/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
CipherKeyGenerator.java | 6 * The base class for symmetric, or secret, cipher key generators. 26 * generate a secret key.
|
/external/curl/tests/data/ |
test800 | 34 'imap://%HOSTIP:%IMAPPORT/800/;UID=1' -u user:secret 43 A002 LOGIN user secret
|
test801 | 31 'imap://%HOSTIP:%IMAPPORT/801/;UID=123/;SECTION=1' -u user:secret 40 A002 LOGIN user secret
|
test802 | 32 'imap://%HOSTIP:%IMAPPORT/802;UIDVALIDITY=3857529045/;UID=123/;SECTION=TEXT' -u user:secret 41 A002 LOGIN user secret
|
test804 | 31 'imap://%HOSTIP:%IMAPPORT/804/;UID=123/;SECTION=1' 'imap://%HOSTIP:%IMAPPORT/804/;UID=456/;SECTION=2.3' -u user:secret 40 A002 LOGIN user secret
|
test808 | 35 imap://%HOSTIP:%IMAPPORT -u user:secret -X 'EXAMINE 808' 44 A002 LOGIN user secret
|
test841 | 36 imap://%HOSTIP:%IMAPPORT/841/ -u user:secret -X 'FETCH 123 BODY[1]' 45 A002 LOGIN user secret
|
test851 | 29 pop3://%HOSTIP:%POP3PORT/851 -l -u user:secret 39 PASS secret
|
test853 | 37 pop3://%HOSTIP:%POP3PORT/ -u user:secret 47 PASS secret
|
test861 | 37 pop3://%HOSTIP:%POP3PORT -u user:secret -X UIDL 47 PASS secret
|
test862 | 35 pop3://%HOSTIP:%POP3PORT -u user:secret -X 'TOP 862 0' 45 PASS secret
|
/external/selinux/mcstrans/ |
TODO | 7 Make prefixes and suffixes optional (ex. SECRET REL AUS == SECRET AUS).
|
/external/selinux/mcstrans/share/examples/pipes/ |
setrans.conf | 15 s4:c200.c511=Secret 17 s5:c200.c511=Top Secret
|
/external/selinux/mcstrans/share/examples/urcsts/ |
setrans.conf | 18 s7=SECRET 22 s9=TOP SECRET
|
urcsts.test | 18 SECRET==s7 22 TOP SECRET==s9
|
/external/selinux/mcstrans/share/examples/urcsts-via-include/ |
urcsts.test | 18 SECRET==s7 22 TOP SECRET==s9
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 23 addr[1] = secret;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
FakeStorageManager.java | 35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { 36 getUserAuth(userId).add(new Pair<>(token, secret)); 58 throw new AssertionFailedError("More than one secret exists"); 63 public void unlockUser(int userId, byte[] secret, IProgressListener listener) 68 if (secret != null) { 70 throw new AssertionFailedError("More than one secret exists"); 73 if ((!mIgnoreBadUnlock) && auth.second != null && !Arrays.equals(secret, auth.second)) { 74 throw new AssertionFailedError("Invalid secret to unlock user");
|
/libcore/ojluni/src/main/java/javax/crypto/ |
SecretKeyFactorySpi.java | 36 * of a secret-key factory for a particular algorithm. 39 * secret key factory. 40 * For example, the DES secret-key factory supplied by the "SunJCE" provider 42 * keys, and that provider's secret-key factory for Triple DES keys supports 60 * @param keySpec the specification (key material) of the secret key 62 * @return the secret key 65 * is inappropriate for this secret-key factory to produce a secret key. 89 * secret-key factory). 97 * secret-key factory [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
/external/selinux/mcstrans/share/examples/nato/ |
nato.test | 2 CONFIDENTIAL-NATO SECRET!=s4:c0,c2,c11,c200.c511-s5:c1,c200.c511 3 NATO SECRET REL NATO==s5:c1,c201.c204,c206.c218,c220.c222,c224.c238,c240.c256,c259,c260,c262.c267,c270.c273,c275.c277,c279.c287,c289.c297,c299,c301.c307,c309,c311.c330,c334.c364,c367.c377,c379,c380,c382.c386,c388.c405,c408.c422,c424.c429,c431.c511 5 NATO CONFIDENTIAL-NATO SECRET==s4:c1,c200.c511-s5:c1,c200.c511 6 NATO CONFIDENTIAL REL AUS/US-NATO SECRET REL AUS/US==s4:c1,c201.c214,c216.c429,c431.c511-s5:c1,c201.c214,c216.c429,c431.c511 7 NATO CONFIDENTIAL DEU EYES ONLY-NATO SECRET DEU EYES ONLY==s4:c1,c200.c257,c259.c511-s5:c1,c200.c257,c259.c511
|
/external/boringssl/src/ssl/ |
tls13_enc.cc | 39 /* Initialize the secret to the zero key. */ 40 OPENSSL_memset(hs->secret, 0, hs->hash_len); 63 return HKDF_extract(hs->secret, &hs->hash_len, 64 SSL_TRANSCRIPT_md(&hs->transcript), in, len, hs->secret, 69 const uint8_t *secret, size_t secret_len, 91 int ret = HKDF_expand(out, len, digest, secret, secret_len, hkdf_label, 97 /* derive_secret derives a secret of length |len| and writes the result in |out| 98 * with the given label and the current base secret and most recently-saved 109 return hkdf_expand_label(out, SSL_TRANSCRIPT_md(&hs->transcript), hs->secret, 168 /* Save the traffic secret. * 247 uint8_t *secret; local [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.cc | 90 bool PairingSession::SetSecret(const Gamma& secret) { 91 secret_ = new Gamma(secret); 94 LOG(ERROR) << "Invalid state: unexpected secret"; 98 if (!challenge().CheckGamma(secret)) { 99 LOG(ERROR) << "Secret failed local check"; 103 nonce_ = challenge().ExtractNonce(secret); 175 LOG(INFO) << "Waiting for Secret..."; 218 LOG(ERROR) << "Invalid state: unexpected secret message"; 224 if (!VerifySecret(message.secret())) { 248 if (kVerifySecretAck && !VerifySecret(message.secret())) { [all...] |