/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 106 secretlen = strlen (secret); in rc_pack_list() 110 strcpy ((char *) md5buf, secret); in rc_pack_list() 141 secretlen = strlen (secret); in rc_pack_list() 142 strcpy ((char *) md5buf, secret); in rc_pack_list() 209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local 223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server() 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server() 238 memset (secret, '\0', sizeof (secret)); in rc_send_server() 253 memset (secret, '\0', sizeof (secret)); in rc_send_server() [all …]
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
D | SealedObjectTest.java | 51 String secret = "secret string"; in testReadObject() local 52 SealedObject so = new SealedObject(secret, new NullCipher()); in testReadObject() 63 secret, so_des.getObject(new NullCipher())); in testReadObject() 75 String secret = "secret string"; in testSealedObject1() local 77 new SealedObject(secret, null); in testSealedObject1() 96 String secret = "secret string"; in testSealedObject2() local 98 SealedObject so1 = new SealedObject(secret, cipher); in testSealedObject2() 102 + "to the secret content of initial object.", secret, so2 in testSealedObject2() 114 String secret = "secret string"; in testGetAlgorithm() local 121 SealedObject so = new SealedObject(secret, cipher); in testGetAlgorithm() [all …]
|
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
D | auth_tkt.py | 95 def __init__(self, secret, userid, ip, tokens=(), user_data='', argument 98 self.secret = secret 119 self.ip, self.time, self.secret, self.userid, self.tokens, 150 def parse_ticket(secret, ticket, ip, digest_algo=DEFAULT_DIGEST): argument 179 expected = calculate_digest(ip, timestamp, secret, 193 def calculate_digest(ip, timestamp, secret, userid, tokens, user_data, argument 195 secret = maybe_encode(secret) 200 encode_ip_timestamp(ip, timestamp) + secret + userid + '\0' 202 digest = digest_algo(digest0 + secret).hexdigest() 281 def __init__(self, app, secret, cookie_name='auth_tkt', secure=False, argument [all …]
|
D | cookie.py | 77 secret = ''.join(random.sample(_all_chars, 64)) 79 secret = secret.encode('utf8') 80 return secret 128 def __init__(self, secret = None, timeout = None, maxlen = None): argument 135 self.secret = secret or new_secret() 148 hmac.new(self.secret, content, sha1).digest() + 167 if signature == hmac.new(self.secret, content, sha1).digest(): 255 signer=None, secret=None, timeout=None, maxlen=None): argument 257 signer = self.signer_class(secret, timeout, maxlen) 326 secret=None, argument [all …]
|
/external/google-tv-pairing-protocol/cpp/tests/polo/encoding/ |
D | hexadecimalencodertest.cc | 24 std::vector<unsigned char> secret(4); in TEST() local 25 secret[0] = 0xAA; in TEST() 26 secret[1] = 0xBB; in TEST() 27 secret[2] = 0xCC; in TEST() 28 secret[3] = 0xDD; in TEST() 30 std::string result = encoder.EncodeToString(secret); in TEST() 38 std::string secret("AABBCCDD"); in TEST() local 40 std::vector<unsigned char> result = encoder.DecodeToBytes(secret); in TEST()
|
/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() argument 216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response() 242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument 257 (char *)secret, secret_len, md, in chapms2_verify_response() 319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument 324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response() 385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument 404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response() 579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument 597 MD4Update(&md4Context, secret, 512); in NTPasswordHash() [all …]
|
D | auth.c | 1381 char secret[MAXWORDLEN]; 1425 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1432 int login_secret = strcmp(secret, "@login") == 0; 1445 if (secret[0] != 0 && !login_secret) { 1447 if (cryptpap || strcmp(passwd, secret) != 0) { 1448 char *cbuf = crypt(passwd, secret); 1449 if (!cbuf || strcmp(cbuf, secret) != 0) 1485 BZERO(secret, sizeof(secret)); 1504 char secret[MAXWORDLEN]; local 1524 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0); [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
