/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 260 const std::vector<uint8_t> secret = {1}; in HWTEST_F() local 262 EXPECT_EQ(KeyManager::GetInstance()->ActiveUserKey(user, token, secret), 0); in HWTEST_F() 277 std::vector<uint8_t> secret = {}; in HWTEST_F() local 279 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), 0); in HWTEST_F() 284 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL2_KEY, token, secret), 0); in HWTEST_F() 289 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, type, token, secret), E_KEY_TYPE_INVAL); in HWTEST_F() 292 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -ENOENT); in HWTEST_F() 295 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -ENOENT); in HWTEST_F() 302 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EOPNOTSUPP); in HWTEST_F() 310 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), in HWTEST_F() 326 std::vector<uint8_t> secret = {}; HWTEST_F() local 402 const std::vector<uint8_t> secret = {}; HWTEST_F() local 425 const std::vector<uint8_t> secret = {}; HWTEST_F() local 1413 std::string secret = "bad_secret"; HWTEST_F() local 1455 std::string secret = "bad_secret"; HWTEST_F() local 1498 std::string secret = "bad_secret"; HWTEST_F() local 1689 std::string secret = "bad_secret"; HWTEST_F() local 1710 std::string secret = "bad_secret"; HWTEST_F() local [all...] |
H A D | key_manager_sup_test.cpp | 386 std::vector<uint8_t> secret; in HWTEST_F() local 391 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 398 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 404 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 410 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), true); in HWTEST_F() 416 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 526 std::vector<uint8_t> secret; in HWTEST_F() local 533 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F() 546 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F() 555 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, re in HWTEST_F() [all...] |
/foundation/filemanagement/storage_service/services/storage_manager/crypto/ |
H A D | filesystem_crypto.cpp | 112 const std::vector<uint8_t> &secret) in ActiveUserKey() 122 err = sdCommunication->ActiveUserKey(userId, token, secret); in ActiveUserKey() 155 const std::vector<uint8_t> &secret) in UnlockUserScreen() 165 return sdCommunication->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 230 const std::vector<uint8_t> &secret) in CreateRecoverKey() 240 return sdCommunication->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey() 110 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 153 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 227 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
/third_party/node/deps/openssl/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 283 OPENSSL_cleanse(secret, nlen); in rsasve_generate() 320 unsigned char *secret, size_t *secretlen) in rsakem_generate() 326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate() 244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument 319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
|
/third_party/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 283 OPENSSL_cleanse(secret, nlen); in rsasve_generate() 320 unsigned char *secret, size_t *secretlen) in rsakem_generate() 326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate() 244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument 319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | sskdf.c | 24 * Z is a shared secret required to produce the derived key material. 58 unsigned char *secret; member 89 * counter is appended to the secret 'z'. 306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset() 358 if (ctx->secret == NULL) { in sskdf_derive() 405 ctx->secret, ctx->secret_len, in sskdf_derive() 414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive() 428 if (ctx->secret == NULL) { in x963kdf_derive() 445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive() 476 if (!sskdf_set_buffer(&ctx->secret, in sskdf_set_ctx_params() [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | sskdf.c | 24 * Z is a shared secret required to produce the derived key material. 58 unsigned char *secret; member 89 * counter is appended to the secret 'z'. 306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); in sskdf_reset() 358 if (ctx->secret == NULL) { in sskdf_derive() 405 ctx->secret, ctx->secret_len, in sskdf_derive() 414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in sskdf_derive() 428 if (ctx->secret == NULL) { in x963kdf_derive() 445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, in x963kdf_derive() 476 if (!sskdf_set_buffer(&ctx->secret, in sskdf_set_ctx_params() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | crypto_wolfssl.c | 702 byte *secret; in dh5_init_fixed() local 710 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 711 if (!secret) in dh5_init_fixed() 719 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed() 725 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed() 735 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 744 struct wpabuf *secret; in dh5_derive_shared() local 747 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared() 748 if (!secret) in dh5_derive_shared() 751 if (wc_DhAgree(ctx, wpabuf_mhead(secret), in dh5_derive_shared() 828 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument 1805 struct wpabuf *secret = NULL; crypto_ecdh_set_peerkey() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha384.h | 23 int tls_prf_sha384(const u8 *secret, size_t secret_len, 26 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
