Home
last modified time | relevance | path

Searched refs:secret (Results 1 - 25 of 378) sorted by relevance

12345678910>>...16

/kernel/linux/linux-5.10/include/crypto/
H A Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
33 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
37 curve25519_arch(mypublic, secret, basepoint); in curve25519()
39 curve25519_generic(mypublic, secret, basepoint); in curve25519()
46 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public()
53 curve25519_base_arch(pub, secret); in curve25519_generate_public()
55 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
59 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() argument
61 secret[ in curve25519_clamp_secret()
32 curve25519(u8 mypublic[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE], const u8 basepoint[CURVE25519_KEY_SIZE]) curve25519() argument
45 curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_public() argument
65 curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_secret() argument
[all...]
/kernel/linux/linux-6.6/include/crypto/
H A Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
35 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
39 curve25519_arch(mypublic, secret, basepoint); in curve25519()
41 curve25519_generic(mypublic, secret, basepoint); in curve25519()
48 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
50 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public()
55 curve25519_base_arch(pub, secret); in curve25519_generate_public()
57 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
61 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() argument
63 secret[ in curve25519_clamp_secret()
34 curve25519(u8 mypublic[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE], const u8 basepoint[CURVE25519_KEY_SIZE]) curve25519() argument
47 curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_public() argument
67 curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_secret() argument
[all...]
/kernel/linux/linux-6.6/fs/crypto/
H A Dkeyring.c41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
59 * The master key secret and any embedded subkeys should have already in fscrypt_free_master_key()
410 * Allocate a new fscrypt_master_key, transfer the given secret over to it, and
414 struct fscrypt_master_key_secret *secret, in add_new_master_key()
441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
458 struct fscrypt_master_key_secret *secret) in add_existing_master_key()
481 /* Re-add the secret i in add_existing_master_key()
413 add_new_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) add_new_master_key() argument
457 add_existing_master_key(struct fscrypt_master_key *mk, struct fscrypt_master_key_secret *secret) add_existing_master_key() argument
491 do_add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) do_add_master_key() argument
530 add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, struct fscrypt_key_specifier *key_spec) add_master_key() argument
629 get_keyring_key(u32 key_id, u32 type, struct fscrypt_master_key_secret *secret) get_keyring_key() argument
691 struct fscrypt_master_key_secret secret; fscrypt_ioctl_add_key() local
747 fscrypt_get_test_dummy_secret(struct fscrypt_master_key_secret *secret) fscrypt_get_test_dummy_secret() argument
761 struct fscrypt_master_key_secret secret; fscrypt_get_test_dummy_key_identifier() local
792 struct fscrypt_master_key_secret secret; fscrypt_add_test_dummy_key() local
[all...]
/kernel/linux/linux-5.10/crypto/
H A Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
61 struct kpp_secret secret; in crypto_ecdh_decode_key() local
66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
70 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
75 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
H A Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
H A Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
/kernel/linux/linux-6.6/crypto/
H A Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
60 struct kpp_secret secret; in crypto_ecdh_decode_key() local
65 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
66 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
H A Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
69 struct kpp_secret secret; in __crypto_dh_decode_key() local
74 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in __crypto_dh_decode_key()
75 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in __crypto_dh_decode_key()
81 if (secret.len != crypto_dh_key_len(params)) in __crypto_dh_decode_key()
H A Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
/kernel/linux/linux-5.10/fs/crypto/
H A Dkeyring.c41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
59 * The master key secret and any embedded subkeys should have already in fscrypt_free_master_key()
409 * Allocate a new fscrypt_master_key, transfer the given secret over to it, and
413 struct fscrypt_master_key_secret *secret, in add_new_master_key()
441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
458 struct fscrypt_master_key_secret *secret) in add_existing_master_key()
481 /* Re-add the secret i in add_existing_master_key()
412 add_new_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) add_new_master_key() argument
457 add_existing_master_key(struct fscrypt_master_key *mk, struct fscrypt_master_key_secret *secret) add_existing_master_key() argument
491 do_add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) do_add_master_key() argument
530 add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, struct fscrypt_key_specifier *key_spec) add_master_key() argument
629 get_keyring_key(u32 key_id, u32 type, struct fscrypt_master_key_secret *secret) get_keyring_key() argument
691 struct fscrypt_master_key_secret secret; fscrypt_ioctl_add_key() local
755 struct fscrypt_master_key_secret secret; fscrypt_add_test_dummy_key() local
[all...]
/third_party/openssl/demos/keyexch/
H A Dx25519.c55 unsigned char *secret; /* allocated shared secret buffer */ member
115 * secret is pointed to by *secret. The caller must free it.
127 local_peer->secret = NULL; in keyexch_x25519_after()
157 /* Determine the secret length. */ in keyexch_x25519_after()
164 * We are using X25519, so the secret generated will always be 32 bytes. in keyexch_x25519_after()
174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after()
175 if (local_peer->secret == NULL) { in keyexch_x25519_after()
