Home
last modified time | relevance | path

Searched refs:secret (Results 76 - 100 of 250) sorted by relevance

12345678910

/third_party/openssl/test/helpers/
H A Dpkcs12.c441 void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, in add_secretbag() argument
449 TEST_info("Adding secret <%s>", secret); in add_secretbag()
451 bag = PKCS12_add_secret(&pb->bags, secret_nid, (const unsigned char *)secret, strlen(secret)); in add_secretbag()
639 void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs) in check_secretbag() argument
655 || !TEST_true(check_asn1_string(PKCS12_SAFEBAG_get0_bag_obj(bag), secret))) in check_secretbag()
/third_party/mbedtls/library/
H A Dssl_tls13_keys.h103 * \param secret The \c Secret argument to \c HKDF-Expand-Label.
106 * \param secret_len The length of \p secret in Bytes.
114 * \param buf The destination buffer to hold the expanded secret.
116 * \param buf_len The desired size of the expanded secret in Bytes.
125 const unsigned char *secret, size_t secret_len,
143 * for the HKDF-based expansion of the secret.
144 * \param client_secret The client traffic secret.
147 * \param server_secret The server traffic secret.
181 * \param secret The \c Secret argument to the \c Derive-Secret function.
184 * \param secret_len The length of \p secret i
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-dh-stateless.js201 // This key combination will result in an unusually short secret, and should
203 const secret = crypto.diffieHellman({ publicKey, privateKey });
204 assert.strictEqual(secret.toString('hex'),
/third_party/node/tools/
H A Drelease.sh46 gpgkey=$(gpg --list-secret-keys --keyid-format SHORT | awk -F'( +|/)' '/^(sec|ssb)/{print $3}')
58 gpg --list-secret-keys
/third_party/lwip/src/include/netif/ppp/
H A Dchap-new.h141 const unsigned char *secret, int secret_len,
146 const unsigned char *challenge, const char *secret, int secret_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_internal-modexp.c46 u8 *secret, size_t *len) in crypto_dh_derive_secret()
82 prime, prime_len, secret, len); in crypto_dh_derive_secret()
42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
H A Dcrypto_openssl.c550 u8 *secret, size_t *len) in crypto_dh_derive_secret()
581 prime, prime_len, secret, len); in crypto_dh_derive_secret()
2094 struct wpabuf *secret = NULL; in crypto_ecdh_set_peerkey() local
2153 secret = wpabuf_alloc(secret_len); in crypto_ecdh_set_peerkey()
2154 if (!secret) in crypto_ecdh_set_peerkey()
2156 if (EVP_PKEY_derive(ctx, wpabuf_put(secret, 0), &secret_len) != 1) { in crypto_ecdh_set_peerkey()
2162 if (secret->size != secret_len) in crypto_ecdh_set_peerkey()
2165 (int) secret->size, (int) secret_len); in crypto_ecdh_set_peerkey()
2166 wpabuf_put(secret, secret_len); in crypto_ecdh_set_peerkey()
2175 return secret; in crypto_ecdh_set_peerkey()
546 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
[all...]
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha384.h23 int hmac_sha384_kdf(const u8 *secret, size_t secret_len,
H A Dsha512.h23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_internal-modexp.c46 u8 *secret, size_t *len) in crypto_dh_derive_secret()
82 prime, prime_len, secret, len); in crypto_dh_derive_secret()
42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
H A Dsha1.h22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
H A Dsha512.h23 int hmac_sha512_kdf(const u8 *secret, size_t secret_len,
/third_party/lwip/src/netif/ppp/
H A Dpppol2tp.c111 const u8_t *secret, u8_t secret_len, in pppol2tp_create()
117 LWIP_UNUSED_ARG(secret); in pppol2tp_create()
149 l2tp->secret = secret; in pppol2tp_create()
314 if (l2tp->secret != NULL) { in pppol2tp_connect()
614 if (l2tp->secret == NULL) { in pppol2tp_dispatch_control_packet()
615 PPPDEBUG(LOG_DEBUG, ("pppol2tp: Received challenge from peer and no secret key available\n")); in pppol2tp_dispatch_control_packet()
619 /* Generate hash of ID, secret, challenge */ in pppol2tp_dispatch_control_packet()
624 lwip_md5_update(&md5_ctx, l2tp->secret, l2tp->secret_len); in pppol2tp_dispatch_control_packet()
635 /* Generate hash of ID, secret, challeng in pppol2tp_dispatch_control_packet()
109 pppol2tp_create(struct netif *pppif, struct netif *netif, const ip_addr_t *ipaddr, u16_t port, const u8_t *secret, u8_t secret_len, ppp_link_status_cb_fn link_status_cb, void *ctx_cb) pppol2tp_create() argument
[all...]
/third_party/musl/src/malloc/mallocng/
H A Dmeta.h42 uint64_t secret; member
155 const struct meta *meta = encode_ptr(base->meta, ctx.secret); in get_meta()
161 assert(area->check == ctx.secret); in get_meta()
H A Dmalloc.c109 ctx.secret = get_random_secret(); in alloc_meta()
165 ctx.meta_area_tail->check = ctx.secret; in alloc_meta()
348 m->mem->meta = encode_ptr(m, ctx.secret); in alloc_group()
395 g->mem->meta = encode_ptr(g, ctx.secret); in malloc()
/third_party/musl/porting/linux/user/src/malloc/mallocng/
H A Dmeta.h42 uint64_t secret; member
155 const struct meta *meta = encode_ptr(base->meta, ctx.secret); in get_meta()
161 assert(area->check == ctx.secret); in get_meta()
H A Dmalloc.c107 ctx.secret = get_random_secret(); in alloc_meta()
161 ctx.meta_area_tail->check = ctx.secret; in alloc_meta()
343 m->mem->meta = encode_ptr(m, ctx.secret); in alloc_group()
388 g->mem->meta = encode_ptr(g, ctx.secret); in malloc()
/third_party/mbedtls/3rdparty/everest/include/everest/vs2013/
H A DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/third_party/mbedtls/3rdparty/everest/include/everest/
H A DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/third_party/curl/lib/vtls/
H A Dkeylog.h50 const unsigned char *secret, size_t secretlen);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/third_party/mbedtls/3rdparty/p256-m/p256-m/
H A Dp256-m.h48 * ECDH compute shared secret
50 * [out] secret: on success, holds the shared secret, as a big-endian integer
58 int p256_ecdh_shared_secret(uint8_t secret[32],
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_i.h82 int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len,
88 u8 *secret, size_t *secret_len);

Completed in 17 milliseconds

12345678910