/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | eapol_test.c | 1000 int port, const char *secret, in wpa_init_conf() 1037 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf() 1038 as->shared_secret_len = os_strlen(secret); in wpa_init_conf() 1248 "[-s<AS secret>]\\\n" in usage() 1263 " -s<AS secret> = shared secret with the authentication " in usage() 998 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr, const char *ifname) wpa_init_conf() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | eapol_test.c | 998 int port, const char *secret, in wpa_init_conf() 1036 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf() 1037 as->shared_secret_len = os_strlen(secret); in wpa_init_conf() 1247 "[-s<AS secret>]\\\n" in usage() 1262 " -s<AS secret> = shared secret with the authentication " in usage() 996 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr, const char *ifname) wpa_init_conf() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.c | 6297 struct wpabuf *secret, *pub, *hkey; 6352 secret = crypto_ecdh_set_peerkey(sm->owe_ecdh, 0, 6355 secret = wpabuf_zeropad(secret, prime_len); 6356 if (!secret) { 6360 wpa_hexdump_buf_key(MSG_DEBUG, "OWE: DH shared secret", secret); 6366 wpabuf_clear_free(secret); 6391 wpabuf_clear_free(secret); 6398 wpabuf_clear_free(secret); [all...] |
/third_party/curl/lib/vtls/ |
H A D | wolfssl.c | 103 * The TLS 1.3 secret callback (wolfSSL_set_tls13_secret_cb) was added in 112 wolfssl_tls13_secret_callback(SSL *ssl, int id, const unsigned char *secret, in wolfssl_tls13_secret_callback() argument 154 Curl_tls_keylog_write(label, client_random, secret, secretSz); in wolfssl_tls13_secret_callback() 177 /* TLS 1.3 does not use this mechanism, the "master secret" returned below in wolfssl_log_tls12_secret() 188 /* Check for a missing master secret and skip logging. That can happen if in wolfssl_log_tls12_secret() 782 * for the server response. At that point the master secret is not yet in wolfssl_connect_step2() 784 * To log the secret on completion with a handshake failure, detect in wolfssl_connect_step2()
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | core_dispatch.h | 663 OSSL_CORE_MAKE_FUNC(int, keyexch_derive, (void *ctx, unsigned char *secret, 824 unsigned char *secret,
|
/third_party/openssl/include/openssl/ |
H A D | core_dispatch.h | 663 OSSL_CORE_MAKE_FUNC(int, keyexch_derive, (void *ctx, unsigned char *secret, 824 unsigned char *secret,
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_local.h | 650 /* Extended master secret support */ 1363 /* Temporary storage for premaster secret */ 1592 * secret and SSLv3/TLS (<=1.2) rollback check 1659 /* TLS pre-shared secret session resumption */ 2663 const unsigned char *secret, 2668 const unsigned char *secret, unsigned char *key, 2671 const unsigned char *secret, unsigned char *iv, 2674 const unsigned char *secret, 2799 * ssl_log_secret logs |secret| to the SSL_CTX associated with |ssl|, if 2804 const uint8_t *secret, size_ [all...] |
/third_party/openssl/ssl/ |
H A D | ssl_local.h | 643 /* Extended master secret support */ 1339 /* Temporary storage for premaster secret */ 1563 * secret and SSLv3/TLS (<=1.2) rollback check 1630 /* TLS pre-shared secret session resumption */ 2607 const unsigned char *secret, 2612 const unsigned char *secret, unsigned char *key, 2615 const unsigned char *secret, unsigned char *iv, 2618 const unsigned char *secret, 2743 * ssl_log_secret logs |secret| to the SSL_CTX associated with |ssl|, if 2748 const uint8_t *secret, size_ [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_config.cc | 244 LOG(ERROR) << "frontend-quic-secret-file: could not open file " << path; in read_quic_secret_file() 258 LOG(ERROR) << "frontend-quic-secret-file: each line must be a " in read_quic_secret_file() 271 util::decode_hex(std::begin(qkm.secret), in read_quic_secret_file() 272 StringRef{p, p + qkm.secret.size()}); in read_quic_secret_file() 273 p += qkm.secret.size() * 2; in read_quic_secret_file() 288 << "frontend-quic-secret-file: error occurred while reading file " in read_quic_secret_file() 295 << "frontend-quic-secret-file: no keying materials are present in file " in read_quic_secret_file() 1691 LOG(ERROR) << SHRPX_OPT_PSK_SECRETS << ": empty secret at line " in parse_psk_secrets() 1698 << ": secret must be hex string at line " << lineno; in parse_psk_secrets() 1705 auto secret in parse_psk_secrets() local [all...] |
H A D | shrpx_config.h | 397 StringRef::from_lit("frontend-quic-secret-file"); 639 std::array<uint8_t, SHRPX_QUIC_SECRETLEN> secret; member 741 StringRef secret; member 751 // its secret.
