/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/PyMod-2.7.10/Python/ |
random.c | 99 "secret using CryptoGen)");
155 "secret using RAND_pseudo_bytes");
377 void *secret = &_Py_HashSecret;
local 391 memset(secret, 0, secret_size);
396 Hash randomization is enabled. Generate a per-process secret,
414 memset(secret, 0, secret_size);
417 lcg_urandom(seed, (unsigned char*)secret, secret_size);
422 (void)win32_urandom((unsigned char *)secret, secret_size, 0);
424 vms_urandom((unsigned char *)secret, secret_size, 0);
426 (void)py_getentropy(secret, secret_size, 1); [all...] |
/external/python/cpython2/Python/ |
random.c | 90 "secret using CryptoGen)"); 150 "secret using RAND_pseudo_bytes"); 358 void *secret = &_Py_HashSecret; local 372 memset(secret, 0, secret_size); 377 Hash randomization is enabled. Generate a per-process secret, 395 memset(secret, 0, secret_size); 398 lcg_urandom(seed, (unsigned char*)secret, secret_size); 403 (void)win32_urandom((unsigned char *)secret, secret_size, 0); 405 vms_urandom((unsigned char *)secret, secret_size, 0); 407 (void)py_getentropy(secret, secret_size, 1) [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
chpms.c | 133 char *secret, 307 char *secret, 318 /* Initialize the Unicode version of the secret (== password). */ 322 unicodePassword[i * 2] = (u_char)secret[i]; 346 char *secret, 357 UcasePassword[i] = (u_char)toupper(secret[i]); 366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) 374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); 379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response) [all...] |
/libcore/luni/src/test/java/libcore/javax/crypto/ |
ECDHKeyAgreementTest.java | 52 // Two key pairs and the resulting shared secret for the Known Answer Test 92 * Performs a known-answer test of the shared secret for all permutations of {@code Providers} 280 // Place the shared secret in the middle of the larger buffer and check that only that 289 byte[] secret = new byte[KAT_SECRET.length]; 290 System.arraycopy(buffer, 1, secret, 0, secret.length); 291 assertTrue(Arrays.equals(KAT_SECRET, secret)); 303 // Although the buffer is big enough (1024 bytes) the shared secret should be placed 304 // at offset 1020 thus leaving only 4 bytes for the secret, which is not enough. 319 byte[] secret = keyAgreement.generateSecret() [all...] |
/development/samples/ToyVpn/res/layout/ |
form.xml | 31 <TextView style="@style/item" android:text="@string/secret"/> 32 <EditText style="@style/item" android:id="@+id/secret" android:password="true"/>
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Modules/ |
sre_constants.h | 2 * Secret Labs' Regular Expression Engine
9 * Copyright (c) 1997-2001 by Secret Labs AB. All rights reserved.
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
sre.h | 2 * Secret Labs' Regular Expression Engine
6 * Copyright (c) 1997-2001 by Secret Labs AB. All rights reserved.
|
sre_constants.h | 2 * Secret Labs' Regular Expression Engine
9 * Copyright (c) 1997-2001 by Secret Labs AB. All rights reserved.
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairinglistener.h | 39 // display a decoded secret based on the given gamma value. 43 // prompt the user to enter the secret displayed on the output device.
|
/external/python/cpython2/Modules/ |
sre_constants.h | 2 * Secret Labs' Regular Expression Engine 9 * Copyright (c) 1997-2001 by Secret Labs AB. All rights reserved.
