Home
last modified time | relevance | path

Searched refs:secret (Results 101 - 125 of 251) sorted by relevance

1234567891011

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha512.h23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
/third_party/nghttp2/src/
H A Dshrpx_worker_process.cc563 LOG(ERROR) << "Failed to generate QUIC secret reserved data"; in worker_process_event_loop()
567 if (RAND_bytes(qkm.secret.data(), qkm.secret.size()) != 1) { in worker_process_event_loop()
568 LOG(ERROR) << "Failed to generate QUIC secret"; in worker_process_event_loop()
581 qkm.secret.data(), qkm.secret.size(), qkm.salt.data(), in worker_process_event_loop()
H A Dshrpx_tls.cc850 auto &secret = (*it).second; in psk_server_cb() local
851 if (secret.size() > max_psk_len) { in psk_server_cb()
852 LOG(ERROR) << "The size of PSK secret is " << secret.size() in psk_server_cb()
857 std::copy(std::begin(secret), std::end(secret), psk); in psk_server_cb()
859 return static_cast<unsigned int>(secret.size()); in psk_server_cb()
873 auto &secret = tlsconf.client.psk.secret; in psk_client_cb() local
885 if (secret in psk_client_cb()
[all...]
/third_party/mbedtls/library/
H A Dssl_tls13_keys.c142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label()
189 secret, in mbedtls_ssl_tls13_hkdf_expand_label()
223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key()
231 secret, secret_len, in ssl_tls13_make_traffic_key()
241 secret, secret_len, in ssl_tls13_make_traffic_key()
251 * - One secret value per sender.
297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret()
327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret()
359 * on the old secret. */ in mbedtls_ssl_tls13_evolve_secret()
692 4, "Master secret", in ssl_tls13_key_schedule_stage_application()
140 mbedtls_ssl_tls13_hkdf_expand_label( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, unsigned char *buf, size_t buf_len) mbedtls_ssl_tls13_hkdf_expand_label() argument
221 ssl_tls13_make_traffic_key( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, unsigned char *key, size_t key_len, unsigned char *iv, size_t iv_len) ssl_tls13_make_traffic_key() argument
295 mbedtls_ssl_tls13_derive_secret( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, const unsigned char *label, size_t label_len, const unsigned char *ctx, size_t ctx_len, int ctx_hashed, unsigned char *dstbuf, size_t dstbuf_len) mbedtls_ssl_tls13_derive_secret() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/lib/
H A Dngtcp2_crypto.c35 int ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret, in ngtcp2_crypto_km_new() argument
46 memcpy((*pckm)->secret.base, secret, secretlen); in ngtcp2_crypto_km_new()
69 (*pckm)->secret.base = p; in ngtcp2_crypto_km_nocopy_new()
70 (*pckm)->secret.len = secretlen; in ngtcp2_crypto_km_nocopy_new()
/third_party/node/deps/openssl/openssl/providers/fips/
H A Dself_test_kats.c370 unsigned char secret[256]; in self_test_ka() local
371 size_t secret_len = sizeof(secret); in self_test_ka()
416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
419 OSSL_SELF_TEST_oncorrupt_byte(st, secret); in self_test_ka()
422 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka()
/third_party/openssl/providers/fips/
H A Dself_test_kats.c370 unsigned char secret[256]; in self_test_ka() local
371 size_t secret_len = sizeof(secret); in self_test_ka()
416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
419 OSSL_SELF_TEST_oncorrupt_byte(st, secret); in self_test_ka()
422 || memcmp(secret, t->expected, t->expected_len) != 0) in self_test_ka()
/third_party/musl/src/malloc/mallocng/
H A Ddonate.c23 m->mem->meta = encode_ptr(m, ctx.secret); in donate()
/third_party/musl/porting/linux/user/src/malloc/mallocng/
H A Ddonate.c23 m->mem->meta = encode_ptr(m, ctx.secret); in donate()
/third_party/pulseaudio/src/modules/raop/
H A Draop-client.c108 pa_raop_secret *secret; member
353 pa_raop_aes_encrypt(c->secret, (uint8_t *) buffer + head, size - head); in build_tcp_audio_packet()
445 pa_raop_aes_encrypt(c->secret, (uint8_t *) buffer + head, size - head); in build_udp_audio_packet()
924 key = pa_raop_secret_get_key(c->secret); in rtsp_stream_cb()
934 iv = pa_raop_secret_get_iv(c->secret); in rtsp_stream_cb()
1478 c->secret = NULL; in pa_raop_client_new()
1480 c->secret = pa_raop_secret_new(); in pa_raop_client_new()
1504 if (c->secret) in pa_raop_client_free()
1505 pa_raop_secret_free(c->secret); in pa_raop_client_free()
1509 c->secret in pa_raop_client_free()
[all...]
/third_party/curl/lib/vquic/
H A Dvquic-tls.c243 const gnutls_datum_t *secret) in keylog_callback()
253 Curl_tls_keylog_write(label, crandom.data, secret->data, secret->size); in keylog_callback()
