Home
last modified time | relevance | path

Searched refs:secret (Results 26 - 50 of 378) sorted by relevance

12345678910>>...16

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256()
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256()
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256()
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_le in tls_prf_sha256()
[all...]
H A Dsha256-kdf.c17 * @secret: Key for KDF
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
H A Dsha384-kdf.c17 * @secret: Key for KDF
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf()
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
H A Dsha512-kdf.c17 * @secret: Key for KDF
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf()
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256()
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256()
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256()
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_le in tls_prf_sha256()
[all...]
H A Dsha384-tlsprf.c17 * @secret: Key for PRF
29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha384()
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha384()
50 * PRF(secret, label, seed) = P_SHA384(secret, label + seed) in tls_prf_sha384()
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_le in tls_prf_sha384()
[all...]
H A Dsha256-kdf.c17 * @secret: Key for KDF
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf()
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/
H A Dstorage_daemon.cpp708 const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) in PrepareUserDirsAndUpdateUserAuth()
729 UserTokenSecret userTokenSecret = { .token = token, .oldSecret = {'!'}, .newSecret = secret, in PrepareUserDirsAndUpdateUserAuth()
781 const std::vector<uint8_t> &secret) in GenerateKeyAndPrepareUserDirs()
788 ret = KeyManager::GetInstance()->GenerateUserKeyByType(userId, type, token, secret); in GenerateKeyAndPrepareUserDirs()
791 userId, type, secret.empty()); in GenerateKeyAndPrepareUserDirs()
807 userId, flags, secret.empty()); in GenerateKeyAndPrepareUserDirs()
818 const std::vector<uint8_t> &secret) in ActiveUserKeyAndPrepare()
822 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, type, token, secret); in ActiveUserKeyAndPrepare()
826 if ((!token.empty() || !secret.empty()) && std::filesystem::exists(elNeedRestorePath)) { in ActiveUserKeyAndPrepare()
828 ret = PrepareUserDirsAndUpdateUserAuth(userId, type, token, secret); in ActiveUserKeyAndPrepare()
707 PrepareUserDirsAndUpdateUserAuth(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) PrepareUserDirsAndUpdateUserAuth() argument
779 GenerateKeyAndPrepareUserDirs(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateKeyAndPrepareUserDirs() argument
816 ActiveUserKeyAndPrepare(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepare() argument
853 ActiveUserKeyAndPrepareElX(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepareElX() argument
916 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument
1060 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
1114 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/
H A Decx_exch.c116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
137 if (secret == NULL) { in ecx_derive()
150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive()
157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive()
166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive()
173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
/third_party/openssl/providers/implementations/exchange/
H A Decx_exch.c116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
137 if (secret == NULL) { in ecx_derive()
150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive()
157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive()
166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive()
173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius.c367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
370 if (secret) { in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
426 addr[3] = secret; in radius_msg_finish_srv()
439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
464 addr[1] = secret; in radius_msg_finish_das_resp()
478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument
520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument
542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument
799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument
981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument
1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument
1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument
1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument
1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument
1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument
1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument
1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius.c367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
370 if (secret) { in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
426 addr[3] = secret; in radius_msg_finish_srv()
439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
464 addr[1] = secret; in radius_msg_finish_das_resp()
478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument
520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument
542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument
799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument
849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument
981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument
1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument
1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument
1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument
1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument
1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument
1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument
1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument
[all...]
/test/xts/acts/security/asset/asset_ndk/entry/src/main/cpp/
H A Dhello.cpp43 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_Add() local
48 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_Add()
77 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_AddCE() local
81 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_AddCE()
95 Asset_Attr *secret = OH_Asset_ParseAttr(resultSet.results + 0, ASSET_TAG_SECRET); in Asset_AddCE() local
96 if (memcmp(secret->value.blob.data, reinterpret_cast<uint8_t *>(secretBuffer), secret->value.blob.size) == 0) { in Asset_AddCE()
129 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_Add_Auth() local
135 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_Add_Auth()
238 Asset_Blob secret in Asset_PreAndPostQueryError() local
462 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_RemoveError() local
527 Asset_Attr *secret = OH_Asset_ParseAttr(resultSet.results + 0, ASSET_TAG_SECRET); Asset_QueryAll() local
607 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_QueryError() local
719 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateEasy() local
762 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateLabel() local
809 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateError() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/
H A Dkey_manager_mock.cpp54 const std::vector<uint8_t> &secret) in ActiveUserKey()
70 const std::vector<uint8_t> &secret) in UnlockUserScreen()
96 const std::vector<uint8_t> &secret) in CreateRecoverKey()
119 const std::vector<uint8_t> &secret) in GenerateUserKeyByType()
126 const std::vector<uint8_t> &secret) in ActiveCeSceSeceUserKey()
53 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument
69 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
95 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
117 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument
124 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveCeSceSeceUserKey() argument
/third_party/lwip/src/netif/ppp/
