Home
last modified time | relevance | path

Searched refs:secret (Results 151 - 175 of 250) sorted by relevance

12345678910

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Deapol_test.c1000 int port, const char *secret, in wpa_init_conf()
1037 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
1038 as->shared_secret_len = os_strlen(secret); in wpa_init_conf()
1248 "[-s<AS secret>]\\\n" in usage()
1263 " -s<AS secret> = shared secret with the authentication " in usage()
998 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr, const char *ifname) wpa_init_conf() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Deapol_test.c998 int port, const char *secret, in wpa_init_conf()
1036 as->shared_secret = (u8 *) os_strdup(secret); in wpa_init_conf()
1037 as->shared_secret_len = os_strlen(secret); in wpa_init_conf()
1247 "[-s<AS secret>]\\\n" in usage()
1262 " -s<AS secret> = shared secret with the authentication " in usage()
996 wpa_init_conf(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, const char *authsrv, int port, const char *secret, const char *cli_addr, const char *ifname) wpa_init_conf() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa.c6297 struct wpabuf *secret, *pub, *hkey;
6352 secret = crypto_ecdh_set_peerkey(sm->owe_ecdh, 0,
6355 secret = wpabuf_zeropad(secret, prime_len);
6356 if (!secret) {
6360 wpa_hexdump_buf_key(MSG_DEBUG, "OWE: DH shared secret", secret);
6366 wpabuf_clear_free(secret);
6391 wpabuf_clear_free(secret);
6398 wpabuf_clear_free(secret);
[all...]
/third_party/curl/lib/vtls/
H A Dwolfssl.c103 * The TLS 1.3 secret callback (wolfSSL_set_tls13_secret_cb) was added in
112 wolfssl_tls13_secret_callback(SSL *ssl, int id, const unsigned char *secret, in wolfssl_tls13_secret_callback() argument
154 Curl_tls_keylog_write(label, client_random, secret, secretSz); in wolfssl_tls13_secret_callback()
177 /* TLS 1.3 does not use this mechanism, the "master secret" returned below in wolfssl_log_tls12_secret()
188 /* Check for a missing master secret and skip logging. That can happen if in wolfssl_log_tls12_secret()
782 * for the server response. At that point the master secret is not yet in wolfssl_connect_step2()
784 * To log the secret on completion with a handshake failure, detect in wolfssl_connect_step2()
/third_party/node/deps/openssl/openssl/include/openssl/
H A Dcore_dispatch.h663 OSSL_CORE_MAKE_FUNC(int, keyexch_derive, (void *ctx, unsigned char *secret,
824 unsigned char *secret,
/third_party/openssl/include/openssl/
H A Dcore_dispatch.h663 OSSL_CORE_MAKE_FUNC(int, keyexch_derive, (void *ctx, unsigned char *secret,
824 unsigned char *secret,
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_local.h650 /* Extended master secret support */
1363 /* Temporary storage for premaster secret */
1592 * secret and SSLv3/TLS (<=1.2) rollback check
1659 /* TLS pre-shared secret session resumption */
2663 const unsigned char *secret,
2668 const unsigned char *secret, unsigned char *key,
2671 const unsigned char *secret, unsigned char *iv,
2674 const unsigned char *secret,
2799 * ssl_log_secret logs |secret| to the SSL_CTX associated with |ssl|, if
2804 const uint8_t *secret, size_
[all...]
/third_party/openssl/ssl/
H A Dssl_local.h643 /* Extended master secret support */
1339 /* Temporary storage for premaster secret */
1563 * secret and SSLv3/TLS (<=1.2) rollback check
1630 /* TLS pre-shared secret session resumption */
2607 const unsigned char *secret,
2612 const unsigned char *secret, unsigned char *key,
2615 const unsigned char *secret, unsigned char *iv,
2618 const unsigned char *secret,
2743 * ssl_log_secret logs |secret| to the SSL_CTX associated with |ssl|, if
2748 const uint8_t *secret, size_
[all...]
/third_party/nghttp2/src/
H A Dshrpx_config.cc244 LOG(ERROR) << "frontend-quic-secret-file: could not open file " << path; in read_quic_secret_file()
258 LOG(ERROR) << "frontend-quic-secret-file: each line must be a " in read_quic_secret_file()
271 util::decode_hex(std::begin(qkm.secret), in read_quic_secret_file()
272 StringRef{p, p + qkm.secret.size()}); in read_quic_secret_file()
273 p += qkm.secret.size() * 2; in read_quic_secret_file()
288 << "frontend-quic-secret-file: error occurred while reading file " in read_quic_secret_file()