|
/hardware/intel/common/libmix/mix_common/src/ |
Makefile.am | 3 #The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 5 #No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
mixlog.h | 4 The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 6 No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
/hardware/intel/common/libmix/mix_vbp/viddec_fw/fw/parser/ |
vbp_trace.h | 4 The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 6 No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
vbp_vc1_parser.h | 4 The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 6 No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
/hardware/intel/common/libmix/mix_video/src/ |
mixvideodef.h | 4 The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 6 No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
mixvideoframe_private.h | 4 The source code contained or described herein and all documents related to the source code ("Material") are owned by Intel Corporation or its suppliers or licensors. Title to the Material remains with Intel Corporation or its suppliers and licensors. The Material contains trade secrets and proprietary and confidential information of Intel or its suppliers and licensors. The Material is protected by worldwide copyright and trade secret laws and treaty provisions. No part of the Material may be used, copied, reproduced, modified, published, uploaded, posted, transmitted, distributed, or disclosed in any way without Intel?s prior express written permission. 6 No license under any patent, copyright, trade secret or other intellectual property right is granted to or conferred upon you by disclosure or delivery of the Materials, either expressly, by implication, inducement, estoppel or otherwise. Any license under such intellectual property rights must be express and approved by Intel in writing.
|
/external/ppp/pppd/ |
auth.c | 791 error("No secret found for PAP login"); 1504 char secret[MAXWORDLEN]; local 1554 char secret[MAXWORDLEN]; local [all...] |
chap-new.c | 418 unsigned char secret[MAXSECRETLEN]; local 421 /* Get the secret that the peer is supposed to know */ 422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 423 error("No CHAP secret found for authenticating %q", name); 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, 429 memset(secret, 0, sizeof(secret)); 446 char secret[MAXSECRETLEN+1]; local 462 /* get secret for authenticating ourselves with the specified host */ 463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyRep.java | 69 /** Type for secret keys. */ 70 SECRET, 85 * Either one of Type.SECRET, Type.PUBLIC, or Type.PRIVATE 117 * @param type either one of Type.SECRET, Type.PUBLIC, or Type.PRIVATE 150 * <li> Type.SECRET/"RAW" - returns a SecretKeySpec object 171 if (type == Type.SECRET && RAW.equals(format)) {
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_parser.y | 62 char secret[ 256 ]; 113 %token SECRET 198 KEY QUOTEDSTRING OBRACE SECRET QUOTEDSTRING SEMICOLON EBRACE 211 strncpy( keySpec->secret, $5, sizeof( keySpec->secret ) ); 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 191 * Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data)) 194 * @param secret secret 195 * @return H(concat(secret, ":", data)); 197 private static String KD(String secret, String data) { 198 return H(secret + ":" + data);
|
/external/syslinux/gpxe/src/net/ |
tls.c | 157 * @v secret Secret 158 * @v secret_len Length of secret 165 void *secret, size_t secret_len, 176 /* Copy the secret, in case HMAC modifies it */ 177 memcpy ( secret_copy, secret, secret_len ); 178 secret = secret_copy; 179 DBGC2 ( tls, "TLS %p %s secret:\n", tls, digest->name ); 180 DBGC2_HD ( tls, secret, secret_len ); 183 hmac_init ( digest, digest_ctx, secret, &secret_len ) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyRepTest.java | 40 assertNotNull(new KeyRep(KeyRep.Type.SECRET, "", "", new byte[] {})); 52 new KeyRep(KeyRep.Type.SECRET, null, "", new byte[] {}); 69 KeyRepChild kr = new KeyRepChild(KeyRep.Type.SECRET, "", "", new byte[] {}); 76 kr = new KeyRepChild(KeyRep.Type.SECRET, "", "X.509", new byte[] {}); 83 kr = new KeyRepChild(KeyRep.Type.SECRET, "", "RAW", new byte[] {});
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/ |
key_prot.x | 77 * The first 16 hex digits of the encrypted secret key are used as 87 KEY_NOSECRET, /* no secret key stored */ 172 * This is my secret key. 214 * This is my secret key. 275 * from my secret key and this publickey.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/ |
key_prot.x | 77 * The first 16 hex digits of the encrypted secret key are used as 87 KEY_NOSECRET, /* no secret key stored */ 172 * This is my secret key. 214 * This is my secret key. 275 * from my secret key and this publickey.
|