/third_party/node/deps/openssl/openssl/providers/fips/ |
H A D | self_test_kats.c | 370 unsigned char secret[256]; in self_test_ka() local
|
/third_party/openssl/test/ |
H A D | tls13secretstest.c | 188 ssl_log_secret(SSL *ssl, const char *label, const uint8_t *secret, size_t secret_len) ssl_log_secret() argument [all...] |
H A D | cmp_msg_test.c | 145 unsigned char secret[16]; in test_cmp_create_ir_protection_set() local
|
H A D | cmp_protect_test.c | 282 static unsigned char secret[] = { 47, 11, 8, 15 }; in test_MSG_protect_pbmac_no_sender() local
|
H A D | evp_libctx_test.c | 528 unsigned char secret[256] = { 0, }; in kem_rsa_gen_recover() local 594 unsigned char secret[256] = { 0, }; in kem_rsa_params() local [all...] |
/third_party/openssl/providers/fips/ |
H A D | self_test_kats.c | 370 unsigned char secret[256]; in self_test_ka() local
|
/third_party/openssl/test/helpers/ |
H A D | pkcs12.c | 441 void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, in add_secretbag() argument 639 void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs) in check_secretbag() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_gnutls.c | 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_nettle.c | 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_teap_common.c | 70 static int eap_teap_tls_prf(const u8 *secret, size_t secret_len, in eap_teap_tls_prf() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_gnutls.c | 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_nettle.c | 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_teap_common.c | 73 static int eap_teap_tls_prf(u16 tls_cs, const u8 *secret, size_t secret_len, in eap_teap_tls_prf() argument
|
/third_party/curl/lib/ |
H A D | http_aws_sigv4.c | 559 char *secret = NULL; in Curl_output_aws_sigv4() local
|
H A D | pop3.c | 438 char secret[2 * MD5_DIGEST_LEN + 1]; in pop3_perform_apop() local
|
/third_party/mbedtls/library/ |
H A D | ecjpake.c | 93 mbedtls_ecjpake_setup(mbedtls_ecjpake_context *ctx, mbedtls_ecjpake_role role, mbedtls_md_type_t hash, mbedtls_ecp_group_id curve, const unsigned char *secret, size_t len) mbedtls_ecjpake_setup() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/wolfssl/ |
H A D | wolfssl.c | 209 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 219 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 230 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
H A D | boringssl.c | 283 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 297 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 310 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 539 set_read_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_read_secret() argument 556 set_write_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_write_secret() argument [all...] |
/third_party/lwip/src/include/netif/ppp/ |
H A D | pppol2tp.h | 176 const u8_t *secret; /* Secret string */ member
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap_ms.c | 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | x942kdf.c | 40 unsigned char *secret; member
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | tls13_enc.c | 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 630 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 967 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/third_party/openssl/ssl/ |
H A D | tls13_enc.c | 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 426 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 757 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | x942kdf.c | 40 unsigned char *secret; member
|