Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 104) sorted by relevance

12345

/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/
DSealedObjectTest.java51 String secret = "secret string"; in testReadObject() local
52 SealedObject so = new SealedObject(secret, new NullCipher()); in testReadObject()
63 secret, so_des.getObject(new NullCipher())); in testReadObject()
75 String secret = "secret string"; in testSealedObject1() local
77 new SealedObject(secret, null); in testSealedObject1()
96 String secret = "secret string"; in testSealedObject2() local
98 SealedObject so1 = new SealedObject(secret, cipher); in testSealedObject2()
102 + "to the secret content of initial object.", secret, so2 in testSealedObject2()
114 String secret = "secret string"; in testGetAlgorithm() local
121 SealedObject so = new SealedObject(secret, cipher); in testGetAlgorithm()
[all …]
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
106 secretlen = strlen (secret); in rc_pack_list()
110 strcpy ((char *) md5buf, secret); in rc_pack_list()
141 secretlen = strlen (secret); in rc_pack_list()
142 strcpy ((char *) md5buf, secret); in rc_pack_list()
209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local
223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server()
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server()
238 memset (secret, '\0', sizeof (secret)); in rc_send_server()
253 memset (secret, '\0', sizeof (secret)); in rc_send_server()
[all …]
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/
Dhexadecimalencodertest.cc24 std::vector<unsigned char> secret(4); in TEST() local
25 secret[0] = 0xAA; in TEST()
26 secret[1] = 0xBB; in TEST()
27 secret[2] = 0xCC; in TEST()
28 secret[3] = 0xDD; in TEST()
30 std::string result = encoder.EncodeToString(secret); in TEST()
38 std::string secret("AABBCCDD"); in TEST() local
40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret); in TEST()
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
Dauth_tkt.py95 def __init__(self, secret, userid, ip, tokens=(), user_data='', argument
98 self.secret = secret
119 self.ip, self.time, self.secret, self.userid, self.tokens,
150 def parse_ticket(secret, ticket, ip, digest_algo=DEFAULT_DIGEST): argument
179 expected = calculate_digest(ip, timestamp, secret,
193 def calculate_digest(ip, timestamp, secret, userid, tokens, user_data, argument
195 secret = maybe_encode(secret)
200 encode_ip_timestamp(ip, timestamp) + secret + userid + '\0'
202 digest = digest_algo(digest0 + secret).hexdigest()
281 def __init__(self, app, secret, cookie_name='auth_tkt', secure=False, argument
[all …]
Dcookie.py77 secret = ''.join(random.sample(_all_chars, 64))
79 secret = secret.encode('utf8')
80 return secret
128 def __init__(self, secret = None, timeout = None, maxlen = None): argument
135 self.secret = secret or new_secret()
148 hmac.new(self.secret, content, sha1).digest() +
167 if signature == hmac.new(self.secret, content, sha1).digest():
255 signer=None, secret=None, timeout=None, maxlen=None): argument
257 signer = self.signer_class(secret, timeout, maxlen)
326 secret=None, argument
[all …]
/external/ppp/pppd/
Dchap_ms.c194 unsigned char *secret, int secret_len, in chapms_verify_response() argument
216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response()
242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument
257 (char *)secret, secret_len, md, in chapms2_verify_response()
319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument
324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response()
385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument
404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response()
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument
597 MD4Update(&md4Context, secret, 512); in NTPasswordHash()
[all …]
Dchap-md5.c58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
Dauth.c1381 char secret[MAXWORDLEN];
1425 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1432 int login_secret = strcmp(secret, "@login") == 0;
1445 if (secret[0] != 0 && !login_secret) {
1447 if (cryptpap || strcmp(passwd, secret) != 0) {
1448 char *cbuf = crypt(passwd, secret);
1449 if (!cbuf || strcmp(cbuf, secret) != 0)
1485 BZERO(secret, sizeof(secret));
1504 char secret[MAXWORDLEN]; local
1524 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0);
[all …]
/external/google-tv-pairing-protocol/cpp/tests/polo/wire/protobuf/
Dprotobufwireadaptertest.cc260 std::vector<unsigned char> secret(4); in TEST_F() local
261 secret[0] = 0xAA; in TEST_F()
262 secret[1] = 0xBB; in TEST_F()
263 secret[2] = 0xCC; in TEST_F()
264 secret[3] = 0xDD; in TEST_F()
267 proto.set_secret(&secret[0], secret.size()); in TEST_F()
277 pairing::message::SecretMessage message(secret); in TEST_F()
285 std::vector<unsigned char> secret(4); in TEST_F() local
286 secret[0] = 0xAA; in TEST_F()
287 secret[1] = 0xBB; in TEST_F()
[all …]
/external/wpa_supplicant_8/src/radius/
Dradius.h224 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
226 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
228 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
231 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
233 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
236 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
238 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
246 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
249 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
257 const u8 *secret, size_t secret_len);
[all …]
Dradius.c362 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
365 if (secret) { in radius_msg_finish()
379 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
393 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
