Home
last modified time | relevance | path

Searched refs:secret (Results 51 - 75 of 294) sorted by relevance

12345678910>>...12

/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/
H A Dkey_manager_test.cpp260 const std::vector<uint8_t> secret = {1}; in HWTEST_F() local
262 EXPECT_EQ(KeyManager::GetInstance()->ActiveUserKey(user, token, secret), 0); in HWTEST_F()
277 std::vector<uint8_t> secret = {}; in HWTEST_F() local
279 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), 0); in HWTEST_F()
284 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL2_KEY, token, secret), 0); in HWTEST_F()
289 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, type, token, secret), E_KEY_TYPE_INVAL); in HWTEST_F()
292 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -ENOENT); in HWTEST_F()
295 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -ENOENT); in HWTEST_F()
302 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EOPNOTSUPP); in HWTEST_F()
310 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), in HWTEST_F()
326 std::vector<uint8_t> secret = {}; HWTEST_F() local
402 const std::vector<uint8_t> secret = {}; HWTEST_F() local
425 const std::vector<uint8_t> secret = {}; HWTEST_F() local
1413 std::string secret = "bad_secret"; HWTEST_F() local
1455 std::string secret = "bad_secret"; HWTEST_F() local
1498 std::string secret = "bad_secret"; HWTEST_F() local
1689 std::string secret = "bad_secret"; HWTEST_F() local
1710 std::string secret = "bad_secret"; HWTEST_F() local
[all...]
H A Dkey_manager_sup_test.cpp386 std::vector<uint8_t> secret; in HWTEST_F() local
391 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F()
398 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F()
404 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F()
410 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), true); in HWTEST_F()
416 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F()
526 std::vector<uint8_t> secret; in HWTEST_F() local
533 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F()
546 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F()
555 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, re in HWTEST_F()
[all...]
/foundation/filemanagement/storage_service/services/storage_manager/crypto/
H A Dfilesystem_crypto.cpp112 const std::vector<uint8_t> &secret) in ActiveUserKey()
122 err = sdCommunication->ActiveUserKey(userId, token, secret); in ActiveUserKey()
155 const std::vector<uint8_t> &secret) in UnlockUserScreen()
165 return sdCommunication->UnlockUserScreen(userId, token, secret); in UnlockUserScreen()
230 const std::vector<uint8_t> &secret) in CreateRecoverKey()
240 return sdCommunication->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey()
110 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument
153 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
227 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
/third_party/node/deps/openssl/openssl/providers/implementations/kem/
H A Drsa_kem.c246 unsigned char *secret, size_t *secretlen) in rsasve_generate()
271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate()
275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate()
283 OPENSSL_cleanse(secret, nlen); in rsasve_generate()
320 unsigned char *secret, size_t *secretlen) in rsakem_generate()
326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument
319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
/third_party/openssl/providers/implementations/kem/
H A Drsa_kem.c246 unsigned char *secret, size_t *secretlen) in rsasve_generate()
271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate()
275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate()
283 OPENSSL_cleanse(secret, nlen); in rsasve_generate()
320 unsigned char *secret, size_t *secretlen) in rsakem_generate()
326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument
319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dsskdf.c24 * Z is a shared secret required to produce the derived key material.
58 unsigned char *secret; member
89 * counter is appended to the secret 'z'.
306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset()
358 if (ctx->secret == NULL) { in sskdf_derive()
405 ctx->secret, ctx->secret_len, in sskdf_derive()
414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive()
428 if (ctx->secret == NULL) { in x963kdf_derive()
445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive()
476 if (!sskdf_set_buffer(&ctx->secret, in sskdf_set_ctx_params()
[all...]
/third_party/openssl/providers/implementations/kdfs/
H A Dsskdf.c24 * Z is a shared secret required to produce the derived key material.
58 unsigned char *secret; member
89 * counter is appended to the secret 'z'.
306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset()
358 if (ctx->secret == NULL) { in sskdf_derive()
405 ctx->secret, ctx->secret_len, in sskdf_derive()
414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive()
428 if (ctx->secret == NULL) { in x963kdf_derive()
445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive()
476 if (!sskdf_set_buffer(&ctx->secret, in sskdf_set_ctx_params()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
H A Dcrypto_wolfssl.c702 byte *secret; in dh5_init_fixed() local
710 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
711 if (!secret) in dh5_init_fixed()
719 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed()
725 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed()
735 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
744 struct wpabuf *secret; in dh5_derive_shared() local
747 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared()
748 if (!secret) in dh5_derive_shared()
751 if (wc_DhAgree(ctx, wpabuf_mhead(secret), in dh5_derive_shared()
828 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
1805 struct wpabuf *secret = NULL; crypto_ecdh_set_peerkey() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
H A Dsha384.h23 int tls_prf_sha384(const u8 *secret, size_t secret_len,
26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
H A Dcrypto_wolfssl.c704 byte *secret; in dh5_init_fixed() local
