/external/syslinux/gpxe/src/util/ |
mucurses_test.c | 10 char secret[16]; local 15 get_iscsi_chap_secret(secret); 17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret ); 26 char *title = "Set new iSCSI CHAP secret", 27 *msg = "Configure the iSCSI access secret", 29 WINDOW *secret; local 31 secret = newwin( stdscr->height / 2, 36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' ); 37 mvwprintw( secret, 1, 2, "%s", title ); 38 mvwhline( secret, 2, 1, '-' | secret->attrs, secret->width - 2 ) [all...] |
/hardware/interfaces/authsecret/1.0/default/ |
AuthSecret.cpp | 10 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { 11 (void)secret; 14 // different value from the provided secret for each purpose e.g. 16 // purpose1_secret = hash( "purpose1" || secret ) 17 // purpose2_secret = hash( "purpose2" || secret ) 32 // Note: on factory reset, clear all dependency on the secret. 37 // This implementation does nothing as there is no dependence on the secret.
|
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); 25 secret[0] = 0xAA; 26 secret[1] = 0xBB; 27 secret[2] = 0xCC; 28 secret[3] = 0xDD; 30 std::string result = encoder.EncodeToString(secret); 38 std::string secret("AABBCCDD"); 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret);
|
/hardware/interfaces/authsecret/1.0/ |
IAuthSecret.hal | 27 * When the primary user is unlocked, this method is passed a secret to 32 * The first time this is called, the secret must be used to provision state 33 * that depends on the primary user's secret. The same secret must be passed 36 * Upon factory reset, any dependence on the secret must be removed as that 37 * secret is now lost and must never be derived again. A new secret must be 41 * The secret must be at least 16 bytes. 43 * @param secret blob derived from the primary user's credential. 45 oneway primaryUserCredential(vec<uint8_t> secret); [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); 33 const std::string& secret) const { 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes);
|
hexadecimalencoder.h | 26 // Encodes and decodes secret challenges as hexadecimal strings. 31 const std::vector<uint8_t>& secret) const; 35 const std::string& secret) const;
|
secretencoder.h | 25 // Encodes and decodes secret challenges. The decoded secret is displayed to the 27 // secret is encoded for transmission on the wire and used for computing pairing 33 // Encodes a byte array representation of a secret to a string. 34 // @param secret the secret bytes 35 // @return a string representation of the given secret 37 const std::vector<uint8_t>& secret) const = 0; 39 // Decodes the string representation of the secret to a byte array. 40 // @param secret a string representation of the secre [all...] |
/system/keymaster/include/keymaster/km_openssl/ |
hkdf.h | 35 bool Init(Buffer& secret, Buffer& salt) { 36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(), 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
|
iso18033kdf.h | 37 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { 38 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); 43 * KDF takes a secret and outputs: 45 * hash(secret || start_counter) || hash(secret|| start_counter + 1) || ... 47 * In ANSI-X9-42, KDF takes a secret and additional info, and outputs: 49 * hash(secret || start_counter || info) || hash(secret || start_counter + 1 || info) || ...
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
secretackmessage.cc | 24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretAckMessage::secret() const { function in class:polo::pairing::message::SecretAckMessage 35 ss << "[SecretAckMessage secret="
|
secretmessage.cc | 24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) 26 secret_(secret) { 29 const std::vector<uint8_t>& SecretMessage::secret() const { function in class:polo::pairing::message::SecretMessage 35 ss << "[SecretMessage secret="
|
secretackmessage.h | 27 // Ack for a secret message. 30 // Creates a new ack for the given secret. 31 // @param secret the secret 32 explicit SecretAckMessage(const std::vector<uint8_t>& secret); 34 // Gets the secret. 35 const std::vector<uint8_t>& secret() const;
|
secretmessage.h | 27 // Message used to pass the pairing secret. The secret consists of encoded 31 // Creates a new message for the given secret. 32 // @param secret the secret 33 explicit SecretMessage(const std::vector<uint8_t>& secret); 35 // Gets the secret. 36 const std::vector<uint8_t>& secret() const;
|
/external/wpa_supplicant_8/src/eap_common/ |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 23 addr[1] = secret;
|
chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/external/tpm2/ |
MakeCredential.c | 51 // Make encrypt key and its associated secret structure. 53 out->secret.t.size = sizeof(out->secret.t.secret); 54 result = CryptSecretEncrypt(in->handle, "IDENTITY", &data, &out->secret); 58 // Prepare output credential data from secret
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) [all...] |
/external/scapy/scapy/layers/tls/crypto/ |
prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): 28 - secret : the key to be used. If RFC 4868 is to be believed, 43 a = hm(secret).digest(seed) # A(1) 46 res += hm(secret).digest(a + raw(seed)) 47 a = hm(secret).digest(a) 53 def _tls_P_MD5(secret, seed, req_len): 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len) [all...] |
/external/ipsec-tools/src/racoon/ |
safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/system/keymaster/km_openssl/ |
kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, 40 if (!secret || secret_len == 0) 44 secret_key_.reset(dup_buffer(secret, secret_len));
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 71 String secret = "secret string"; local 72 SealedObject so = new SealedObject(secret, new NullCipher()); 81 assertEquals("The secret content of deserialized object " 82 + "should be equal to the secret content of initial object", 83 secret, so_des.getObject(new NullCipher())); 95 String secret = "secret string"; local 97 new SealedObject(secret, null); 112 SealedObject so = new SealedObject(secret, cipher) 137 String secret = "secret string"; local 155 String secret = "secret string"; local 170 String secret = "secret string"; local 211 String secret = "secret string"; local 255 String secret = "secret string"; local 300 String secret = "secret string"; local [all...] |
/external/ppp/pppd/plugins/radius/ |
sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); [all...] |
/external/nos/host/android/hals/authsecret/test/ |
test.cpp | 35 // sha256( "citadel_update" | 0 | secret ) 82 hidl_vec<uint8_t> secret; local 83 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); 84 hal.primaryUserCredential(secret); 99 hidl_vec<uint8_t> secret; local 100 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); 101 hal.primaryUserCredential(secret); 115 hidl_vec<uint8_t> secret(19); 116 hal.primaryUserCredential(secret); 144 hidl_vec<uint8_t> secret; local [all...] |
/external/boringssl/src/crypto/fipsmodule/tls/ |
internal.h | 29 const uint8_t *secret, size_t secret_len,
|
/external/ppp/pppd/ |
chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, (u_char *)secret, secret_len);
|