/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256() 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256() 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_le in tls_prf_sha256() [all...] |
H A D | sha256-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
H A D | sha384-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf() argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha384_kdf() 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha384_kdf()
|
H A D | sha512-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, in hmac_sha512_kdf() argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha512_kdf() 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha512_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256() 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256() 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_le in tls_prf_sha256() [all...] |
H A D | sha384-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha384() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha384() 50 * PRF(secret, label, seed) = P_SHA384(secret, label + seed) in tls_prf_sha384() 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_le in tls_prf_sha384() [all...] |
H A D | sha256-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf() argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) in hmac_sha256_kdf() 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0) in hmac_sha256_kdf()
|
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 708 const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) in PrepareUserDirsAndUpdateUserAuth() 729 UserTokenSecret userTokenSecret = { .token = token, .oldSecret = {'!'}, .newSecret = secret, in PrepareUserDirsAndUpdateUserAuth() 781 const std::vector<uint8_t> &secret) in GenerateKeyAndPrepareUserDirs() 788 ret = KeyManager::GetInstance()->GenerateUserKeyByType(userId, type, token, secret); in GenerateKeyAndPrepareUserDirs() 791 userId, type, secret.empty()); in GenerateKeyAndPrepareUserDirs() 807 userId, flags, secret.empty()); in GenerateKeyAndPrepareUserDirs() 818 const std::vector<uint8_t> &secret) in ActiveUserKeyAndPrepare() 822 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, type, token, secret); in ActiveUserKeyAndPrepare() 826 if ((!token.empty() || !secret.empty()) && std::filesystem::exists(elNeedRestorePath)) { in ActiveUserKeyAndPrepare() 828 ret = PrepareUserDirsAndUpdateUserAuth(userId, type, token, secret); in ActiveUserKeyAndPrepare() 707 PrepareUserDirsAndUpdateUserAuth(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) PrepareUserDirsAndUpdateUserAuth() argument 779 GenerateKeyAndPrepareUserDirs(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateKeyAndPrepareUserDirs() argument 816 ActiveUserKeyAndPrepare(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepare() argument 853 ActiveUserKeyAndPrepareElX(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepareElX() argument 916 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 1060 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 1114 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 137 if (secret == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 137 if (secret == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument 499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument 520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument 542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument 799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument 849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument 981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument 1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument 1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument 1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument 1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument 1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument 1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument 1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument 499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument 520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument 542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument 799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument 849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument 981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument 1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument 1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument 1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument 1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument 1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument 1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument 1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument [all...] |
/test/xts/acts/security/asset/asset_ndk/entry/src/main/cpp/ |
H A D | hello.cpp | 43 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_Add() local 48 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_Add() 77 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_AddCE() local 81 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_AddCE() 95 Asset_Attr *secret = OH_Asset_ParseAttr(resultSet.results + 0, ASSET_TAG_SECRET); in Asset_AddCE() local 96 if (memcmp(secret->value.blob.data, reinterpret_cast<uint8_t *>(secretBuffer), secret->value.blob.size) == 0) { in Asset_AddCE() 129 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; in Asset_Add_Auth() local 135 {.tag = ASSET_TAG_SECRET, .value.blob = secret}, in Asset_Add_Auth() 238 Asset_Blob secret in Asset_PreAndPostQueryError() local 462 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_RemoveError() local 527 Asset_Attr *secret = OH_Asset_ParseAttr(resultSet.results + 0, ASSET_TAG_SECRET); Asset_QueryAll() local 607 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_QueryError() local 719 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateEasy() local 762 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateLabel() local 809 Asset_Blob secret = {static_cast<uint32_t>(strlen(secretBuffer)), reinterpret_cast<uint8_t *>(secretBuffer)}; Asset_UpdateError() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | key_manager_mock.cpp | 54 const std::vector<uint8_t> &secret) in ActiveUserKey() 70 const std::vector<uint8_t> &secret) in UnlockUserScreen() 96 const std::vector<uint8_t> &secret) in CreateRecoverKey() 119 const std::vector<uint8_t> &secret) in GenerateUserKeyByType() 126 const std::vector<uint8_t> &secret) in ActiveCeSceSeceUserKey() 53 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 69 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 95 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument 117 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument 124 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveCeSceSeceUserKey() argument
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() 75 /* Generate hash of ID, secret, challenge */ in chap_md5_verify_response() 79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() 108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response() 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
|
/drivers/peripheral/pin_auth/hdi_service/database/src/ |