H A Dchap-md5.c62 const unsigned char *secret, int secret_len, in chap_md5_verify_response()
75 /* Generate hash of ID, secret, challenge */ in chap_md5_verify_response()
79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response()
96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response()
61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument
95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
/drivers/peripheral/pin_auth/hdi_service/database/src/
H A Dpin_db.c345 static ResultCode WriteAddPinInfo(const Buffer *secret, const Buffer *pinCredentialData, uint8_t *salt, in WriteAddPinInfo() argument
360 ret = WritePinFile(secret->buf, secret->contentSize, templateId, SECRET_SUFFIX); in WriteAddPinInfo()
430 LOG_ERROR("copy root secret fail."); in GenerateRootSecret()
534 Buffer *secret = CreateBufferBySize(SECRET_SIZE); in CreateSecretBuffer() local
535 if (!IsBufferValid(secret)) { in CreateSecretBuffer()
537 return secret; in CreateSecretBuffer()
539 if (SecureRandom(secret->buf, secret->maxSize) != RESULT_SUCCESS) { in CreateSecretBuffer()
541 DestroyBuffer(secret); in CreateSecretBuffer()
548 ProcessAddPin(const Buffer *deviceKey, const Buffer *secret, PinEnrollParam *pinEnrollParam, uint64_t *templateId) ProcessAddPin() argument
600 Buffer *secret = CreateSecretBuffer(); AddPin() local
946 Buffer *secret = CreateBufferBySize(SECRET_SIZE); ProcessAuthPin() local
[all...]
/third_party/nghttp2/src/
H A Dshrpx_quic.cc285 const uint8_t *secret, in generate_quic_stateless_reset_token()
287 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token()
298 const uint8_t *secret, size_t secretlen) { in generate_retry_token()
304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token()
317 const uint8_t *secret, size_t secretlen) { in verify_retry_token()
323 if (ngtcp2_crypto_verify_retry_token(&odcid, token, tokenlen, secret, in verify_retry_token()
333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token()
339 token, secret, secretlen, sa, salen, t); in generate_token()
350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token()
355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretle in verify_token()
284 generate_quic_stateless_reset_token(uint8_t *token, const ngtcp2_cid &cid, const uint8_t *secret, size_t secretlen) generate_quic_stateless_reset_token() argument
295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument
314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument
332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument
349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument
364 generate_quic_connection_id_encryption_key(uint8_t *key, size_t keylen, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) generate_quic_connection_id_encryption_key() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/
H A Dshared.c48 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_expand_label()
63 return ngtcp2_crypto_hkdf_expand(dest, destlen, md, secret, secretlen, info, in ngtcp2_crypto_hkdf_expand_label()
138 const uint8_t *secret, size_t secretlen) { in ngtcp2_crypto_derive_packet_protection_key()
172 if (ngtcp2_crypto_hkdf_expand_label(key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
177 if (ngtcp2_crypto_hkdf_expand_label(iv, ivlen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
183 ngtcp2_crypto_hkdf_expand_label(hp_key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
193 const uint8_t *secret, in ngtcp2_crypto_update_traffic_secret()
197 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret()
208 const uint8_t *secret, in ngtcp2_crypto_derive_and_install_rx_key()
270 md, secret, secretle in ngtcp2_crypto_derive_and_install_rx_key()
46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument
135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument
191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument
205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument
346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument
816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument
833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument
896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument
973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument
1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument
1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument
[all...]
/third_party/node/deps/openssl/openssl/ssl/
H A Dtls13_enc.c28 * Given a |secret|; a |label| of length |labellen|; and |data| of length
30 * secret |outlen| bytes long and store it in the location pointed to be |out|.
34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument
81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand()
107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on
110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument
119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key()
124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on
127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument
136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv()
140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument
333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument
630 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local
967 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local
[all...]
/kernel/linux/linux-5.10/net/sctp/
H A Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
346 return secret; in sctp_auth_asoc_create_secret()
385 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local
[all...]
/kernel/linux/linux-6.6/net/sctp/
H A Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
346 return secret; in sctp_auth_asoc_create_secret()
385 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local
[all...]
/drivers/peripheral/pin_auth/test/unittest/pin_auth/adaptor/src/
H A Dadaptor_algorithm_test.cpp233 Buffer *secret = CreateBufferBySize(SECRET_SIZE); in HWTEST_F() local
234 ASSERT_NE(secret, nullptr); in HWTEST_F()
235 (void)SecureRandom(secret->buf, secret->maxSize); in HWTEST_F()
236 secret->contentSize = secret->maxSize; in HWTEST_F()
242 Buffer *key = DeriveDeviceKey(pinData, secret); in HWTEST_F()
247 DestroyBuffer(secret); in HWTEST_F()
/foundation/filemanagement/storage_service/test/fuzztest/storagemanagerproxy_fuzzer/
H A Dstoragemanagerproxy_fuzzer.cpp41 std::vector<uint8_t> secret; in StorageManagerProxyFuzzTest() local
48 secret.push_back(*data); in StorageManagerProxyFuzzTest()
65 proxy->ActiveUserKey(metaData2, token, secret); in StorageManagerProxyFuzzTest()
67 proxy->UpdateUserAuth(metaData2, metaData4, token, secret, secret); in StorageManagerProxyFuzzTest()
/third_party/mbedtls/programs/ssl/
H A Dssl_test_common_source.c17 const unsigned char *secret, in eap_tls_key_derivation()
25 /* We're only interested in the TLS 1.2 master secret */ in eap_tls_key_derivation()
33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation()
41 const unsigned char *secret, in nss_keylog_export()
52 /* We're only interested in the TLS 1.2 master secret */ in nss_keylog_export()
73 "%02x", secret[j]); in nss_keylog_export()
111 const unsigned char *secret, in dtls_srtp_key_derivation()
119 /* We're only interested in the TLS 1.2 master secret */ in dtls_srtp_key_derivation()
127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
15 eap_tls_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) eap_tls_key_derivation() argument
39 nss_keylog_export(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) nss_keylog_export() argument
109 dtls_srtp_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) dtls_srtp_key_derivation() argument
/third_party/node/test/common/
H A Dtls.js29 'primary secret',
147 function PRF12(algo, secret, label, seed, size) {
149 return P_hash(algo, secret, newSeed, size);
152 function P_hash(algo, secret, seed, size) {
154 let hmac = crypto.createHmac(algo, secret);
159 hmac = crypto.createHmac(algo, secret);
169 hmac = crypto.createHmac(algo, secret);

Completed in 35 milliseconds

12345678910>>...16