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen, 430 static int tls_prf_sha256(const unsigned char *secret, size_t slen, 441 static int tls_prf_sha384(const unsigned char *secret, size_t slen, 467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6747 const unsigned char *secret, size_t slen, in tls_prf_generic() 6764 /* Normally a "secret" should be long enough to be impossible to in tls_prf_generic() 6767 * and for this use case it makes sense to have a 0-length "secret". in tls_prf_generic() 6770 * to mean a 0-length "secret" input. */ in tls_prf_generic() 6777 status = psa_import_key(&key_attributes, secret, sle in tls_prf_generic() 466 mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) mbedtls_ssl_tls_prf() argument 6746 tls_prf_generic(mbedtls_md_type_t md_type, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_generic() argument 6826 tls_prf_generic(mbedtls_md_type_t md_type, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_generic() argument 6933 tls_prf_sha256(const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_sha256() argument 6945 tls_prf_sha384(const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_sha384() argument [all...] |
H A D | ecjpake.c | 97 const unsigned char *secret, in mbedtls_ecjpake_setup() 116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup() 93 mbedtls_ecjpake_setup(mbedtls_ecjpake_context *ctx, mbedtls_ecjpake_role role, mbedtls_md_type_t hash, mbedtls_ecp_group_id curve, const unsigned char *secret, size_t len) mbedtls_ecjpake_setup() argument
|
/third_party/lwip/src/include/netif/ppp/ |
H A D | ppp_impl.h | 578 int get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server); 579 /* get "secret" for chap */
|
/third_party/openssl/test/ |
H A D | tls13secretstest.c | 190 const uint8_t *secret, in ssl_log_secret() 297 TEST_info("Early secret generation failed"); in test_handshake_secrets() 303 TEST_info("Early secret does not match"); in test_handshake_secrets() 309 TEST_info("Handshake secret generation failed"); in test_handshake_secrets() 329 TEST_info("Client handshake secret test failed"); in test_handshake_secrets() 344 TEST_info("Server handshake secret test failed"); in test_handshake_secrets() 357 TEST_info("Master secret generation failed"); in test_handshake_secrets() 363 TEST_info("Master secret does not match"); in test_handshake_secrets() 378 TEST_info("Client application data secret test failed"); in test_handshake_secrets() 393 TEST_info("Server application data secret tes in test_handshake_secrets() 188 ssl_log_secret(SSL *ssl, const char *label, const uint8_t *secret, size_t secret_len) ssl_log_secret() argument [all...] |
H A D | evp_kdf_test.c | 37 static OSSL_PARAM *construct_tls1_prf_params(const char *digest, const char *secret, in construct_tls1_prf_params() argument 49 (unsigned char *)secret, in construct_tls1_prf_params() 50 strlen(secret)); in construct_tls1_prf_params() 70 params = construct_tls1_prf_params("sha256", "secret", "seed"); in test_kdf_tls1_prf() 88 params = construct_tls1_prf_params("blah", "secret", "seed"); in test_kdf_tls1_prf_invalid_digest() 106 params = construct_tls1_prf_params("sha256", "secret", "seed"); in test_kdf_tls1_prf_zero_output_size() 162 params = construct_tls1_prf_params("sha256", "secret", ""); in test_kdf_tls1_prf_empty_seed() 182 params = construct_tls1_prf_params("sha256", "secret", "1"); in test_kdf_tls1_prf_1byte_seed() 230 params = construct_hkdf_params("sha256", "secret", 6, "salt", "label"); in test_kdf_hkdf() 253 "secret", in do_kdf_hkdf_gettables() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto.h | 426 u8 *secret, size_t *len); 995 * crypto_ecdh_set_peerkey - Compute ECDH secret 1001 * Returns: Binary data with the EDCH secret or %NULL on failure
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.h | 490 struct wpabuf *secret; member
|