H A D | pin_db.c | 345 static ResultCode WriteAddPinInfo(const Buffer *secret, const Buffer *pinCredentialData, uint8_t *salt, in WriteAddPinInfo() argument 360 ret = WritePinFile(secret->buf, secret->contentSize, templateId, SECRET_SUFFIX); in WriteAddPinInfo() 430 LOG_ERROR("copy root secret fail."); in GenerateRootSecret() 534 Buffer *secret = CreateBufferBySize(SECRET_SIZE); in CreateSecretBuffer() local 535 if (!IsBufferValid(secret)) { in CreateSecretBuffer() 537 return secret; in CreateSecretBuffer() 539 if (SecureRandom(secret->buf, secret->maxSize) != RESULT_SUCCESS) { in CreateSecretBuffer() 541 DestroyBuffer(secret); in CreateSecretBuffer() 548 ProcessAddPin(const Buffer *deviceKey, const Buffer *secret, PinEnrollParam *pinEnrollParam, uint64_t *templateId) ProcessAddPin() argument 600 Buffer *secret = CreateSecretBuffer(); AddPin() local 946 Buffer *secret = CreateBufferBySize(SECRET_SIZE); ProcessAuthPin() local [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_quic.cc | 285 const uint8_t *secret, in generate_quic_stateless_reset_token() 287 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token() 298 const uint8_t *secret, size_t secretlen) { in generate_retry_token() 304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 317 const uint8_t *secret, size_t secretlen) { in verify_retry_token() 323 if (ngtcp2_crypto_verify_retry_token(&odcid, token, tokenlen, secret, in verify_retry_token() 333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() 339 token, secret, secretlen, sa, salen, t); in generate_token() 350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() 355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretle in verify_token() 284 generate_quic_stateless_reset_token(uint8_t *token, const ngtcp2_cid &cid, const uint8_t *secret, size_t secretlen) generate_quic_stateless_reset_token() argument 295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument 314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument 332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument 349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument 364 generate_quic_connection_id_encryption_key(uint8_t *key, size_t keylen, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) generate_quic_connection_id_encryption_key() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 48 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_expand_label() 63 return ngtcp2_crypto_hkdf_expand(dest, destlen, md, secret, secretlen, info, in ngtcp2_crypto_hkdf_expand_label() 138 const uint8_t *secret, size_t secretlen) { in ngtcp2_crypto_derive_packet_protection_key() 172 if (ngtcp2_crypto_hkdf_expand_label(key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 177 if (ngtcp2_crypto_hkdf_expand_label(iv, ivlen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 183 ngtcp2_crypto_hkdf_expand_label(hp_key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 193 const uint8_t *secret, in ngtcp2_crypto_update_traffic_secret() 197 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret() 208 const uint8_t *secret, in ngtcp2_crypto_derive_and_install_rx_key() 270 md, secret, secretle in ngtcp2_crypto_derive_and_install_rx_key() 46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument 135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument 191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument 205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument 346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument 816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument 833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument 896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument 973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument 1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument 1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | tls13_enc.c | 28 * Given a |secret|; a |label| of length |labellen|; and |data| of length 30 * secret |outlen| bytes long and store it in the location pointed to be |out|. 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv() 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 630 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 967 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/kernel/linux/linux-5.10/net/sctp/ |
H A D | auth.c | 258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 267 if (!secret) in sctp_auth_asoc_set_secret() 271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 280 return secret; in sctp_auth_asoc_set_secret() 295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 346 return secret; in sctp_auth_asoc_create_secret() 385 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local [all...] |
/kernel/linux/linux-6.6/net/sctp/ |
H A D | auth.c | 258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 267 if (!secret) in sctp_auth_asoc_set_secret() 271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 280 return secret; in sctp_auth_asoc_set_secret() 295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 346 return secret; in sctp_auth_asoc_create_secret() 385 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local [all...] |
/drivers/peripheral/pin_auth/test/unittest/pin_auth/adaptor/src/ |
H A D | adaptor_algorithm_test.cpp | 233 Buffer *secret = CreateBufferBySize(SECRET_SIZE); in HWTEST_F() local 234 ASSERT_NE(secret, nullptr); in HWTEST_F() 235 (void)SecureRandom(secret->buf, secret->maxSize); in HWTEST_F() 236 secret->contentSize = secret->maxSize; in HWTEST_F() 242 Buffer *key = DeriveDeviceKey(pinData, secret); in HWTEST_F() 247 DestroyBuffer(secret); in HWTEST_F()
|
/foundation/filemanagement/storage_service/test/fuzztest/storagemanagerproxy_fuzzer/ |
H A D | storagemanagerproxy_fuzzer.cpp | 41 std::vector<uint8_t> secret; in StorageManagerProxyFuzzTest() local 48 secret.push_back(*data); in StorageManagerProxyFuzzTest() 65 proxy->ActiveUserKey(metaData2, token, secret); in StorageManagerProxyFuzzTest() 67 proxy->UpdateUserAuth(metaData2, metaData4, token, secret, secret); in StorageManagerProxyFuzzTest()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_test_common_source.c | 17 const unsigned char *secret, in eap_tls_key_derivation() 25 /* We're only interested in the TLS 1.2 master secret */ in eap_tls_key_derivation() 33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation() 41 const unsigned char *secret, in nss_keylog_export() 52 /* We're only interested in the TLS 1.2 master secret */ in nss_keylog_export() 73 "%02x", secret[j]); in nss_keylog_export() 111 const unsigned char *secret, in dtls_srtp_key_derivation() 119 /* We're only interested in the TLS 1.2 master secret */ in dtls_srtp_key_derivation() 127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation() 15 eap_tls_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) eap_tls_key_derivation() argument 39 nss_keylog_export(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) nss_keylog_export() argument 109 dtls_srtp_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) dtls_srtp_key_derivation() argument
|
/third_party/node/test/common/ |
H A D | tls.js | 29 'primary secret', 147 function PRF12(algo, secret, label, seed, size) { 149 return P_hash(algo, secret, newSeed, size); 152 function P_hash(algo, secret, seed, size) { 154 let hmac = crypto.createHmac(algo, secret); 159 hmac = crypto.createHmac(algo, secret); 169 hmac = crypto.createHmac(algo, secret);
|