HomeSort by relevance Sort by last modified time
    Searched defs:secret (Results 26 - 50 of 76) sorted by null

12 3 4

  /external/ImageMagick/MagickCore/
distribute-cache.c 201 secret[MagickPathExtent];
207 shared_secret=GetPolicyValue("shared-secret");
212 "DistributedPixelCache","'%s'","shared secret expected");
249 count=recv(client_socket,CHAR_TYPE_CAST secret,MagickPathExtent,0);
256 (void) memcpy(GetStringInfoDatum(nonce),secret,(size_t) count);
804 *secret;
813 shared_secret=GetPolicyValue("shared-secret");
815 ThrowFatalException(CacheFatalError,"shared secret expected");
821 secret=GetRandomKey(random_info,DPCSessionKeyLength);
822 (void) memcpy(p,GetStringInfoDatum(secret),DPCSessionKeyLength)
198 secret[MagickPathExtent]; local
253 (void) memcpy(GetStringInfoDatum(nonce),secret,(size_t) count); local
799 *secret; local
    [all...]
  /external/boringssl/src/ssl/
tls13_enc.cc 43 // Initialize the secret to the zero key.
44 OPENSSL_memset(hs->secret, 0, hs->hash_len);
56 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk,
57 psk_len, hs->secret, hs->hash_len);
65 HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk,
66 psk_len, hs->secret, hs->hash_len);
70 const uint8_t *secret, size_t secret_len,
92 int ret = HKDF_expand(out, len, digest, secret, secret_len, hkdf_label,
109 if (!hkdf_expand_label(hs->secret, hs->transcript.Digest(), hs->secret,
267 uint8_t *secret; local
    [all...]
t1_lib.cc 825 // Extended Master Secret.
830 // Extended master secret is not necessary in TLS 1.3.
2226 Array<uint8_t> secret; local
    [all...]
internal.h 589 // tls1_prf computes the PRF function for |ssl|. It fills |out|, using |secret|
590 // as the secret and |label| as the label. |seed1| and |seed2| are concatenated
593 Span<const uint8_t> secret, Span<const char> label,
1312 uint8_t secret[EVP_MAX_MD_SIZE] = {0}; member in struct:bssl::SSL_HANDSHAKE
    [all...]
  /external/curl/lib/
pop3.c 420 char secret[2 * MD5_DIGEST_LEN + 1]; local
446 snprintf(&secret[2 * i], 3, "%02x", digest[i]);
448 result = Curl_pp_sendf(&pop3c->pp, "APOP %s %s", conn->user, secret);
    [all...]
  /external/dhcpcd-6.8.2/
dhcpcd.h 137 unsigned char secret[SECRET_LEN]; member in struct:dhcpcd_ctx
  /external/tcpdump/
print-esp.c 118 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
226 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL, 0) < 0)
316 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
382 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
387 if (i < sizeof(sa->secret)) {
388 memcpy(sa->secret, colon, i);
391 memcpy(sa->secret, colon, sizeof(sa->secret));
392 sa->secretlen = sizeof(sa->secret);
658 u_char *secret; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 1127 const u8 *secret; local
1130 secret = data->get_shared_secret(data->cb_ctx, data->IDr,
1132 if (secret == NULL) {
1133 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - "
1149 data->shared_secret = os_memdup(secret, secret_len);
  /external/mtpd/
l2tp.c 105 static char *secret; variable
271 if (!secret || !vector || length < 2) {
281 MD5_Update(&ctx, secret, secret_length);
289 MD5_Update(&ctx, secret, secret_length);
342 secret = arguments[2];
380 MD5_Update(&ctx, secret, secret_length);
388 if (secret) {
402 if (secret) {
566 .usage = "<server> <port> <secret>",
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
SyntheticPasswordTests.java 191 // Check the same secret was passed each time
192 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); local
193 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture());
194 assertEquals(1, secret.getAllValues().stream().distinct().count());
  /system/vold/
Ext4Crypt.cpp 556 std::string token, secret;
558 if (!parse_hex(secret_hex, &secret)) return false;
559 auto auth = secret.empty() ? kEmptyAuthentication
560 : android::vold::KeyAuthentication(token, secret);
599 std::string token, secret; local
601 if (!parse_hex(secret_hex, &secret)) return false;
602 android::vold::KeyAuthentication auth(token, secret);
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/
FormatterTest.java 152 private File secret; field in class:FormatterTest
    [all...]
  /external/ppp/pppd/
eap.c 83 static char *pn_secret = NULL; /* Pseudonym generating secret */
103 { "srp-pn-secret", o_string, &pn_secret,
104 "Long term pseudonym generation secret" },
312 * Set DES key according to pseudonym-generating secret and current
1319 char secret[MAXWORDLEN]; local
1729 char secret[MAXSECRETLEN]; local
    [all...]
auth.c 791 error("No secret found for PAP login");
1504 char secret[MAXWORDLEN]; local
1554 char secret[MAXWORDLEN]; local
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 631 char *secret; local
633 secret = os_strchr(val, ' ');
634 if (secret == NULL)
637 *secret++ = '\0';
643 bss->radius_das_shared_secret = (u8 *) os_strdup(secret);
646 bss->radius_das_shared_secret_len = os_strlen(secret);
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 1835 struct wpabuf *secret = NULL; local
    [all...]
  /external/ppp/pppd/plugins/radius/
radiusclient.h 362 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 2159 struct wpabuf *secret, *pub, *hkey; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 4244 struct wpabuf *secret, *pub, *hkey; local
    [all...]
  /frameworks/base/services/core/java/com/android/server/locksettings/
LockSettingsService.java 588 // If the user doesn't have a credential, try and derive their secret for the
589 // AuthSecret HAL. The secret will have been enrolled if the user previously set a
2194 final ArrayList<Byte> secret = new ArrayList<>(rawSecret.length); local
    [all...]
  /prebuilts/tools/common/m2/repository/org/shredzone/flattr4j/flattr4j-core/2.12/
flattr4j-core-2.12.jar 
  /device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/
Tpm20.h 1561 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:__anon10069
    [all...]
  /external/tpm2/
tpm_types.h 1385 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:__anon40629::__anon40630
    [all...]
  /prebuilts/misc/common/nimbus-jose-jwt/
nimbus-jose-jwt-4.33.jar 
  /system/tpm/trunks/
tpm_generated.h 1499 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:trunks::TPM2B_ENCRYPTED_SECRET
    [all...]

Completed in 831 milliseconds

12 3 4