/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
/system/vold/ |
KeyStorage.h | 29 // If "token" and "secret" are nonempty, "secret" is appended to the application-specific 31 // If only "secret" is nonempty, it is used to decrypt in a non-Keymaster process. 34 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {}; 36 bool usesKeymaster() const { return !token.empty() || secret.empty(); }; 39 const std::string secret; member in class:android::vold::KeyAuthentication
|
/external/nos/host/android/hals/authsecret/test/ |
test.cpp | 35 // sha256( "citadel_update" | 0 | secret ) 82 hidl_vec<uint8_t> secret; local 83 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); 84 hal.primaryUserCredential(secret); 99 hidl_vec<uint8_t> secret; local 100 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); 101 hal.primaryUserCredential(secret); 115 hidl_vec<uint8_t> secret(19); 116 hal.primaryUserCredential(secret); 144 hidl_vec<uint8_t> secret; local [all...] |
/external/syslinux/gpxe/src/util/ |
mucurses_test.c | 10 char secret[16]; local 15 get_iscsi_chap_secret(secret); 17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret ); 26 char *title = "Set new iSCSI CHAP secret", 27 *msg = "Configure the iSCSI access secret", 29 WINDOW *secret; local 31 secret = newwin( stdscr->height / 2, 36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' ); 37 mvwprintw( secret, 1, 2, "%s", title ); 38 mvwhline( secret, 2, 1, '-' | secret->attrs, secret->width - 2 ) [all...] |
/external/tpm2/ |
ActivateCredential_fp.h | 16 TPM2B_ENCRYPTED_SECRET secret; member in struct:__anon40309
|
MakeCredential_fp.h | 20 TPM2B_ENCRYPTED_SECRET secret; member in struct:__anon40420
|
/external/boringssl/src/ssl/ |
ssl_key_share.cc | 115 Array<uint8_t> secret; variable 116 if (!secret.Init((EC_GROUP_get_degree(group.get()) + 7) / 8) || 117 !BN_bn2bin_padded(secret.data(), secret.size(), x)) { 121 *out_secret = std::move(secret); 150 Array<uint8_t> secret; variable 151 if (!secret.Init(32)) { 157 !X25519(secret.data(), private_key_, peer_key.data())) { 163 *out_secret = std::move(secret);
|
/external/iproute2/ip/ |
ipseg6.c | 30 #define HMAC_KEY_PROMPT "Enter secret for HMAC key ID (blank to delete): " 80 char secret[64]; local 85 memset(secret, 0, 64); 88 fprintf(stderr, "HMAC secret length %d > 63, " 92 memcpy(secret, RTA_DATA(attrs[SEG6_ATTR_SECRET]), slen); 108 fprintf(fp, "secret \"%s\" ", secret);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
CachedSyntheticPasswordTests.java | 110 // Ensure the same secret was passed each time 111 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); local 112 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); 113 assertEquals(1, secret.getAllValues().stream().distinct().count());
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/PyMod-2.7.10/Python/ |
random.c | 99 "secret using CryptoGen)");
155 "secret using RAND_pseudo_bytes");
377 void *secret = &_Py_HashSecret;
local 391 memset(secret, 0, secret_size);
396 Hash randomization is enabled. Generate a per-process secret,
414 memset(secret, 0, secret_size);
417 lcg_urandom(seed, (unsigned char*)secret, secret_size);
422 (void)win32_urandom((unsigned char *)secret, secret_size, 0);
424 vms_urandom((unsigned char *)secret, secret_size, 0);
426 (void)py_getentropy(secret, secret_size, 1); [all...] |
/external/clang/test/Index/ |
annotate-nested-name-specifier.cpp | 46 namespace secret { namespace in namespace:outer::inner 51 using namespace outer_alias::inner::secret; 52 namespace super_secret = outer_alias::inner::secret; 238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15 248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
|
/external/mdnsresponder/mDNSWindows/ControlPanel/ |
RegistrationPage.cpp | 18 #include <Secret.h> 297 BOOL secret = FALSE; local 312 secret = TRUE; 323 if ( secret ) 377 if ( secret )
|
/external/python/cpython2/Python/ |
random.c | 90 "secret using CryptoGen)"); 150 "secret using RAND_pseudo_bytes"); 358 void *secret = &_Py_HashSecret; local 372 memset(secret, 0, secret_size); 377 Hash randomization is enabled. Generate a per-process secret, 395 memset(secret, 0, secret_size); 398 lcg_urandom(seed, (unsigned char*)secret, secret_size); 403 (void)win32_urandom((unsigned char *)secret, secret_size, 0); 405 vms_urandom((unsigned char *)secret, secret_size, 0); 407 (void)py_getentropy(secret, secret_size, 1) [all...] |
/external/python/cpython3/Python/ |
random.c | 438 startup to initialize its hash secret, but os.urandom() must block until the 540 unsigned char *secret = (unsigned char *)&_Py_HashSecret.uc; local 549 Hash randomization is enabled. Generate a per-process secret, 567 memset(secret, 0, secret_size); 570 lcg_urandom(seed, secret, secret_size); 581 res = pyurandom(secret, secret_size, 0, 0);
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/ |
XmlMessageBuilder.java | 96 private static final String MESSAGE_CONTAINER_NAME_SECRET = "secret"; 172 case SECRET: 346 String secret; local 348 secret = body.getJSONObject(MESSAGE_CONTAINER_NAME_SECRET) 353 byte[] secretBytes = PoloUtil.hexStringToBytes(secret); 562 JSONObject secret = new JSONObject(); local 564 secret.put(SECRET_FIELD_SECRET, bytesStr); 565 jsonObj.put(MESSAGE_CONTAINER_NAME_SECRET, secret);
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
protobufwireadapter.cc | 134 Secret secret; local 135 secret.set_secret(&message.secret()[0], message.secret().size()); 138 secret.SerializeAsString()); 146 ack.set_secret(&message.secret()[0], message.secret().size()); 330 Secret secret; local [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/ |
ProtobufWireAdapter.java | 165 return PoloProto.Secret.parseFrom(payload); 217 } else if (message instanceof PoloProto.Secret) { 422 * Converts a {@link SecretMessage} to a {@link PoloProto.Secret}. 424 private PoloProto.Secret toProto(SecretMessage poloMessage) { 425 PoloProto.Secret secret = new PoloProto.Secret(); local 426 secret.secret = poloMessage.getSecret(); 427 return secret; [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
OAuthSignatureMethod.java | 92 String secret = accessor.consumer.consumerSecret; local 94 // This code supports the 'Accessor Secret' extensions 102 secret = accessorSecret.toString(); 105 if (secret == null) { 106 secret = ""; 108 setConsumerSecret(secret);
|
/external/ppp/pppd/ |
chap-new.c | 418 unsigned char secret[MAXSECRETLEN]; local 421 /* Get the secret that the peer is supposed to know */ 422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 423 error("No CHAP secret found for authenticating %q", name); 427 ok = digest->verify_response(id, name, secret, secret_len, challenge, 429 memset(secret, 0, sizeof(secret)); 446 char secret[MAXSECRETLEN+1]; local 462 /* get secret for authenticating ourselves with the specified host */ 463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0)) [all...] |
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); [all...] |
/external/syslinux/com32/cmenu/ |
complex.c | 48 t_menuitem *stat, *dhcp, *none, *prepopt, *secret; variable 134 secret->action = OPT_INVISIBLE; 138 secret->action = OPT_SUBMENU; 139 secret->itemdata.submenunum = SECRETMENU; 337 SECRETMENU = add_menu(" Secret Menu ", -1); 338 add_item("secret 1", "Secret", OPT_RUN, "A", 0); 339 add_item("secret 2", "Secret", OPT_RUN, "A", 0); 402 secret [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
chap.c | 428 char secret[MAXSECRETLEN]; local 472 /* get secret for authenticating ourselves with the specified host */ 474 secret, &secret_len, 0)) { 475 secret_len = 0; /* assume null secret if can't find one */ 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n", 494 MD5Update(&mdContext, (u_char*)secret, secret_len); 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 512 BZERO(secret, sizeof(secret)); 528 char secret[MAXSECRETLEN] local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 71 String secret = "secret string"; local 72 SealedObject so = new SealedObject(secret, new NullCipher()); 81 assertEquals("The secret content of deserialized object " 82 + "should be equal to the secret content of initial object", 83 secret, so_des.getObject(new NullCipher())); 95 String secret = "secret string"; local 97 new SealedObject(secret, null); 112 SealedObject so = new SealedObject(secret, cipher) 137 String secret = "secret string"; local 155 String secret = "secret string"; local 170 String secret = "secret string"; local 211 String secret = "secret string"; local 255 String secret = "secret string"; local 300 String secret = "secret string"; local [all...] |
/system/netd/server/ |
InterfaceController.cpp | 71 // Property used to persist RFC 7217 stable secret. Protected by SELinux policy. 74 // RFC 7217 stable secret on linux is formatted as an IPv6 address. 210 std::string secret = oldSecret; local 212 // Generate a new secret if no persistent property existed. 214 ASSIGN_OR_RETURN(secret, randomIPv6Address()); 217 // Ask the OS to generate SLAAC addresses on iface using secret. 218 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret))); 220 // Don't persist an existing secret. 225 return setProperty(kStableSecretProperty, secret);
|