/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha512.h | 23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
|
/third_party/nghttp2/src/ |
H A D | shrpx_worker_process.cc | 563 LOG(ERROR) << "Failed to generate QUIC secret reserved data"; in worker_process_event_loop() 567 if (RAND_bytes(qkm.secret.data(), qkm.secret.size()) != 1) { in worker_process_event_loop() 568 LOG(ERROR) << "Failed to generate QUIC secret"; in worker_process_event_loop() 581 qkm.secret.data(), qkm.secret.size(), qkm.salt.data(), in worker_process_event_loop()
|
H A D | shrpx_tls.cc | 850 auto &secret = (*it).second; in psk_server_cb() local 851 if (secret.size() > max_psk_len) { in psk_server_cb() 852 LOG(ERROR) << "The size of PSK secret is " << secret.size() in psk_server_cb() 857 std::copy(std::begin(secret), std::end(secret), psk); in psk_server_cb() 859 return static_cast<unsigned int>(secret.size()); in psk_server_cb() 873 auto &secret = tlsconf.client.psk.secret; in psk_client_cb() local 885 if (secret in psk_client_cb() [all...] |
/third_party/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label() 189 secret, in mbedtls_ssl_tls13_hkdf_expand_label() 223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key() 231 secret, secret_len, in ssl_tls13_make_traffic_key() 241 secret, secret_len, in ssl_tls13_make_traffic_key() 251 * - One secret value per sender. 297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret() 327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret() 359 * on the old secret. */ in mbedtls_ssl_tls13_evolve_secret() 692 4, "Master secret", in ssl_tls13_key_schedule_stage_application() 140 mbedtls_ssl_tls13_hkdf_expand_label( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, unsigned char *buf, size_t buf_len) mbedtls_ssl_tls13_hkdf_expand_label() argument 221 ssl_tls13_make_traffic_key( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, unsigned char *key, size_t key_len, unsigned char *iv, size_t iv_len) ssl_tls13_make_traffic_key() argument 295 mbedtls_ssl_tls13_derive_secret( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, int ctx_hashed, unsigned char *dstbuf, size_t dstbuf_len) mbedtls_ssl_tls13_derive_secret() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_crypto.c | 35 int ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret, in ngtcp2_crypto_km_new() argument 46 memcpy((*pckm)->secret.base, secret, secretlen); in ngtcp2_crypto_km_new() 69 (*pckm)->secret.base = p; in ngtcp2_crypto_km_nocopy_new() 70 (*pckm)->secret.len = secretlen; in ngtcp2_crypto_km_nocopy_new()
|
/third_party/node/deps/openssl/openssl/providers/fips/ |
H A D | self_test_kats.c | 370 unsigned char secret[256]; in self_test_ka() local 371 size_t secret_len = sizeof(secret); in self_test_ka() 416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka() 419 OSSL_SELF_TEST_oncorrupt_byte(st, secret); in self_test_ka() 422 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka()
|
/third_party/openssl/providers/fips/ |
H A D | self_test_kats.c | 370 unsigned char secret[256]; in self_test_ka() local 371 size_t secret_len = sizeof(secret); in self_test_ka() 416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka() 419 OSSL_SELF_TEST_oncorrupt_byte(st, secret); in self_test_ka() 422 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka()
|
/third_party/musl/src/malloc/mallocng/ |
H A D | donate.c | 23 m->mem->meta = encode_ptr(m, ctx.secret); in donate()
|
/third_party/musl/porting/linux/user/src/malloc/mallocng/ |
H A D | donate.c | 23 m->mem->meta = encode_ptr(m, ctx.secret); in donate()
|
/third_party/pulseaudio/src/modules/raop/ |
H A D | raop-client.c | 108 pa_raop_secret *secret; member 353 pa_raop_aes_encrypt(c->secret, (uint8_t *) buffer + head, size - head); in build_tcp_audio_packet() 445 pa_raop_aes_encrypt(c->secret, (uint8_t *) buffer + head, size - head); in build_udp_audio_packet() 924 key = pa_raop_secret_get_key(c->secret); in rtsp_stream_cb() 934 iv = pa_raop_secret_get_iv(c->secret); in rtsp_stream_cb() 1478 c->secret = NULL; in pa_raop_client_new() 1480 c->secret = pa_raop_secret_new(); in pa_raop_client_new() 1504 if (c->secret) in pa_raop_client_free() 1505 pa_raop_secret_free(c->secret); in pa_raop_client_free() 1509 c->secret in pa_raop_client_free() [all...] |
/third_party/curl/lib/vquic/ |
