HomeSort by relevance Sort by last modified time
    Searched full:secret (Results 51 - 75 of 1192) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
CipherKeyGenerator.java 6 * The base class for symmetric, or secret, cipher key generators.
26 * generate a secret key.
  /external/curl/tests/data/
test800 34 'imap://%HOSTIP:%IMAPPORT/800/;UID=1' -u user:secret
43 A002 LOGIN user secret
test801 31 'imap://%HOSTIP:%IMAPPORT/801/;UID=123/;SECTION=1' -u user:secret
40 A002 LOGIN user secret
test802 32 'imap://%HOSTIP:%IMAPPORT/802;UIDVALIDITY=3857529045/;UID=123/;SECTION=TEXT' -u user:secret
41 A002 LOGIN user secret
test804 31 'imap://%HOSTIP:%IMAPPORT/804/;UID=123/;SECTION=1' 'imap://%HOSTIP:%IMAPPORT/804/;UID=456/;SECTION=2.3' -u user:secret
40 A002 LOGIN user secret
test808 35 imap://%HOSTIP:%IMAPPORT -u user:secret -X 'EXAMINE 808'
44 A002 LOGIN user secret
test841 36 imap://%HOSTIP:%IMAPPORT/841/ -u user:secret -X 'FETCH 123 BODY[1]'
45 A002 LOGIN user secret
test851 29 pop3://%HOSTIP:%POP3PORT/851 -l -u user:secret
39 PASS secret
test853 37 pop3://%HOSTIP:%POP3PORT/ -u user:secret
47 PASS secret
test861 37 pop3://%HOSTIP:%POP3PORT -u user:secret -X UIDL
47 PASS secret
test862 35 pop3://%HOSTIP:%POP3PORT -u user:secret -X 'TOP 862 0'
45 PASS secret
  /external/selinux/mcstrans/
TODO 7 Make prefixes and suffixes optional (ex. SECRET REL AUS == SECRET AUS).
  /external/selinux/mcstrans/share/examples/pipes/
setrans.conf 15 s4:c200.c511=Secret
17 s5:c200.c511=Top Secret
  /external/selinux/mcstrans/share/examples/urcsts/
setrans.conf 18 s7=SECRET
22 s9=TOP SECRET
urcsts.test 18 SECRET==s7
22 TOP SECRET==s9
  /external/selinux/mcstrans/share/examples/urcsts-via-include/
urcsts.test 18 SECRET==s7
22 TOP SECRET==s9
  /external/wpa_supplicant_8/src/eap_common/
chap.c 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
23 addr[1] = secret;
chap.h 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
FakeStorageManager.java 35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) {
36 getUserAuth(userId).add(new Pair<>(token, secret));
58 throw new AssertionFailedError("More than one secret exists");
63 public void unlockUser(int userId, byte[] secret, IProgressListener listener)
68 if (secret != null) {
70 throw new AssertionFailedError("More than one secret exists");
73 if ((!mIgnoreBadUnlock) && auth.second != null && !Arrays.equals(secret, auth.second)) {
74 throw new AssertionFailedError("Invalid secret to unlock user");
  /libcore/ojluni/src/main/java/javax/crypto/
SecretKeyFactorySpi.java 36 * of a secret-key factory for a particular algorithm.
39 * secret key factory.
40 * For example, the DES secret-key factory supplied by the "SunJCE" provider
42 * keys, and that provider's secret-key factory for Triple DES keys supports
60 * @param keySpec the specification (key material) of the secret key
62 * @return the secret key
65 * is inappropriate for this secret-key factory to produce a secret key.
89 * secret-key factory).
97 * secret-key factory
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/
secretackmessage.cc 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret)
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage
35 ss << "[SecretAckMessage secret="
secretmessage.cc 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret)
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage
35 ss << "[SecretMessage secret="
  /external/selinux/mcstrans/share/examples/nato/
nato.test 2 CONFIDENTIAL-NATO SECRET!=s4:c0,c2,c11,c200.c511-s5:c1,c200.c511
3 NATO SECRET REL NATO==s5:c1,c201.c204,c206.c218,c220.c222,c224.c238,c240.c256,c259,c260,c262.c267,c270.c273,c275.c277,c279.c287,c289.c297,c299,c301.c307,c309,c311.c330,c334.c364,c367.c377,c379,c380,c382.c386,c388.c405,c408.c422,c424.c429,c431.c511
5 NATO CONFIDENTIAL-NATO SECRET==s4:c1,c200.c511-s5:c1,c200.c511
6 NATO CONFIDENTIAL REL AUS/US-NATO SECRET REL AUS/US==s4:c1,c201.c214,c216.c429,c431.c511-s5:c1,c201.c214,c216.c429,c431.c511
7 NATO CONFIDENTIAL DEU EYES ONLY-NATO SECRET DEU EYES ONLY==s4:c1,c200.c257,c259.c511-s5:c1,c200.c257,c259.c511
  /external/boringssl/src/ssl/
tls13_enc.cc 39 /* Initialize the secret to the zero key. */
40 OPENSSL_memset(hs->secret, 0, hs->hash_len);
63 return HKDF_extract(hs->secret, &hs->hash_len,
64 SSL_TRANSCRIPT_md(&hs->transcript), in, len, hs->secret,
69 const uint8_t *secret, size_t secret_len,
91 int ret = HKDF_expand(out, len, digest, secret, secret_len, hkdf_label,
97 /* derive_secret derives a secret of length |len| and writes the result in |out|
98 * with the given label and the current base secret and most recently-saved
109 return hkdf_expand_label(out, SSL_TRANSCRIPT_md(&hs->transcript), hs->secret,
168 /* Save the traffic secret. *
247 uint8_t *secret; local
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.cc 90 bool PairingSession::SetSecret(const Gamma& secret) {
91 secret_ = new Gamma(secret);
94 LOG(ERROR) << "Invalid state: unexpected secret";
98 if (!challenge().CheckGamma(secret)) {
99 LOG(ERROR) << "Secret failed local check";
103 nonce_ = challenge().ExtractNonce(secret);
175 LOG(INFO) << "Waiting for Secret...";
218 LOG(ERROR) << "Invalid state: unexpected secret message";
224 if (!VerifySecret(message.secret())) {
248 if (kVerifySecretAck && !VerifySecret(message.secret())) {
    [all...]

Completed in 576 milliseconds

1 23 4 5 6 7 8 91011>>