712 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
713 if (!secret) in dh5_init_fixed()
721 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed()
727 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed()
737 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed()
748 struct wpabuf *secret; in dh5_derive_shared() local
751 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared()
752 if (!secret) in dh5_derive_shared()
755 if (wc_DhAgree(ctx, wpabuf_mhead(secret), in dh5_derive_shared()
832 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
1787 struct wpabuf *secret = NULL; crypto_ecdh_set_peerkey() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/client/include/
H A Dstorage_daemon_client.h54 const std::vector<uint8_t> &secret);
61 const std::vector<uint8_t> &secret);
73 const std::vector<uint8_t> &secret);
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/
H A Dopenssl.c326 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract()
337 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf_extract()
368 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_extract()
380 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf_expand()
392 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf_expand()
421 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_expand()
434 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf()
444 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf()
476 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf()
325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument
379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument
433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
/third_party/lwip/src/netif/ppp/
H A Dchap-new.c416 unsigned char secret[MAXSECRETLEN]; local
419 /* Get the secret that the peer is supposed to know */
420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) {
421 ppp_error("No CHAP secret found for authenticating %q", name);
424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge,
426 memset(secret, 0, sizeof(secret));
442 char secret[MAXSECRETLEN+1]; local
468 /* get secret for authenticating ourselves with the specified host */
469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret,
[all...]
/foundation/filemanagement/storage_service/services/storage_manager/client/
H A Dstorage_manager_client.cpp117 const std::vector<uint8_t> &secret) in ActiveUserKey()
125 return client->ActiveUserKey(userId, token, secret); in ActiveUserKey()
163 const std::vector<uint8_t> &secret) in UnlockUserScreen()
171 return client->UnlockUserScreen(userId, token, secret); in UnlockUserScreen()
115 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument
161 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
/third_party/typescript/tests/baselines/reference/
H A DprotectedMembersThisParameter.js3 protected secret(): void {}
10 m.secret(); // should error
118 Message.prototype.secret = function () { };
128 m.secret(); // should error
/third_party/node/test/node-api/test_cleanup_hook/
H A Dbinding.c13 static int secret = 42; variable
40 napi_add_env_cleanup_hook(env, cleanup, &secret); in Init()
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/
H A Dkdf_exch.c94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument
106 if (secret == NULL) { in kdf_derive()
119 ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL); in kdf_derive()
/third_party/openssl/providers/implementations/exchange/
H A Dkdf_exch.c94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument
106 if (secret == NULL) { in kdf_derive()
119 ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL); in kdf_derive()
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dbase_key.cpp246 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || // OOBE首次开机 删除密码(ABC) in StoreKey()
461 if (auth.secret.IsEmpty()) { in StoreKey()
462 mUserAuth.secret = KeyBlob(NULL_SECRET); in StoreKey()
471 if (!OpensslCrypto::AESEncrypt(mUserAuth.secret, rndEnc, keyCtx)) { in StoreKey()
569 if (!auth.secret.IsEmpty() && FileExists(NEED_UPDATE_PATH)) { in StoreKey()
601 KeyContext ctxNone; // 1.设备级,用户el1 无token 无secret d in StoreKey()
628 if ((auth.secret.IsEmpty() && auth.token.IsEmpty()) || // 无密码Avtive 新增密码,用空密码解密(ABC) in StoreKey()
629 (!auth.secret.IsEmpty() && !auth.token.IsEmpty())) { // 有密码Avtive 修改密码,老密码解密(ABC) Pin码解锁(AB) in StoreKey()
652 // 人脸指纹场景 有token 无secret(AB) in StoreKey()
653 if (auth.secret in StoreKey()
[all...]
/third_party/openssl/test/
H A Devp_libctx_test.c528 unsigned char secret[256] = { 0, }; in kem_rsa_gen_recover() local
543 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret, in kem_rsa_gen_recover()
552 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover()
594 unsigned char secret[256] = { 0, }; in kem_rsa_params() local
611 /* Wrong key component - no secret should be returned on failure */ in kem_rsa_params()
614 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params()
616 && TEST_uchar_eq(secret[0], 0) in kem_rsa_params()
619 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params()
627 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, NULL), 1) in kem_rsa_params()
631 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, NULL, secret, in kem_rsa_params()
[all...]
/foundation/filemanagement/storage_service/services/storage_manager/include/client/
H A Dstorage_manager_client.h42 const std::vector<uint8_t> &secret);
48 const std::vector<uint8_t> &secret);
/third_party/node/test/parallel/
H A Dtest-tls-psk-circuit.js26 function test(secret, opts, error) {
36 pskCallback: common.mustCall(() => secret),
67 // Recognized user but incorrect secret should fail handshake
/third_party/node/deps/ngtcp2/ngtcp2/lib/
H A Dngtcp2_crypto.h78 ngtcp2_vec secret; member
96 * assigns its pointer to |*pckm|. The |secret| of length
99 * assumes no secret is given which is acceptable. The sole reason to
100 * store secret is update keys. Only 1RTT key can be updated.
102 int ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret,
110 * it does not copy secret, key and IV.

Completed in 20 milliseconds

12345678910>>...12