct PRFilePrivate *secret = memiofd->secret; local [all...] |
/external/chromium_org/tools/gyp/test/mac/bundle-resources/ |
test.gyp | 11 'secret.txt', 22 'secret.txt', 43 'secret.txt',
|
/external/chromium_org/tools/gyp/test/mac/libraries/subdir/ |
test.gyp | 29 'postbuild_name': 'Make a secret location', 37 'postbuild_name': 'Copy to secret location, with secret name',
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
CipherKeyGenerator.java | 6 * The base class for symmetric, or secret, cipher key generators. 26 * generate a secret key.
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 23 addr[1] = secret;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/libcore/luni/src/main/java/javax/crypto/ |
SecretKeyFactorySpi.java | 37 * Generate a secret key from the specified key specification. 41 * @return a secret key. 44 * a secret key. 50 * Returns the key specification of the specified secret key. 53 * the secret key to get the specification from. 58 * if the specified secret key cannot be transformed into the 66 * Translates the specified secret key into an instance of the corresponding 70 * the secret key to translate.
|
SecretKeyFactory.java | 33 * Secret key factories provide the following functionality: 64 * the algorithm name for the secret key. 74 * Returns the name of the secret key algorithm. 76 * @return the name of the secret key algorithm. 97 * @return a secret key factory for the specified key algorithm. 121 * @return a secret key factory for the specified key algorithm from the 153 * @return a secret key factory for the specified key algorithm from the 176 * Generate a secret key from the specified key specification. 180 * @return a secret key. 183 * a secret key [all...] |
/external/chromium_org/remoting/host/ |
host_secret.h | 9 // Generates random host secret.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.cc | 90 bool PairingSession::SetSecret(const Gamma& secret) { 91 secret_ = new Gamma(secret); 94 LOG(ERROR) << "Invalid state: unexpected secret"; 98 if (!challenge().CheckGamma(secret)) { 99 LOG(ERROR) << "Secret failed local check"; 103 nonce_ = challenge().ExtractNonce(secret); 175 LOG(INFO) << "Waiting for Secret..."; 218 LOG(ERROR) << "Invalid state: unexpected secret message"; 224 if (!VerifySecret(message.secret())) { 248 if (kVerifySecretAck && !VerifySecret(message.secret())) { [all...] |
/external/openssl/crypto/jpake/ |
jpaketest.c | 120 BIGNUM *secret = BN_new(); local 150 BN_rand(secret, 32, -1, 0); 153 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 154 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 166 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 167 BN_add_word(secret, 1); 168 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 172 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 179 BN_free(secret);
|