|
/external/boringssl/src/ssl/ |
D | ssl_ecdh.c | 113 uint8_t *secret = NULL; in ssl_ec_point_compute_secret() local 139 secret = OPENSSL_malloc(secret_len); in ssl_ec_point_compute_secret() 140 if (secret == NULL || !BN_bn2bin_padded(secret, secret_len, x)) { in ssl_ec_point_compute_secret() 144 *out_secret = secret; in ssl_ec_point_compute_secret() 146 secret = NULL; in ssl_ec_point_compute_secret() 155 OPENSSL_free(secret); in ssl_ec_point_compute_secret() 190 uint8_t *secret = OPENSSL_malloc(32); in ssl_x25519_compute_secret() local 191 if (secret == NULL) { in ssl_x25519_compute_secret() 196 !X25519(secret, (uint8_t *)ctx->data, peer_key)) { in ssl_x25519_compute_secret() 197 OPENSSL_free(secret); in ssl_x25519_compute_secret() [all …]
|
/external/google-tv-pairing-protocol/cpp/tests/polo/wire/protobuf/ |
D | protobufwireadaptertest.cc | 260 std::vector<unsigned char> secret(4); in TEST_F() local 261 secret[0] = 0xAA; in TEST_F() 262 secret[1] = 0xBB; in TEST_F() 263 secret[2] = 0xCC; in TEST_F() 264 secret[3] = 0xDD; in TEST_F() 267 proto.set_secret(&secret[0], secret.size()); in TEST_F() 277 pairing::message::SecretMessage message(secret); in TEST_F() 285 std::vector<unsigned char> secret(4); in TEST_F() local 286 secret[0] = 0xAA; in TEST_F() 287 secret[1] = 0xBB; in TEST_F() [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.h | 230 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 232 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 234 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 237 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 239 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 255 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 262 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 365 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 368 if (secret) { in radius_msg_finish() 382 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 396 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 414 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 424 addr[3] = secret; in radius_msg_finish_srv() 437 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 456 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 462 addr[1] = secret; in radius_msg_finish_das_resp() 476 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 201 protected static byte[] trimZeroes(byte[] secret) in trimZeroes() argument 203 if (secret[0] != 0) in trimZeroes() 205 return secret; in trimZeroes() 210 while (ind < secret.length && secret[ind] == 0) in trimZeroes() 215 byte[] rv = new byte[secret.length - ind]; in trimZeroes() 217 System.arraycopy(secret, ind, rv, 0, rv.length); in trimZeroes() 240 byte[] secret = engineGenerateSecret(); in engineGenerateSecret() 242 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() 244 … throw new ShortBufferException(kaAlgorithm + " key agreement: need " + secret.length + " bytes"); in engineGenerateSecret() 247 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); in engineGenerateSecret() [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | prf.go | 19 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) { 20 s1 = secret[0 : (len(secret)+1)/2] 21 s2 = secret[len(secret)/2:] 26 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument 27 h := hmac.New(hash, secret) 51 func prf10(result, secret, label, seed []byte) { argument 59 s1, s2 := splitPreMasterSecret(secret) 70 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) { 71 return func(result, secret, label, seed []byte) { 76 pHash(result, secret, labelAndSeed, hashFunc) [all …]
|
/external/google-tv-pairing-protocol/cpp/src/polo/encoding/ |
D | hexadecimalencoder.cc | 28 const std::vector<uint8_t>& secret) const { in EncodeToString() 29 return polo::util::PoloUtil::BytesToHexString(&secret[0], secret.size()); in EncodeToString() 33 const std::string& secret) const { in DecodeToBytes() 35 size_t length = polo::util::PoloUtil::HexStringToBytes(secret, bytes); in DecodeToBytes()
|
/external/curl/tests/data/ |
D | test836 | 15 REPLY "LOGIN user.one secret" A002 OK LOGIN completed 16 REPLY "LOGIN user.two secret" B002 OK LOGIN completed 39 …/%HOSTIP:%IMAPPORT/836/;UID=1' -u user.one:secret -: 'imap://%HOSTIP:%IMAPPORT/836/;UID=2' -u user… 48 A002 LOGIN user.one secret 53 B002 LOGIN user.two secret