H A D | dpp.c | 405 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument 409 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 413 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 417 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand() 614 u8 *secret, size_t *secret_len) in dpp_ecdh() 653 * need for shared secret from EVP_PKEY_derive(NULL) in some in dpp_ecdh() 678 os_memcpy(secret, buf, *secret_len); in dpp_ecdh() 683 if (EVP_PKEY_derive(ctx, secret, secret_len) != 1) { in dpp_ecdh() 2303 wpa_hexdump_key(MSG_DEBUG, "DPP: ECDH shared secret (M.x)", in dpp_auth_init() 2891 wpa_hexdump_key(MSG_DEBUG, "DPP: ECDH shared secret ( in dpp_auth_build_resp_ok() 613 dpp_ecdh(EVP_PKEY *own, EVP_PKEY *peer, u8 *secret, size_t *secret_len) dpp_ecdh() argument [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 1255 unsigned char MBEDTLS_PRIVATE(master)[48]; /*!< the master secret */ 1362 * \param secret The address of the buffer holding the secret 1364 * \param secret_len The length of \p secret in bytes. 1372 const unsigned char *secret, 1439 uint8_t MBEDTLS_PRIVATE(extended_ms); /*!< negotiate extended master secret? */ 1931 /** Callback to export key block and master secret */ 4115 * \param pw EC J-PAKE password (pre-shared secret). It cannot be empty 5214 * - This data is not forward secret, as it is encrypted 5265 * - This data is not forward secret, a [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/lib/includes/ngtcp2/ |
H A D | ngtcp2.h | 3009 * encryption and decryption, and write decryption secret and IV to 3013 * write encryption secret and IV to the buffer pointed by |tx_secret| 3016 * buffers have the enough capacity to store secret, key and IV. 3957 * materials for decrypting Short header packets. |secret| of length 3958 * |secretlen| is the decryption secret which is used to derive keying 3980 ngtcp2_conn *conn, const uint8_t *secret, size_t secretlen, 3988 * materials for encrypting Short header packets. |secret| of length 3989 * |secretlen| is the encryption secret which is used to derive keying 4011 ngtcp2_conn *conn, const uint8_t *secret, size_t secretlen,
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | sign.rs | 51 let key = PKey::hmac(b"my secret").unwrap();
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp.h | 633 struct wpabuf *secret; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | ap_config_file.c | 664 char *secret; in hostapd_parse_das_client() local 666 secret = os_strchr(val, ' '); in hostapd_parse_das_client() 667 if (secret == NULL) in hostapd_parse_das_client() 670 *secret++ = '\0'; in hostapd_parse_das_client() 676 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); in hostapd_parse_das_client() 679 bss->radius_das_shared_secret_len = os_strlen(secret); in hostapd_parse_das_client() 2852 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", in hostapd_config_fill() 2886 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", in hostapd_config_fill()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | ap_config_file.c | 658 char *secret; in hostapd_parse_das_client() local 660 secret = os_strchr(val, ' '); in hostapd_parse_das_client() 661 if (secret == NULL) in hostapd_parse_das_client() 664 *secret++ = '\0'; in hostapd_parse_das_client() 670 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); in hostapd_parse_das_client() 673 bss->radius_das_shared_secret_len = os_strlen(secret); in hostapd_parse_das_client() 2758 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", 2792 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed",
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 5333 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, in tls_sess_sec_cb() argument 5337 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, in tls_sess_sec_cb() 5355 s->s3->server_random, secret); in tls_sess_sec_cb() 5370 server_random, secret); in tls_sess_sec_cb()
|