295 << "frontend-quic-secret-file: no keying materials are present in file " in read_quic_secret_file()
1691 LOG(ERROR) << SHRPX_OPT_PSK_SECRETS << ": empty secret at line " in parse_psk_secrets()
1698 << ": secret must be hex string at line " << lineno; in parse_psk_secrets()
1705 auto secret in parse_psk_secrets() local
[all...]
H A Dshrpx_config.h397 StringRef::from_lit("frontend-quic-secret-file");
639 std::array<uint8_t, SHRPX_QUIC_SECRETLEN> secret; member
741 StringRef secret; member
751 // its secret.
/third_party/mbedtls/library/
H A Dssl_tls.c401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen,
430 static int tls_prf_sha256(const unsigned char *secret, size_t slen,
441 static int tls_prf_sha384(const unsigned char *secret, size_t slen,
467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf()
491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6747 const unsigned char *secret, size_t slen, in tls_prf_generic()
6764 /* Normally a "secret" should be long enough to be impossible to in tls_prf_generic()
6767 * and for this use case it makes sense to have a 0-length "secret". in tls_prf_generic()
6770 * to mean a 0-length "secret" input. */ in tls_prf_generic()
6777 status = psa_import_key(&key_attributes, secret, sle in tls_prf_generic()
466 mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) mbedtls_ssl_tls_prf() argument
6746 tls_prf_generic(mbedtls_md_type_t md_type, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_generic() argument
6826 tls_prf_generic(mbedtls_md_type_t md_type, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_generic() argument
6933 tls_prf_sha256(const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_sha256() argument
6945 tls_prf_sha384(const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen) tls_prf_sha384() argument
[all...]
H A Decjpake.c97 const unsigned char *secret, in mbedtls_ecjpake_setup()
116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup()
93 mbedtls_ecjpake_setup(mbedtls_ecjpake_context *ctx, mbedtls_ecjpake_role role, mbedtls_md_type_t hash, mbedtls_ecp_group_id curve, const unsigned char *secret, size_t len) mbedtls_ecjpake_setup() argument
/third_party/lwip/src/include/netif/ppp/
H A Dppp_impl.h578 int get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server);
579 /* get "secret" for chap */
/third_party/openssl/test/
H A Dtls13secretstest.c190 const uint8_t *secret, in ssl_log_secret()
297 TEST_info("Early secret generation failed"); in test_handshake_secrets()
303 TEST_info("Early secret does not match"); in test_handshake_secrets()
309 TEST_info("Handshake secret generation failed"); in test_handshake_secrets()
329 TEST_info("Client handshake secret test failed"); in test_handshake_secrets()
344 TEST_info("Server handshake secret test failed"); in test_handshake_secrets()
357 TEST_info("Master secret generation failed"); in test_handshake_secrets()
363 TEST_info("Master secret does not match"); in test_handshake_secrets()
378 TEST_info("Client application data secret test failed"); in test_handshake_secrets()
393 TEST_info("Server application data secret tes in test_handshake_secrets()
188 ssl_log_secret(SSL *ssl, const char *label, const uint8_t *secret, size_t secret_len) ssl_log_secret() argument
[all...]
H A Devp_kdf_test.c37 static OSSL_PARAM *construct_tls1_prf_params(const char *digest, const char *secret, in construct_tls1_prf_params() argument
49 (unsigned char *)secret, in construct_tls1_prf_params()
50 strlen(secret)); in construct_tls1_prf_params()
70 params = construct_tls1_prf_params("sha256", "secret", "seed"); in test_kdf_tls1_prf()
88 params = construct_tls1_prf_params("blah", "secret", "seed"); in test_kdf_tls1_prf_invalid_digest()
106 params = construct_tls1_prf_params("sha256", "secret", "seed"); in test_kdf_tls1_prf_zero_output_size()
162 params = construct_tls1_prf_params("sha256", "secret", ""); in test_kdf_tls1_prf_empty_seed()
182 params = construct_tls1_prf_params("sha256", "secret", "1"); in test_kdf_tls1_prf_1byte_seed()
230 params = construct_hkdf_params("sha256", "secret", 6, "salt", "label"); in test_kdf_hkdf()
253 "secret", in do_kdf_hkdf_gettables()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto.h426 u8 *secret, size_t *len);