H A D | vquic-tls.c | 243 const gnutls_datum_t *secret) in keylog_callback() 253 Curl_tls_keylog_write(label, crandom.data, secret->data, secret->size); in keylog_callback() 242 keylog_callback(gnutls_session_t session, const char *label, const gnutls_datum_t *secret) keylog_callback() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_common.c | 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf() 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 113 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument 117 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 121 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 125 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 482 u8 *secret, size_t *secret_len) in dpp_ecdh() 511 wpa_printf(MSG_ERROR, "DPP: ECDH secret longer than expected"); in dpp_ecdh() 516 os_memcpy(secret, wpabuf_head(secret_buf), wpabuf_len(secret_buf)); in dpp_ecdh() 2030 pfs->secret = crypto_ecdh_set_peerkey(pfs->ecdh, 0, peer_ie + 2, in dpp_pfs_process() 2032 pfs->secret = wpabuf_zeropad(pfs->secret, pf in dpp_pfs_process() 481 dpp_ecdh(struct crypto_ec_key *own, struct crypto_ec_key *peer, u8 *secret, size_t *secret_len) dpp_ecdh() argument [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ecjpake.h | 16 * strong shared secret from a (potentially low entropy) pre-shared 75 mbedtls_mpi MBEDTLS_PRIVATE(s); /**< Pre-shared secret (passphrase) */ 103 * \param secret The pre-shared secret (passphrase). This must be 106 * \param len The length of the pre-shared secret \p secret. 115 const unsigned char *secret, 227 * \brief Derive the shared secret 232 * \param buf The buffer to write the derived secret to. This must 255 * \param buf The buffer to write the derived secret t [all...] |
/third_party/mbedtls/include/psa/ |
H A D | crypto_builtin_key_derivation.h | 78 uint8_t *MBEDTLS_PRIVATE(secret);
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | md_ctx.rs | 65 // Create a key with the HMAC secret. 66 let key = PKey::hmac(b"my secret").unwrap();
|
H A D | cipher_ctx.rs | 736 let secret = b"My secret message"; in seal_open() 749 ctx.cipher_update_vec(secret, &mut encrypted).unwrap(); in seal_open() 758 assert_eq!(secret, &decrypted[..]); in seal_open()
|
/third_party/node/deps/npm/lib/commands/ |
H A D | profile.js | 348 const secret = otpauth.searchParams.get('secret') 352 'Scan into your authenticator app:\n' + code + '\n Or enter code:', secret
|
/third_party/python/Lib/ |
H A D | poplib.py | 329 secret = bytes(password, self.encoding) 334 digest = m.group(1)+secret
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ieee802_11.c | 2647 if (!pasn->secret) { in pasn_fils_auth_resp() 2648 wpa_printf(MSG_DEBUG, "PASN: FILS: Missing secret"); in pasn_fils_auth_resp() 2668 wpabuf_head(pasn->secret), in pasn_fils_auth_resp() 2669 wpabuf_len(pasn->secret), in pasn_fils_auth_resp() 2679 wpabuf_free(pasn->secret); in pasn_fils_auth_resp() 2680 pasn->secret = NULL; in pasn_fils_auth_resp() 2863 struct wpabuf *secret) in pasn_derive_keys() 2906 wpabuf_head(secret), wpabuf_len(secret), in pasn_derive_keys() 3130 struct wpabuf *wrapped_data = NULL, *secret in handle_auth_pasn_1() local 2859 pasn_derive_keys(struct hostapd_data *hapd, struct sta_info *sta, const u8 *cached_pmk, size_t cached_pmk_len, struct wpa_pasn_params_data *pasn_data, struct wpabuf *wrapped_data, struct wpabuf *secret) pasn_derive_keys() argument 4202 struct wpabuf *secret, *pub, *hkey; owe_process_assoc_req() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | pasn_supplicant.c | 1350 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpas_pasn_auth_rx() local 1500 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in wpas_pasn_auth_rx() 1504 if (!secret) { in wpas_pasn_auth_rx() 1505 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); in wpas_pasn_auth_rx() 1528 wpabuf_head(secret), wpabuf_len(secret), in wpas_pasn_auth_rx() 1538 wpabuf_free(secret); in wpas_pasn_auth_rx() 1539 secret = NULL; in wpas_pasn_auth_rx() 1586 wpabuf_free(secret); in wpas_pasn_auth_rx()
|
/third_party/openssl/test/ |
H A D | tls-provider.c | 32 * Top secret. This algorithm only works if no one knows what this number is. 265 static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen, in xor_derive() argument 275 if (secret == NULL) in xor_derive() 282 secret[i] = pxorctx->key->privkey[i] ^ pxorctx->peerkey->pubkey[i]; in xor_derive()
|
H A D | cmp_protect_test.c | 217 * for each reference and secret value in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 282 static unsigned char secret[] = { 47, 11, 8, 15 }; in test_MSG_protect_pbmac_no_sender() local 291 secret, sizeof(secret)) in test_MSG_protect_pbmac_no_sender()
|