| /third_party/openssl/test/helpers/ |
| H A D | pkcs12.c | 441 void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, in add_secretbag() argument 639 void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs) in check_secretbag() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | crypto_gnutls.c | 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| H A D | crypto_nettle.c | 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
| H A D | eap_teap_common.c | 70 static int eap_teap_tls_prf(const u8 *secret, size_t secret_len, in eap_teap_tls_prf() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | crypto_gnutls.c | 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| H A D | crypto_nettle.c | 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
| H A D | eap_teap_common.c | 73 static int eap_teap_tls_prf(u16 tls_cs, const u8 *secret, size_t secret_len, in eap_teap_tls_prf() argument
|
| /base/account/os_account/services/accountmgr/src/account_iam/ |
| H A D | account_iam_callback.cpp | 70 std::vector<uint8_t> secret; in HandleAuthResult() local
|
| H A D | inner_account_iam_manager.cpp | 452 void InnerAccountIAMManager::HandleFileKeyException(int32_t userId, const std::vector<uint8_t> &secret, in HandleFileKeyException() argument 688 UnlockUserScreen( int32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 705 InnerUnlockUserScreen( int32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) InnerUnlockUserScreen() argument 723 ActivateUserKey( int32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActivateUserKey() argument 740 InnerActivateUserKey( int32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) InnerActivateUserKey() argument [all...] |
| /base/security/device_auth/deps_adapter/key_management_adapter/impl/src/common/ |
| H A D | mbedtls_ec_adapter.c | 403 mbedtls_mpi *secret = HcMalloc(sizeof(mbedtls_mpi), 0); in EcKeyAgreement() local
|
| /foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
| H A D | storage_daemon_stub.cpp | 499 std::vector<uint8_t> secret; in HandleActiveUserKey() local 540 std::vector<uint8_t> secret; in HandleUnlockUserScreen() local 601 std::vector<uint8_t> secret; in HandleCreateRecoverKey() local
|
| H A D | storage_daemon_proxy.cpp | 460 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 532 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 632 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /foundation/filemanagement/storage_service/services/storage_manager/storage_daemon_communication/src/ |
| H A D | storage_daemon_communication.cpp | 308 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 370 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 565 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /foundation/filemanagement/storage_service/services/storage_manager/mock/ |
| H A D | storage_daemon_proxy_mock.cpp | 121 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 138 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 160 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
| /third_party/curl/lib/ |
| H A D | http_aws_sigv4.c | 559 char *secret = NULL; in Curl_output_aws_sigv4() local
|
| H A D | pop3.c | 438 char secret[2 * MD5_DIGEST_LEN + 1]; in pop3_perform_apop() local
|
| /third_party/mbedtls/library/ |
| H A D | ecjpake.c | 93 mbedtls_ecjpake_setup(mbedtls_ecjpake_context *ctx, mbedtls_ecjpake_role role, mbedtls_md_type_t hash, mbedtls_ecp_group_id curve, const unsigned char *secret, size_t len) mbedtls_ecjpake_setup() argument
|
| /third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
| H A D | openssl.c | 325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
|
| /third_party/node/deps/ngtcp2/ngtcp2/crypto/wolfssl/ |
| H A D | wolfssl.c | 209 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 219 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 230 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
|
| /third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
| H A D | boringssl.c | 283 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 297 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 310 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 539 set_read_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_read_secret() argument 556 set_write_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_write_secret() argument [all...] |
| /third_party/lwip/src/include/netif/ppp/ |
| H A D | pppol2tp.h | 176 const u8_t *secret; /* Secret string */ member
|
| /third_party/lwip/src/netif/ppp/ |
| H A D | chap_ms.c | 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument [all...] |
| /third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
| H A D | x942kdf.c | 40 unsigned char *secret; member
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | tls13_enc.c | 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 630 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 967 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
| /third_party/openssl/ssl/ |
| H A D | tls13_enc.c | 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 426 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 757 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |