| /base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common_mock/ |
| H A D | pake_protocol_dl_common_mock.c | 28 int32_t GenerateDlPakeParams(PakeBaseParams *params, const Uint8Buff *secret) in GenerateDlPakeParams() argument
|
| /base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common_mock/ |
| H A D | pake_protocol_ec_common_mock.c | 28 int32_t GenerateEcPakeParams(PakeBaseParams *params, Uint8Buff *secret) in GenerateEcPakeParams() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
| H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
| H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5() argument
|
| /base/security/asset/test/unittest/kits_ndk/src/ |
| H A D | asset_add_test.cpp | 103 Asset_Blob secret = { .size = 0, .data = reinterpret_cast<uint8_t*>(const_cast<char*>(__func__)) }; in HWTEST_F() local 137 Asset_Blob secret = { .size = 0, .data = reinterpret_cast<uint8_t*>(const_cast<char*>(__func__)) }; in HWTEST_F() local 156 Asset_Blob secret = { .size = 0, .data = reinterpret_cast<uint8_t*>(const_cast<char*>(__func__)) }; in HWTEST_F() local [all...] |
| /base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
| H A D | pake_protocol_dl_common.c | 125 int32_t GenerateDlPakeParams(PakeBaseParams *params, const Uint8Buff *secret) in GenerateDlPakeParams() argument
|
| /third_party/node/test/node-api/test_cleanup_hook/ |
| H A D | binding.c | 13 static int secret = 42; variable
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
|
| H A D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument [all...] |
| H A D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
|
| H A D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
|
| H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
|
| H A D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument [all...] |
| H A D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
|
| H A D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument [all...] |
| H A D | sha512-kdf.c | 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
|
| H A D | sha1-tlsprf.c | 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha1_md5() argument
|
| /base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
| H A D | pake_protocol_ec_common.c | 77 int32_t GenerateEcPakeParams(PakeBaseParams *params, Uint8Buff *secret) in GenerateEcPakeParams() argument
|
| /third_party/curl/lib/vtls/ |
| H A D | keylog.c | 123 Curl_tls_keylog_write(const char *label, const unsigned char client_random[CLIENT_RANDOM_SIZE], const unsigned char *secret, size_t secretlen) Curl_tls_keylog_write() argument
|
| /base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
| H A D | pake_v1_protocol_common.c | 180 Uint8Buff secret = { secretVal, PAKE_SECRET_LEN }; in GeneratePakeParams() local [all...] |
| /third_party/lwip/src/netif/ppp/ |
| H A D | chap-md5.c | 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
|
| /third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
| H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
|
| /third_party/openssl/demos/keyexch/ |
| H A D | x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member [all...] |
| /third_party/openssl/providers/implementations/exchange/ |
| H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
|