HomeSort by relevance Sort by last modified time
    Searched defs:secret (Results 1 - 25 of 76) sorted by null

1 2 3 4

  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/
secretackmessage.cc 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret)
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage
35 ss << "[SecretAckMessage secret="
secretmessage.cc 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret)
26 secret_(secret) {
29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage
35 ss << "[SecretMessage secret="
  /system/vold/
KeyStorage.h 29 // If "token" and "secret" are nonempty, "secret" is appended to the application-specific
31 // If only "secret" is nonempty, it is used to decrypt in a non-Keymaster process.
34 KeyAuthentication(std::string t, std::string s) : token{t}, secret{s} {};
36 bool usesKeymaster() const { return !token.empty() || secret.empty(); };
39 const std::string secret; member in class:android::vold::KeyAuthentication
  /external/nos/host/android/hals/authsecret/test/
test.cpp 35 // sha256( "citadel_update" | 0 | secret )
82 hidl_vec<uint8_t> secret; local
83 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1);
84 hal.primaryUserCredential(secret);
99 hidl_vec<uint8_t> secret; local
100 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1);
101 hal.primaryUserCredential(secret);
115 hidl_vec<uint8_t> secret(19);
116 hal.primaryUserCredential(secret);
144 hidl_vec<uint8_t> secret; local
    [all...]
  /external/syslinux/gpxe/src/util/
mucurses_test.c 10 char secret[16]; local
15 get_iscsi_chap_secret(secret);
17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret );
26 char *title = "Set new iSCSI CHAP secret",
27 *msg = "Configure the iSCSI access secret",
29 WINDOW *secret; local
31 secret = newwin( stdscr->height / 2,
36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' );
37 mvwprintw( secret, 1, 2, "%s", title );
38 mvwhline( secret, 2, 1, '-' | secret->attrs, secret->width - 2 )
    [all...]
  /external/tpm2/
ActivateCredential_fp.h 16 TPM2B_ENCRYPTED_SECRET secret; member in struct:__anon40309
MakeCredential_fp.h 20 TPM2B_ENCRYPTED_SECRET secret; member in struct:__anon40420
  /external/boringssl/src/ssl/
ssl_key_share.cc 115 Array<uint8_t> secret; variable
116 if (!secret.Init((EC_GROUP_get_degree(group.get()) + 7) / 8) ||
117 !BN_bn2bin_padded(secret.data(), secret.size(), x)) {
121 *out_secret = std::move(secret);
150 Array<uint8_t> secret; variable
151 if (!secret.Init(32)) {
157 !X25519(secret.data(), private_key_, peer_key.data())) {
163 *out_secret = std::move(secret);
  /external/iproute2/ip/
ipseg6.c 30 #define HMAC_KEY_PROMPT "Enter secret for HMAC key ID (blank to delete): "
80 char secret[64]; local
85 memset(secret, 0, 64);
88 fprintf(stderr, "HMAC secret length %d > 63, "
92 memcpy(secret, RTA_DATA(attrs[SEG6_ATTR_SECRET]), slen);
108 fprintf(fp, "secret \"%s\" ", secret);
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
CachedSyntheticPasswordTests.java 110 // Ensure the same secret was passed each time
111 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); local
112 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture());
113 assertEquals(1, secret.getAllValues().stream().distinct().count());
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/PyMod-2.7.10/Python/
random.c 99 "secret using CryptoGen)");
155 "secret using RAND_pseudo_bytes");
377 void *secret = &_Py_HashSecret; local
391 memset(secret, 0, secret_size);
396 Hash randomization is enabled. Generate a per-process secret,
414 memset(secret, 0, secret_size);
417 lcg_urandom(seed, (unsigned char*)secret, secret_size);
422 (void)win32_urandom((unsigned char *)secret, secret_size, 0);
424 vms_urandom((unsigned char *)secret, secret_size, 0);
426 (void)py_getentropy(secret, secret_size, 1);
    [all...]
  /external/clang/test/Index/
annotate-nested-name-specifier.cpp 46 namespace secret { namespace in namespace:outer::inner
51 using namespace outer_alias::inner::secret;
52 namespace super_secret = outer_alias::inner::secret;
238 // CHECK: Identifier: "secret" [51:37 - 51:43] NamespaceRef=secret:46:15
248 // CHECK: Identifier: "secret" [52:46 - 52:52] NamespaceRef=secret:46:15
  /external/mdnsresponder/mDNSWindows/ControlPanel/
RegistrationPage.cpp 18 #include <Secret.h>
297 BOOL secret = FALSE; local
312 secret = TRUE;
323 if ( secret )
377 if ( secret )
  /external/python/cpython2/Python/
random.c 90 "secret using CryptoGen)");
150 "secret using RAND_pseudo_bytes");
358 void *secret = &_Py_HashSecret; local
372 memset(secret, 0, secret_size);
377 Hash randomization is enabled. Generate a per-process secret,
395 memset(secret, 0, secret_size);
398 lcg_urandom(seed, (unsigned char*)secret, secret_size);
403 (void)win32_urandom((unsigned char *)secret, secret_size, 0);
405 vms_urandom((unsigned char *)secret, secret_size, 0);
407 (void)py_getentropy(secret, secret_size, 1)
    [all...]
  /external/python/cpython3/Python/