995 * crypto_ecdh_set_peerkey - Compute ECDH secret
1001 * Returns: Binary data with the EDCH secret or %NULL on failure
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddpp.h490 struct wpabuf *secret; member
H A Ddpp.c405 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, in dpp_hkdf_expand() argument
409 return hmac_sha256_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
413 return hmac_sha384_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
417 return hmac_sha512_kdf(secret, secret_len, NULL, in dpp_hkdf_expand()
614 u8 *secret, size_t *secret_len) in dpp_ecdh()
653 * need for shared secret from EVP_PKEY_derive(NULL) in some in dpp_ecdh()
678 os_memcpy(secret, buf, *secret_len); in dpp_ecdh()
683 if (EVP_PKEY_derive(ctx, secret, secret_len) != 1) { in dpp_ecdh()
2303 wpa_hexdump_key(MSG_DEBUG, "DPP: ECDH shared secret (M.x)", in dpp_auth_init()
2891 wpa_hexdump_key(MSG_DEBUG, "DPP: ECDH shared secret ( in dpp_auth_build_resp_ok()
613 dpp_ecdh(EVP_PKEY *own, EVP_PKEY *peer, u8 *secret, size_t *secret_len) dpp_ecdh() argument
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dssl.h1255 unsigned char MBEDTLS_PRIVATE(master)[48]; /*!< the master secret */
1362 * \param secret The address of the buffer holding the secret
1364 * \param secret_len The length of \p secret in bytes.
1372 const unsigned char *secret,
1439 uint8_t MBEDTLS_PRIVATE(extended_ms); /*!< negotiate extended master secret? */
1931 /** Callback to export key block and master secret */
4115 * \param pw EC J-PAKE password (pre-shared secret). It cannot be empty
5214 * - This data is not forward secret, as it is encrypted
5265 * - This data is not forward secret, a
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/lib/includes/ngtcp2/
H A Dngtcp2.h3009 * encryption and decryption, and write decryption secret and IV to
3013 * write encryption secret and IV to the buffer pointed by |tx_secret|
3016 * buffers have the enough capacity to store secret, key and IV.
3957 * materials for decrypting Short header packets. |secret| of length
3958 * |secretlen| is the decryption secret which is used to derive keying
3980 ngtcp2_conn *conn, const uint8_t *secret, size_t secretlen,
3988 * materials for encrypting Short header packets. |secret| of length
3989 * |secretlen| is the encryption secret which is used to derive keying
4011 ngtcp2_conn *conn, const uint8_t *secret, size_t secretlen,
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dsign.rs51 let key = PKey::hmac(b"my secret").unwrap();
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp.h633 struct wpabuf *secret; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
H A Dap_config_file.c664 char *secret; in hostapd_parse_das_client() local
666 secret = os_strchr(val, ' '); in hostapd_parse_das_client()
667 if (secret == NULL) in hostapd_parse_das_client()
670 *secret++ = '\0'; in hostapd_parse_das_client()
676 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); in hostapd_parse_das_client()
679 bss->radius_das_shared_secret_len = os_strlen(secret); in hostapd_parse_das_client()
2852 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", in hostapd_config_fill()
2886 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed", in hostapd_config_fill()
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
H A Dap_config_file.c658 char *secret; in hostapd_parse_das_client() local
660 secret = os_strchr(val, ' '); in hostapd_parse_das_client()
661 if (secret == NULL) in hostapd_parse_das_client()
664 *secret++ = '\0'; in hostapd_parse_das_client()
670 bss->radius_das_shared_secret = (u8 *) os_strdup(secret); in hostapd_parse_das_client()
673 bss->radius_das_shared_secret_len = os_strlen(secret); in hostapd_parse_das_client()
2758 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed",
2792 wpa_printf(MSG_ERROR, "Line %d: empty shared secret is not allowed",
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl.c5333 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, in tls_sess_sec_cb() argument
5337 static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, in tls_sess_sec_cb()
5355 s->s3->server_random, secret); in tls_sess_sec_cb()
5370 server_random, secret); in tls_sess_sec_cb()

Completed in 83 milliseconds

12345678910