242 keylog_callback(gnutls_session_t session, const char *label, const gnutls_datum_t *secret) keylog_callback() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_common.c321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, in tls_prf() argument
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, in tls_prf()
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, in tls_prf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_crypto.c113 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument
117 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
121 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
125 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
482 u8 *secret, size_t *secret_len) in dpp_ecdh()
511 wpa_printf(MSG_ERROR, "DPP: ECDH secret longer than expected"); in dpp_ecdh()
516 os_memcpy(secret, wpabuf_head(secret_buf), wpabuf_len(secret_buf)); in dpp_ecdh()
2030 pfs->secret = crypto_ecdh_set_peerkey(pfs->ecdh, 0, peer_ie + 2, in dpp_pfs_process()
2032 pfs->secret = wpabuf_zeropad(pfs->secret, pf in dpp_pfs_process()
481 dpp_ecdh(struct crypto_ec_key *own, struct crypto_ec_key *peer, u8 *secret, size_t *secret_len) dpp_ecdh() argument
[all...]
/third_party/mbedtls/include/mbedtls/
H A Decjpake.h16 * strong shared secret from a (potentially low entropy) pre-shared
75 mbedtls_mpi MBEDTLS_PRIVATE(s); /**< Pre-shared secret (passphrase) */
103 * \param secret The pre-shared secret (passphrase). This must be
106 * \param len The length of the pre-shared secret \p secret.
115 const unsigned char *secret,
227 * \brief Derive the shared secret
232 * \param buf The buffer to write the derived secret to. This must
255 * \param buf The buffer to write the derived secret t
[all...]
/third_party/mbedtls/include/psa/
H A Dcrypto_builtin_key_derivation.h78 uint8_t *MBEDTLS_PRIVATE(secret);
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dmd_ctx.rs65 // Create a key with the HMAC secret.
66 let key = PKey::hmac(b"my secret").unwrap();
H A Dcipher_ctx.rs736 let secret = b"My secret message"; in seal_open()
749 ctx.cipher_update_vec(secret, &mut encrypted).unwrap(); in seal_open()
758 assert_eq!(secret, &decrypted[..]); in seal_open()
/third_party/node/deps/npm/lib/commands/
H A Dprofile.js348 const secret = otpauth.searchParams.get('secret')
352 'Scan into your authenticator app:\n' + code + '\n Or enter code:', secret
/third_party/python/Lib/
H A Dpoplib.py329 secret = bytes(password, self.encoding)
334 digest = m.group(1)+secret
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dieee802_11.c2647 if (!pasn->secret) { in pasn_fils_auth_resp()
2648 wpa_printf(MSG_DEBUG, "PASN: FILS: Missing secret"); in pasn_fils_auth_resp()
2668 wpabuf_head(pasn->secret), in pasn_fils_auth_resp()
2669 wpabuf_len(pasn->secret), in pasn_fils_auth_resp()
2679 wpabuf_free(pasn->secret); in pasn_fils_auth_resp()
2680 pasn->secret = NULL; in pasn_fils_auth_resp()
2863 struct wpabuf *secret) in pasn_derive_keys()
2906 wpabuf_head(secret), wpabuf_len(secret), in pasn_derive_keys()
3130 struct wpabuf *wrapped_data = NULL, *secret in handle_auth_pasn_1() local
2859 pasn_derive_keys(struct hostapd_data *hapd, struct sta_info *sta, const u8 *cached_pmk, size_t cached_pmk_len, struct wpa_pasn_params_data *pasn_data, struct wpabuf *wrapped_data, struct wpabuf *secret) pasn_derive_keys() argument
4202 struct wpabuf *secret, *pub, *hkey; owe_process_assoc_req() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dpasn_supplicant.c1350 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; in wpas_pasn_auth_rx() local
1500 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, in wpas_pasn_auth_rx()
1504 if (!secret) { in wpas_pasn_auth_rx()
1505 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); in wpas_pasn_auth_rx()
1528 wpabuf_head(secret), wpabuf_len(secret), in wpas_pasn_auth_rx()
1538 wpabuf_free(secret); in wpas_pasn_auth_rx()
1539 secret = NULL; in wpas_pasn_auth_rx()
1586 wpabuf_free(secret); in wpas_pasn_auth_rx()
/third_party/openssl/test/
H A Dtls-provider.c32 * Top secret. This algorithm only works if no one knows what this number is.
265 static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen, in xor_derive() argument
275 if (secret == NULL) in xor_derive()
282 secret[i] = pxorctx->key->privkey[i] ^ pxorctx->peerkey->pubkey[i]; in xor_derive()
H A Dcmp_protect_test.c217 * for each reference and secret value in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key()
282 static unsigned char secret[] = { 47, 11, 8, 15 }; in test_MSG_protect_pbmac_no_sender() local
291 secret, sizeof(secret)) in test_MSG_protect_pbmac_no_sender()

Completed in 38 milliseconds

1234567891011