| /base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
| H A D | pake_protocol_ec_common.c | 77 int32_t GenerateEcPakeParams(PakeBaseParams *params, Uint8Buff *secret) in GenerateEcPakeParams() argument
|
| /kernel/linux/linux-5.10/drivers/net/wireguard/ |
| H A D | cookie.h | 15 u8 secret[NOISE_HASH_LEN]; member
|
| /kernel/linux/linux-6.6/drivers/net/wireguard/ |
| H A D | cookie.h | 15 u8 secret[NOISE_HASH_LEN]; member
|
| /kernel/linux/linux-6.6/crypto/ |
| H A D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 69 struct kpp_secret secret; in __crypto_dh_decode_key() local
|
| /kernel/linux/linux-6.6/net/bluetooth/ |
| H A D | ecdh_helper.c | 44 compute_ecdh_secret(struct crypto_kpp *tfm, const u8 public_key[64], u8 secret[32]) compute_ecdh_secret() argument
|
| /third_party/curl/lib/vtls/ |
| H A D | keylog.c | 123 Curl_tls_keylog_write(const char *label, const unsigned char client_random[CLIENT_RANDOM_SIZE], const unsigned char *secret, size_t secretlen) Curl_tls_keylog_write() argument
|
| /base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
| H A D | pake_v1_protocol_common.c | 180 Uint8Buff secret = { secretVal, PAKE_SECRET_LEN }; in GeneratePakeParams() local [all...] |
| /foundation/filemanagement/storage_service/test/fuzztest/storagemanagerproxy_fuzzer/ |
| H A D | storagemanagerproxy_fuzzer.cpp | 41 std::vector<uint8_t> secret; in StorageManagerProxyFuzzTest() local
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| H A D | curve25519-glue.c | 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| H A D | curve25519-glue.c | 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
|
| /kernel/linux/linux-5.10/net/bluetooth/ |
| H A D | ecdh_helper.c | 60 compute_ecdh_secret(struct crypto_kpp *tfm, const u8 public_key[64], u8 secret[32]) compute_ecdh_secret() argument
|
| /kernel/linux/linux-5.10/net/ceph/ |
| H A D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
| /kernel/linux/linux-5.10/include/keys/ |
| H A D | trusted_tpm.h | 21 unsigned char secret[SHA1_DIGEST_SIZE]; member
|
| /kernel/linux/linux-6.6/include/keys/ |
| H A D | trusted_tpm.h | 23 unsigned char secret[SHA1_DIGEST_SIZE]; member
|
| /kernel/linux/linux-6.6/net/ceph/ |
| H A D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
| /third_party/lwip/src/netif/ppp/ |
| H A D | chap-md5.c | 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
|
| /third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
| H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
|
| /third_party/openssl/demos/keyexch/ |
| H A D | x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member [all...] |
| /third_party/openssl/providers/implementations/exchange/ |
| H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
|
| /foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
| H A D | key_manager_sup_test.cpp | 386 std::vector<uint8_t> secret; in HWTEST_F() local 526 std::vector<uint8_t> secret; in HWTEST_F() local [all...] |
| /foundation/filemanagement/storage_service/services/storage_manager/crypto/ |
| H A D | filesystem_crypto.cpp | 110 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 153 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 227 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /foundation/filemanagement/storage_service/services/storage_manager/client/ |
| H A D | storage_manager_client.cpp | 115 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 161 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
|
| /foundation/filemanagement/storage_service/test/fuzztest/filesystemcrypto_fuzzer/ |
| H A D | filesystemcrypto_fuzzer.cpp | 107 std::vector<uint8_t> secret; in ActiveUserKeyFuzzTest() local
|