/external/ImageMagick/MagickCore/ |
distribute-cache.c | 201 secret[MagickPathExtent]; 207 shared_secret=GetPolicyValue("shared-secret"); 212 "DistributedPixelCache","'%s'","shared secret expected"); 249 count=recv(client_socket,CHAR_TYPE_CAST secret,MagickPathExtent,0); 256 (void) memcpy(GetStringInfoDatum(nonce),secret,(size_t) count); 804 *secret; 813 shared_secret=GetPolicyValue("shared-secret"); 815 ThrowFatalException(CacheFatalError,"shared secret expected"); 821 secret=GetRandomKey(random_info,DPCSessionKeyLength); 822 (void) memcpy(p,GetStringInfoDatum(secret),DPCSessionKeyLength) 198 secret[MagickPathExtent]; local 253 (void) memcpy(GetStringInfoDatum(nonce),secret,(size_t) count); local 799 *secret; local [all...] |
/external/boringssl/src/ssl/ |
tls13_enc.cc | 43 // Initialize the secret to the zero key. 44 OPENSSL_memset(hs->secret, 0, hs->hash_len); 56 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, 57 psk_len, hs->secret, hs->hash_len); 65 HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, 66 psk_len, hs->secret, hs->hash_len); 70 const uint8_t *secret, size_t secret_len, 92 int ret = HKDF_expand(out, len, digest, secret, secret_len, hkdf_label, 109 if (!hkdf_expand_label(hs->secret, hs->transcript.Digest(), hs->secret, 267 uint8_t *secret; local [all...] |
t1_lib.cc | 825 // Extended Master Secret. 830 // Extended master secret is not necessary in TLS 1.3. 2226 Array<uint8_t> secret; local [all...] |
internal.h | 589 // tls1_prf computes the PRF function for |ssl|. It fills |out|, using |secret| 590 // as the secret and |label| as the label. |seed1| and |seed2| are concatenated 593 Span<const uint8_t> secret, Span<const char> label, 1312 uint8_t secret[EVP_MAX_MD_SIZE] = {0}; member in struct:bssl::SSL_HANDSHAKE [all...] |
/external/curl/lib/ |
pop3.c | 420 char secret[2 * MD5_DIGEST_LEN + 1]; local 446 snprintf(&secret[2 * i], 3, "%02x", digest[i]); 448 result = Curl_pp_sendf(&pop3c->pp, "APOP %s %s", conn->user, secret); [all...] |
/external/dhcpcd-6.8.2/ |
dhcpcd.h | 137 unsigned char secret[SECRET_LEN]; member in struct:dhcpcd_ctx
|
/external/tcpdump/ |
print-esp.c | 118 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 226 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL, 0) < 0) 316 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 382 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 387 if (i < sizeof(sa->secret)) { 388 memcpy(sa->secret, colon, i); 391 memcpy(sa->secret, colon, sizeof(sa->secret)); 392 sa->secretlen = sizeof(sa->secret); 658 u_char *secret; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 1127 const u8 *secret; local 1130 secret = data->get_shared_secret(data->cb_ctx, data->IDr, 1132 if (secret == NULL) { 1133 wpa_printf(MSG_INFO, "IKEV2: Could not get shared secret - " 1149 data->shared_secret = os_memdup(secret, secret_len);
|
/external/mtpd/ |
l2tp.c | 105 static char *secret; variable 271 if (!secret || !vector || length < 2) { 281 MD5_Update(&ctx, secret, secret_length); 289 MD5_Update(&ctx, secret, secret_length); 342 secret = arguments[2]; 380 MD5_Update(&ctx, secret, secret_length); 388 if (secret) { 402 if (secret) { 566 .usage = "<server> <port> <secret>",
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
SyntheticPasswordTests.java | 191 // Check the same secret was passed each time 192 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class); local 193 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture()); 194 assertEquals(1, secret.getAllValues().stream().distinct().count());
|
/system/vold/ |
Ext4Crypt.cpp | 556 std::string token, secret; 558 if (!parse_hex(secret_hex, &secret)) return false; 559 auto auth = secret.empty() ? kEmptyAuthentication 560 : android::vold::KeyAuthentication(token, secret); 599 std::string token, secret; local 601 if (!parse_hex(secret_hex, &secret)) return false; 602 android::vold::KeyAuthentication auth(token, secret); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/ |
FormatterTest.java | 152 private File secret; field in class:FormatterTest [all...] |
/external/ppp/pppd/ |
eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 103 { "srp-pn-secret", o_string, &pn_secret, 104 "Long term pseudonym generation secret" }, 312 * Set DES key according to pseudonym-generating secret and current 1319 char secret[MAXWORDLEN]; local 1729 char secret[MAXSECRETLEN]; local [all...] |
auth.c | 791 error("No secret found for PAP login"); 1504 char secret[MAXWORDLEN]; local 1554 char secret[MAXWORDLEN]; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 631 char *secret; local 633 secret = os_strchr(val, ' '); 634 if (secret == NULL) 637 *secret++ = '\0'; 643 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); 646 bss->radius_das_shared_secret_len = os_strlen(secret); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 1835 struct wpabuf *secret = NULL; local [all...] |
/external/ppp/pppd/plugins/radius/ |
radiusclient.h | 362 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 2159 struct wpabuf *secret, *pub, *hkey; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 4244 struct wpabuf *secret, *pub, *hkey; local [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
LockSettingsService.java | 588 // If the user doesn't have a credential, try and derive their secret for the 589 // AuthSecret HAL. The secret will have been enrolled if the user previously set a 2194 final ArrayList<Byte> secret = new ArrayList<>(rawSecret.length); local [all...] |
/prebuilts/tools/common/m2/repository/org/shredzone/flattr4j/flattr4j-core/2.12/ |
flattr4j-core-2.12.jar | |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
Tpm20.h | 1561 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:__anon10069 [all...] |
/external/tpm2/ |
tpm_types.h | 1385 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:__anon40629::__anon40630 [all...] |
/prebuilts/misc/common/nimbus-jose-jwt/ |
nimbus-jose-jwt-4.33.jar | |
/system/tpm/trunks/ |
tpm_generated.h | 1499 BYTE secret[sizeof(TPMU_ENCRYPTED_SECRET)]; member in struct:trunks::TPM2B_ENCRYPTED_SECRET [all...] |