| /third_party/openssl/providers/implementations/kdfs/ |
| H A D | x942kdf.c | 40 unsigned char *secret; member
|
| /third_party/openssl/test/ |
| H A D | cmp_protect_test.c | 282 static unsigned char secret[] = { 47, 11, 8, 15 }; in test_MSG_protect_pbmac_no_sender() local
|
| H A D | evp_libctx_test.c | 528 unsigned char secret[256] = { 0, }; in kem_rsa_gen_recover() local 594 unsigned char secret[256] = { 0, }; in kem_rsa_params() local [all...] |
| H A D | tls-provider.c | 265 static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen, in xor_derive() argument
|
| H A D | evp_kdf_test.c | 37 static OSSL_PARAM *construct_tls1_prf_params(const char *digest, const char *secret, in construct_tls1_prf_params() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | crypto_libtomcrypt.c | 726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | ikev2.c | 1127 const u8 *secret; in ikev2_build_sa_auth() local
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | crypto_libtomcrypt.c | 726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | ikev2.c | 1127 const u8 *secret; in ikev2_build_sa_auth() local
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | pasn_supplicant.c | 1350 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpas_pasn_auth_rx() local
|
| /base/account/os_account/services/accountmgr/src/appaccount/ |
| H A D | app_account_control_manager.cpp | 116 AssetAttr *secret = AssetParseAttr(resultSet.results, SEC_ASSET_TAG_SECRET); in GetDataFromAsset() local
|
| /base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
| H A D | dl_speke_protocol.c | 256 static int32_t CalSecret(DlSpekeParams *params, Uint8Buff *secret) in CalSecret() argument 287 static int32_t DlSpekeCalBase(DlSpekeParams *params, Uint8Buff *secret) in DlSpekeCalBase() argument 678 Uint8Buff secret = { secretVal, DL_SPEKE_SECRET_LEN }; in DlSpekeServerStartRspProcEvent() local 755 Uint8Buff secret = { secretVal, DL_SPEKE_SECRET_LEN }; in DlSpekeClientFinishReqProcEvent() local [all...] |
| H A D | ec_speke_protocol.c | 206 static int32_t CalSecret(EcSpekeParams *params, Uint8Buff *secret) in CalSecret() argument 220 static int32_t EcSpekeCalBase(EcSpekeParams *params, Uint8Buff *secret) in EcSpekeCalBase() argument 677 Uint8Buff secret = { secretVal, EC_SPEKE_SECRET_LEN }; in EcSpekeServerStartRspProcEvent() local 754 Uint8Buff secret = { secretVal, EC_SPEKE_SECRET_LEN }; EcSpekeClientFinishReqProcEvent() local [all...] |
| /base/security/device_auth/test/unittest/deviceauth/source/ |
| H A D | deviceauth_interface_test.cpp | 221 Uint8Buff secret = { secretVal, 16 }; in HWTEST_F() local
|
| /foundation/filemanagement/storage_service/services/storage_manager/ipc/src/ |
| H A D | storage_manager_stub.cpp | 878 std::vector<uint8_t> secret; in HandleActiveUserKey() local 947 std::vector<uint8_t> secret; in HandleUnlockUserScreen() local 1020 std::vector<uint8_t> secret; in HandleCreateRecoverKey() local
|
| H A D | storage_manager.cpp | 443 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 491 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 538 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
| H A D | storage_daemon.cpp | 707 PrepareUserDirsAndUpdateUserAuth(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) PrepareUserDirsAndUpdateUserAuth() argument 779 GenerateKeyAndPrepareUserDirs(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateKeyAndPrepareUserDirs() argument 816 ActiveUserKeyAndPrepare(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepare() argument 853 ActiveUserKeyAndPrepareElX(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepareElX() argument 916 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 1060 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 1114 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument [all...] |
| /foundation/filemanagement/storage_service/services/storage_manager/innerkits_impl/src/ |
| H A D | storage_manager_proxy.cpp | 291 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 374 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 508 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument [all...] |
| /foundation/filemanagement/storage_service/services/storage_manager/mock/ |
| H A D | storage_manager_proxy_mock.cpp | 73 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 90 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 117 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /third_party/curl/lib/vtls/ |
| H A D | wolfssl.c | 112 wolfssl_tls13_secret_callback(SSL *ssl, int id, const unsigned char *secret, in wolfssl_tls13_secret_callback() argument
|
| /third_party/mbedtls/3rdparty/p256-m/p256-m/ |
| H A D | p256-m.c | 1233 int p256_ecdh_shared_secret(uint8_t secret[32], in p256_ecdh_shared_secret() argument
|
| /third_party/mbedtls/library/ |
| H A D | ssl_tls13_keys.c | 140 mbedtls_ssl_tls13_hkdf_expand_label( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, unsigned char *buf, size_t buf_len) mbedtls_ssl_tls13_hkdf_expand_label() argument 221 ssl_tls13_make_traffic_key( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, unsigned char *key, size_t key_len, unsigned char *iv, size_t iv_len) ssl_tls13_make_traffic_key() argument 295 mbedtls_ssl_tls13_derive_secret( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, int ctx_hashed, unsigned char *dstbuf, size_t dstbuf_len) mbedtls_ssl_tls13_derive_secret() argument [all...] |
| /third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
| H A D | shared.c | 46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument 135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument 191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument 205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument 346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument 816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument 833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument 896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument 973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument 1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument 1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument [all...] |
| /third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
| H A D | picotls.c | 242 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 257 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 273 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 559 update_traffic_key_server_cb(ptls_update_traffic_key_t *self, ptls_t *ptls, int is_enc, size_t epoch, const void *secret) update_traffic_key_server_cb() argument 605 update_traffic_key_cb(ptls_update_traffic_key_t *self, ptls_t *ptls, int is_enc, size_t epoch, const void *secret) update_traffic_key_cb() argument [all...] |
| /third_party/lwip/src/netif/ppp/ |
| H A D | eap.c | 1315 char secret[MAXSECRETLEN]; in eap_request() local 1729 char secret[MAXSECRETLEN]; eap_response() local [all...] |