|
D | test882 | 15 REPLY "PASS secret" +OK Login successful 38 pop3://%HOSTIP:%POP3PORT/882001 -u user.one:secret -: pop3://%HOSTIP:%POP3PORT/882002 -u user.two:s… 48 PASS secret 53 PASS secret
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
D | pairingsession.cc | 90 bool PairingSession::SetSecret(const Gamma& secret) { in SetSecret() argument 91 secret_ = new Gamma(secret); in SetSecret() 98 if (!challenge().CheckGamma(secret)) { in SetSecret() 103 nonce_ = challenge().ExtractNonce(secret); in SetSecret() 224 if (!VerifySecret(message.secret())) { in OnSecretMessage() 248 if (kVerifySecretAck && !VerifySecret(message.secret())) { in OnSecretAckMessage() 261 bool PairingSession::VerifySecret(const Alpha& secret) const { in VerifySecret() 273 bool valid = (secret == *gen_alpha); in VerifySecret() 279 << util::PoloUtil::BytesToHexString(&secret[0], secret.size()) in VerifySecret()
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
D | protobufwireadapter.cc | 134 Secret secret; in SendSecretMessage() local 135 secret.set_secret(&message.secret()[0], message.secret().size()); in SendSecretMessage() 138 secret.SerializeAsString()); in SendSecretMessage() 146 ack.set_secret(&message.secret()[0], message.secret().size()); in SendSecretAckMessage() 330 Secret secret; in ParseSecretMessage() local 331 if (!secret.ParseFromString(payload)) { in ParseSecretMessage() 337 const std::vector<uint8_t> secret_bytes(secret.secret().begin(), in ParseSecretMessage() 338 secret.secret().end()); in ParseSecretMessage() 352 std::vector<uint8_t> secret_bytes(ack.secret().begin(), in ParseSecretAckMessage() 353 ack.secret().end()); in ParseSecretAckMessage()
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/ |
D | tsigkeyring.py | 30 secret = base64.decodestring(textring[keytext]) 31 keyring[keyname] = secret 42 secret = base64.encodestring(keyring[keyname]) 43 textring[keytext] = secret
|
/external/tcpdump/ |
D | print-esp.c | 118 u_char secret[256]; /* is that big enough for all secrets? */ member 163 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2() 300 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo() 305 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo() 306 memcpy(sa->secret, colon, i); in espprint_decode_encalgo() 309 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo() 310 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo() 574 u_char *secret; in esp_print() local 584 secret = NULL; in esp_print() 590 p = (u_char *)&secret; in esp_print() [all …]
|
/external/libweave/src/ |
D | config.h | 37 std::vector<uint8_t> secret; member 63 void set_client_secret(const std::string& secret) { in set_client_secret() argument 64 settings_->client_secret = secret; in set_client_secret() 100 void set_secret(const std::vector<uint8_t>& secret) { in set_secret() argument 101 settings_->secret = secret; in set_secret()
|
/external/tpm2/ |
D | MakeCredential.c | 53 out->secret.t.size = sizeof(out->secret.t.secret); in TPM2_MakeCredential() 54 result = CryptSecretEncrypt(in->handle, "IDENTITY", &data, &out->secret); in TPM2_MakeCredential()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha256-tlsprf.c | 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256() 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256() 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
|
/external/libweave/src/privet/ |
D | auth_manager.cc | 155 std::vector<uint8_t> secret(kSha256OutputSize); in CreateSecret() local 156 base::RandBytes(secret.data(), secret.size()); in CreateSecret() 157 return secret; in CreateSecret() 165 const std::vector<uint8_t>& secret, in CreateMacaroonToken() argument 168 CHECK_EQ(kSha256OutputSize, secret.size()); in CreateMacaroonToken() 174 CHECK(uw_macaroon_create_from_root_key_(&macaroon, secret.data(), in CreateMacaroonToken() 175 secret.size(), &context, in CreateMacaroonToken() 228 bool VerifyMacaroon(const std::vector<uint8_t>& secret, in VerifyMacaroon() argument 233 CHECK_EQ(kSha256OutputSize, secret.size()); in VerifyMacaroon() 237 if (!uw_macaroon_validate_(&macaroon, secret.data(), secret.size(), &context, in VerifyMacaroon() [all …]
|