411 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
421 addr[3] = secret; in radius_msg_finish_srv()
434 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
453 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
459 addr[1] = secret; in radius_msg_finish_das_resp()
473 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/external/boringssl/src/ssl/test/runner/
Dprf.go19 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) {
20 s1 = secret[0 : (len(secret)+1)/2]
21 s2 = secret[len(secret)/2:]
26 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument
27 h := hmac.New(hash, secret)
51 func prf10(result, secret, label, seed []byte) { argument
59 s1, s2 := splitPreMasterSecret(secret)
70 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
71 return func(result, secret, label, seed []byte) {
76 pHash(result, secret, labelAndSeed, hashFunc)
[all …]
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/
Dhexadecimalencoder.cc28 const std::vector<uint8_t>& secret) const { in EncodeToString()
29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); in EncodeToString()
33 const std::string& secret) const { in DecodeToBytes()
35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes); in DecodeToBytes()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
DKeyAgreementSpi.java193 byte[] secret = engineGenerateSecret(); in engineGenerateSecret()
195 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret()
197 … throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); in engineGenerateSecret()
200 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret()
202 return secret.length; in engineGenerateSecret()
209 byte[] secret = bigIntToBytes(result); in engineGenerateSecret()
244 System.arraycopy(secret, 0, key, 0, key.length); in engineGenerateSecret()
246 secret = key; in engineGenerateSecret()
252 DESParameters.setOddParity(secret); in engineGenerateSecret()
255 return new SecretKeySpec(secret, algorithm); in engineGenerateSecret()
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
Dpairingsession.cc90 bool PairingSession::SetSecret(const Gamma& secret) { in SetSecret() argument
91 secret_ = new Gamma(secret); in SetSecret()
98 if (!challenge().CheckGamma(secret)) { in SetSecret()
103 nonce_ = challenge().ExtractNonce(secret); in SetSecret()
224 if (!VerifySecret(message.secret())) { in OnSecretMessage()
248 if (kVerifySecretAck && !VerifySecret(message.secret())) { in OnSecretAckMessage()
261 bool PairingSession::VerifySecret(const Alpha& secret) const { in VerifySecret()
273 bool valid = (secret == *gen_alpha); in VerifySecret()
279 << util::PoloUtil::BytesToHexString(&secret[0], secret.size()) in VerifySecret()
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/
Dprotobufwireadapter.cc134 Secret secret; in SendSecretMessage() local
135 secret.set_secret(&message.secret()[0], message.secret().size()); in SendSecretMessage()
138 secret.SerializeAsString()); in SendSecretMessage()
146 ack.set_secret(&message.secret()[0], message.secret().size()); in SendSecretAckMessage()
330 Secret secret; in ParseSecretMessage() local
331 if (!secret.ParseFromString(payload)) { in ParseSecretMessage()
337 const std::vector<uint8_t> secret_bytes(secret.secret().begin(), in ParseSecretMessage()
338 secret.secret().end()); in ParseSecretMessage()
352 std::vector<uint8_t> secret_bytes(ack.secret().begin(), in ParseSecretAckMessage()
353 ack.secret().end()); in ParseSecretAckMessage()
/external/tcpdump/
Dprint-esp.c89 u_char secret[256]; /* is that big enough for all secrets? */ member
134 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2()
271 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo()
276 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo()
277 memcpy(sa->secret, colon, i); in espprint_decode_encalgo()
280 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo()
281 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
556 u_char *secret; in esp_print() local
566 secret = NULL; in esp_print()
572 p = (u_char *)&secret; in esp_print()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha256-tlsprf.c29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256()
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256()
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
Dsha256-kdf.c29 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
48 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
69 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
Dsha1-tlsprf.c30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
67 S1 = secret; in tls_prf_sha1_md5()
68 S2 = secret + L_S1; in tls_prf_sha1_md5()
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/
Dsecretackmessage.cc24 SecretAckMessage::SecretAckMessage(const std::vector<uint8_t>& secret) in SecretAckMessage() argument
26 secret_(secret) { in SecretAckMessage()
29 const std::vector<uint8_t>& SecretAckMessage::secret() const { in secret() function in polo::pairing::message::SecretAckMessage
Dsecretmessage.cc24 SecretMessage::SecretMessage(const std::vector<uint8_t>& secret) in SecretMessage() argument
26 secret_(secret) { in SecretMessage()
29 const std::vector<uint8_t>& SecretMessage::secret() const { in secret() function in polo::pairing::message::SecretMessage
/external/ipsec-tools/src/racoon/
Dsafefile.c48 safefile(path, secret) in safefile() argument
50 int secret;
84 if (secret) {
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/
DKeyAgreementSpi.java138 byte[] secret = bigIntToBytes(result); in engineGenerateSecret()
140 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret()
145 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret()
147 return secret.length; in engineGenerateSecret()
/external/wpa_supplicant_8/hostapd/
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase

12345