/third_party/openssl/test/helpers/ |
H A D | pkcs12.c | 441 void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, in add_secretbag() argument 449 TEST_info("Adding secret <%s>", secret); in add_secretbag() 451 bag = PKCS12_add_secret(&pb->bags, secret_nid, (const unsigned char *)secret, strlen(secret)); in add_secretbag() 639 void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs) in check_secretbag() argument 655 || !TEST_true(check_asn1_string(PKCS12_SAFEBAG_get0_bag_obj(bag), secret))) in check_secretbag()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_keys.h | 103 * \param secret The \c Secret argument to \c HKDF-Expand-Label. 106 * \param secret_len The length of \p secret in Bytes. 114 * \param buf The destination buffer to hold the expanded secret. 116 * \param buf_len The desired size of the expanded secret in Bytes. 125 const unsigned char *secret, size_t secret_len, 143 * for the HKDF-based expansion of the secret. 144 * \param client_secret The client traffic secret. 147 * \param server_secret The server traffic secret. 181 * \param secret The \c Secret argument to the \c Derive-Secret function. 184 * \param secret_len The length of \p secret i [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-dh-stateless.js | 201 // This key combination will result in an unusually short secret, and should 203 const secret = crypto.diffieHellman({ publicKey, privateKey }); 204 assert.strictEqual(secret.toString('hex'),
|
/third_party/node/tools/ |
H A D | release.sh | 46 gpgkey=$(gpg --list-secret-keys --keyid-format SHORT | awk -F'( +|/)' '/^(sec|ssb)/{print $3}') 58 gpg --list-secret-keys
|
/third_party/lwip/src/include/netif/ppp/ |
H A D | chap-new.h | 141 const unsigned char *secret, int secret_len, 146 const unsigned char *challenge, const char *secret, int secret_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal-modexp.c | 46 u8 *secret, size_t *len) in crypto_dh_derive_secret() 82 prime, prime_len, secret, len); in crypto_dh_derive_secret() 42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_openssl.c | 550 u8 *secret, size_t *len) in crypto_dh_derive_secret() 581 prime, prime_len, secret, len); in crypto_dh_derive_secret() 2094 struct wpabuf *secret = NULL; in crypto_ecdh_set_peerkey() local 2153 secret = wpabuf_alloc(secret_len); in crypto_ecdh_set_peerkey() 2154 if (!secret) in crypto_ecdh_set_peerkey() 2156 if (EVP_PKEY_derive(ctx, wpabuf_put(secret, 0), &secret_len) != 1) { in crypto_ecdh_set_peerkey() 2162 if (secret->size != secret_len) in crypto_ecdh_set_peerkey() 2165 (int) secret->size, (int) secret_len); in crypto_ecdh_set_peerkey() 2166 wpabuf_put(secret, secret_len); in crypto_ecdh_set_peerkey() 2175 return secret; in crypto_ecdh_set_peerkey() 546 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha384.h | 23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
|
H A D | sha512.h | 23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal-modexp.c | 46 u8 *secret, size_t *len) in crypto_dh_derive_secret() 82 prime, prime_len, secret, len); in crypto_dh_derive_secret() 42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
H A D | sha512.h | 23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
|
/third_party/lwip/src/netif/ppp/ |
H A D | pppol2tp.c | 111 const u8_t *secret, u8_t secret_len, in pppol2tp_create() 117 LWIP_UNUSED_ARG(secret); in pppol2tp_create() 149 l2tp->secret = secret; in pppol2tp_create() 314 if (l2tp->secret != NULL) { in pppol2tp_connect() 614 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet() 615 PPPDEBUG(LOG_DEBUG, ("pppol2tp: Received challenge from peer and no secret key available\n")); in pppol2tp_dispatch_control_packet() 619 /* Generate hash of ID, secret, challenge */ in pppol2tp_dispatch_control_packet() 624 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet() 635 /* Generate hash of ID, secret, challeng in pppol2tp_dispatch_control_packet() 109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) pppol2tp_create() argument [all...] |
/third_party/musl/src/malloc/mallocng/ |
H A D | meta.h | 42 uint64_t secret; member 155 const struct meta *meta = encode_ptr(base->meta, ctx.secret); in get_meta() 161 assert(area->check == ctx.secret); in get_meta()
|
H A D | malloc.c | 109 ctx.secret = get_random_secret(); in alloc_meta() 165 ctx.meta_area_tail->check = ctx.secret; in alloc_meta() 348 m->mem->meta = encode_ptr(m, ctx.secret); in alloc_group() 395 g->mem->meta = encode_ptr(g, ctx.secret); in malloc()
|
/third_party/musl/porting/linux/user/src/malloc/mallocng/ |
H A D | meta.h | 42 uint64_t secret; member 155 const struct meta *meta = encode_ptr(base->meta, ctx.secret); in get_meta() 161 assert(area->check == ctx.secret); in get_meta()
|
H A D | malloc.c | 107 ctx.secret = get_random_secret(); in alloc_meta() 161 ctx.meta_area_tail->check = ctx.secret; in alloc_meta() 343 m->mem->meta = encode_ptr(m, ctx.secret); in alloc_group() 388 g->mem->meta = encode_ptr(g, ctx.secret); in malloc()
|
/third_party/mbedtls/3rdparty/everest/include/everest/vs2013/ |
H A D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/third_party/mbedtls/3rdparty/everest/include/everest/ |
H A D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/third_party/curl/lib/vtls/ |
H A D | keylog.h | 50 const unsigned char *secret, size_t secretlen);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/third_party/mbedtls/3rdparty/p256-m/p256-m/ |
H A D | p256-m.h | 48 * ECDH compute shared secret 50 * [out] secret: on success, holds the shared secret, as a big-endian integer 58 int p256_ecdh_shared_secret(uint8_t secret[32],
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_i.h | 82 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, 88 u8 *secret, size_t *secret_len);
|