H A D | crypto_wolfssl.c | 704 byte *secret; in dh5_init_fixed() local 712 secret = XMALLOC(RFC3526_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 713 if (!secret) in dh5_init_fixed() 721 if (wc_DhAgree(dh, secret, &secret_sz, wpabuf_head(priv), in dh5_init_fixed() 727 os_memcmp(secret, wpabuf_head(publ), secret_sz) != 0) in dh5_init_fixed() 737 XFREE(secret, NULL, DYNAMIC_TYPE_TMP_BUFFER); in dh5_init_fixed() 748 struct wpabuf *secret; in dh5_derive_shared() local 751 secret = wpabuf_alloc(RFC3526_LEN); in dh5_derive_shared() 752 if (!secret) in dh5_derive_shared() 755 if (wc_DhAgree(ctx, wpabuf_mhead(secret), in dh5_derive_shared() 832 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument 1787 struct wpabuf *secret = NULL; crypto_ecdh_set_peerkey() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/client/include/ |
H A D | storage_daemon_client.h | 54 const std::vector<uint8_t> &secret); 61 const std::vector<uint8_t> &secret); 73 const std::vector<uint8_t> &secret);
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 326 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 337 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf_extract() 368 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_extract() 380 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf_expand() 392 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf_expand() 421 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_expand() 434 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf() 444 OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (void *)secret, in ngtcp2_crypto_hkdf() 476 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf() 325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-new.c | 416 unsigned char secret[MAXSECRETLEN]; local 419 /* Get the secret that the peer is supposed to know */ 420 if (!get_secret(pcb, name, ourname, (char *)secret, &secret_len, 1)) { 421 ppp_error("No CHAP secret found for authenticating %q", name); 424 ok = digest->verify_response(pcb, id, name, secret, secret_len, challenge, 426 memset(secret, 0, sizeof(secret)); 442 char secret[MAXSECRETLEN+1]; local 468 /* get secret for authenticating ourselves with the specified host */ 469 if (!get_secret(pcb, pcb->chap_client.name, rname, secret, [all...] |
/foundation/filemanagement/storage_service/services/storage_manager/client/ |
H A D | storage_manager_client.cpp | 117 const std::vector<uint8_t> &secret) in ActiveUserKey() 125 return client->ActiveUserKey(userId, token, secret); in ActiveUserKey() 163 const std::vector<uint8_t> &secret) in UnlockUserScreen() 171 return client->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 115 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 161 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
|
/third_party/typescript/tests/baselines/reference/ |
H A D | protectedMembersThisParameter.js | 3 protected secret(): void {} 10 m.secret(); // should error 118 Message.prototype.secret = function () { };
128 m.secret(); // should error
|
/third_party/node/test/node-api/test_cleanup_hook/ |
H A D | binding.c | 13 static int secret = 42; variable 40 napi_add_env_cleanup_hook(env, cleanup, &secret); in Init()
|
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | kdf_exch.c | 94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument 106 if (secret == NULL) { in kdf_derive() 119 ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL); in kdf_derive()
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | kdf_exch.c | 94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument 106 if (secret == NULL) { in kdf_derive() 119 ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL); in kdf_derive()
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | base_key.cpp | 246 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || // OOBE首次开机 删除密码(ABC) in StoreKey() 461 if (auth.secret.IsEmpty()) { in StoreKey() 462 mUserAuth.secret = KeyBlob(NULL_SECRET); in StoreKey() 471 if (!OpensslCrypto::AESEncrypt(mUserAuth.secret, rndEnc, keyCtx)) { in StoreKey() 569 if (!auth.secret.IsEmpty() && FileExists(NEED_UPDATE_PATH)) { in StoreKey() 601 KeyContext ctxNone; // 1.设备级,用户el1 无token 无secret d in StoreKey() 628 if ((auth.secret.IsEmpty() && auth.token.IsEmpty()) || // 无密码Avtive 新增密码,用空密码解密(ABC) in StoreKey() 629 (!auth.secret.IsEmpty() && !auth.token.IsEmpty())) { // 有密码Avtive 修改密码,老密码解密(ABC) Pin码解锁(AB) in StoreKey() 652 // 人脸指纹场景 有token 无secret(AB) in StoreKey() 653 if (auth.secret in StoreKey() [all...] |
/third_party/openssl/test/ |
H A D | evp_libctx_test.c | 528 unsigned char secret[256] = { 0, }; in kem_rsa_gen_recover() local 543 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret, in kem_rsa_gen_recover() 552 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover() 594 unsigned char secret[256] = { 0, }; in kem_rsa_params() local 611 /* Wrong key component - no secret should be returned on failure */ in kem_rsa_params() 614 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params() 616 && TEST_uchar_eq(secret[0], 0) in kem_rsa_params() 619 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params() 627 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, NULL), 1) in kem_rsa_params() 631 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, NULL, secret, in kem_rsa_params() [all...] |
/foundation/filemanagement/storage_service/services/storage_manager/include/client/ |
H A D | storage_manager_client.h | 42 const std::vector<uint8_t> &secret); 48 const std::vector<uint8_t> &secret);
|
/third_party/node/test/parallel/ |
H A D | test-tls-psk-circuit.js | 26 function test(secret, opts, error) { 36 pskCallback: common.mustCall(() => secret), 67 // Recognized user but incorrect secret should fail handshake
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_crypto.h | 78 ngtcp2_vec secret; member 96 * assigns its pointer to |*pckm|. The |secret| of length 99 * assumes no secret is given which is acceptable. The sole reason to 100 * store secret is update keys. Only 1RTT key can be updated. 102 int ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret, 110 * it does not copy secret, key and IV.
|