random.c 438 startup to initialize its hash secret, but os.urandom() must block until the
540 unsigned char *secret = (unsigned char *)&_Py_HashSecret.uc; local
549 Hash randomization is enabled. Generate a per-process secret,
567 memset(secret, 0, secret_size);
570 lcg_urandom(seed, secret, secret_size);
581 res = pyurandom(secret, secret_size, 0, 0);
  /external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/
XmlMessageBuilder.java 96 private static final String MESSAGE_CONTAINER_NAME_SECRET = "secret";
172 case SECRET:
346 String secret; local
348 secret = body.getJSONObject(MESSAGE_CONTAINER_NAME_SECRET)
353 byte[] secretBytes = PoloUtil.hexStringToBytes(secret);
562 JSONObject secret = new JSONObject(); local
564 secret.put(SECRET_FIELD_SECRET, bytesStr);
565 jsonObj.put(MESSAGE_CONTAINER_NAME_SECRET, secret);
  /external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/
protobufwireadapter.cc 134 Secret secret; local
135 secret.set_secret(&message.secret()[0], message.secret().size());
138 secret.SerializeAsString());
146 ack.set_secret(&message.secret()[0], message.secret().size());
330 Secret secret; local
    [all...]
  /external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/
ProtobufWireAdapter.java 165 return PoloProto.Secret.parseFrom(payload);
217 } else if (message instanceof PoloProto.Secret) {
422 * Converts a {@link SecretMessage} to a {@link PoloProto.Secret}.
424 private PoloProto.Secret toProto(SecretMessage poloMessage) {
425 PoloProto.Secret secret = new PoloProto.Secret(); local
426 secret.secret = poloMessage.getSecret();
427 return secret;
    [all...]
  /external/oauth/core/src/main/java/net/oauth/signature/
OAuthSignatureMethod.java 92 String secret = accessor.consumer.consumerSecret; local
94 // This code supports the 'Accessor Secret' extensions
102 secret = accessorSecret.toString();
105 if (secret == null) {
106 secret = "";
108 setConsumerSecret(secret);
  /external/ppp/pppd/
chap-new.c 418 unsigned char secret[MAXSECRETLEN]; local
421 /* Get the secret that the peer is supposed to know */
422 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
423 error("No CHAP secret found for authenticating %q", name);
427 ok = digest->verify_response(id, name, secret, secret_len, challenge,
429 memset(secret, 0, sizeof(secret));
446 char secret[MAXSECRETLEN+1]; local
462 /* get secret for authenticating ourselves with the specified host */
463 if (!get_secret(0, cs->name, rname, secret, &secret_len, 0))
    [all...]
  /external/ppp/pppd/plugins/radius/
sendserver.c 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth)
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
    [all...]
  /external/syslinux/com32/cmenu/
complex.c 48 t_menuitem *stat, *dhcp, *none, *prepopt, *secret; variable
134 secret->action = OPT_INVISIBLE;
138 secret->action = OPT_SUBMENU;
139 secret->itemdata.submenunum = SECRETMENU;
337 SECRETMENU = add_menu(" Secret Menu ", -1);
338 add_item("secret 1", "Secret", OPT_RUN, "A", 0);
339 add_item("secret 2", "Secret", OPT_RUN, "A", 0);
402 secret
    [all...]
  /external/syslinux/core/lwip/src/netif/ppp/
chap.c 428 char secret[MAXSECRETLEN]; local
472 /* get secret for authenticating ourselves with the specified host */
474 secret, &secret_len, 0)) {
475 secret_len = 0; /* assume null secret if can't find one */
476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
494 MD5Update(&mdContext, (u_char*)secret, secret_len);
503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
512 BZERO(secret, sizeof(secret));
528 char secret[MAXSECRETLEN] local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
SealedObjectTest.java 71 String secret = "secret string"; local
72 SealedObject so = new SealedObject(secret, new NullCipher());
81 assertEquals("The secret content of deserialized object "
82 + "should be equal to the secret content of initial object",
83 secret, so_des.getObject(new NullCipher()));
95 String secret = "secret string"; local
97 new SealedObject(secret, null);
112 SealedObject so = new SealedObject(secret, cipher)
137 String secret = "secret string"; local
155 String secret = "secret string"; local
170 String secret = "secret string"; local
211 String secret = "secret string"; local
255 String secret = "secret string"; local
300 String secret = "secret string"; local
    [all...]
  /system/netd/server/
InterfaceController.cpp 71 // Property used to persist RFC 7217 stable secret. Protected by SELinux policy.
74 // RFC 7217 stable secret on linux is formatted as an IPv6 address.
210 std::string secret = oldSecret; local
212 // Generate a new secret if no persistent property existed.
214 ASSIGN_OR_RETURN(secret, randomIPv6Address());
217 // Ask the OS to generate SLAAC addresses on iface using secret.
218 RETURN_IF_NOT_OK(sys.write(procFd.value(), makeSlice(secret)));
220 // Don't persist an existing secret.
225 return setProperty(kStableSecretProperty, secret);

Completed in 536 milliseconds

1 2 3 4