176 fprintf(stderr, "Could not allocate memory for secret\ in keyexch_x25519_after()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius.h240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
273 const u8 *secret, size_
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius.h243 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
245 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
247 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
250 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
252 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
255 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
257 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
269 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
276 const u8 *secret, size_
[all...]
/kernel/linux/linux-5.10/arch/arm/crypto/
H A Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
/kernel/linux/linux-6.6/arch/arm/crypto/
H A Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
/third_party/lwip/src/netif/ppp/
H A Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response()
273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response()
298 const unsigned char *secret, int secret_len, in chapms2_verify_response()
313 (const char *)secret, secret_len, md, in chapms2_verify_response()
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response()
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response()
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument
577 lwip_md4_update(&md4Context, secret, secret_le in NTPasswordHash()
249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument
297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument
374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument
385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument
582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument
594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument
612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument
690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument
714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument
744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument
838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument
873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument
[all...]
/third_party/openssl/test/recipes/
H A D20-test_kdf.t19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}],
45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}],
51 { cmd => [qw{openssl kdf -keylen 10 -kdfopt digest:SHA256 -kdfopt key:secret
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dkey_manager.h79 const std::vector<uint8_t> &secret);
81 const std::vector<uint8_t> &secret);
90 const std::vector<uint8_t> &secret);
97 const std::vector<uint8_t> &secret);
106 const std::vector<uint8_t> &secret);
109 const std::vector<uint8_t> &secret);
112 const std::vector<uint8_t> &secret);
141 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey);
144 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey);
151 bool UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, in
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dkey_manager.cpp235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key()
237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key()
618 const std::vector<uint8_t> &secret) in GenerateUserKeyByType()
638 if (!secret.empty() && !token.empty()) { in GenerateUserKeyByType()
642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; in GenerateUserKeyByType()
823 UserAuth userAuth = {.token = authToken, .secret = newSecret, .secureUid = secureUid}; in UpdateUseAuthWithRecoveryKey()
871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; in UpdateESecret()
915 auth.secret = std::move(newSecret); in UpdateCeEceSeceUserAuth()
918 auth.secret in UpdateCeEceSeceUserAuth()
616 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument
933 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1092 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1213 ActiveUeceUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument
1237 ActiveElXUserKey(unsigned int user, const std::vector<uint8_t> &token, KeyType keyType, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument
1273 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1308 UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument
1335 UnlockUece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument
1416 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1867 CheckUserPinProtect(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1880 TryToFixUserCeEceSeceKey(unsigned int userId, KeyType keyType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
1915 TryToFixUeceKey(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument
[all...]
/third_party/ffmpeg/libavformat/
H A Dlibrist.c53 char *secret; member
75 { "secret", "set encryption secret",OFFSET(secret), AV_OPT_TYPE_STRING,{.str=NULL}, 0, 0, .flags = D|E },
166 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open()
167 ((peer_config->key_size == 128 || peer_config->key_size == 256) && !peer_config->secret[0])) { in librist_open()
168 av_log(h, AV_LOG_ERROR, "secret is mandatory if encryption is enabled\n"); in librist_open()
173 if (s->secret && peer_config->secret[0] == 0) in librist_open()
174 av_strlcpy(peer_config->secret, in librist_open()
[all...]
/third_party/openssl/ssl/
H A Dtls13_enc.c28 * Given a |secret|; a |label| of length |labellen|; and |data| of length
30 * secret |outlen| bytes long and store it in the location pointed to be |out|.
34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument
81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand()
107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on
110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument
119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key()
124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on
127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument
136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv()
140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument
333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument
426 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local
757 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local
[all...]
/third_party/node/deps/npm/test/lib/commands/
H A Dhook.js17 add: async (pkg, uri, secret, opts) => {
18 hookArgs = { pkg, uri, secret, opts }
46 update: async (id, uri, secret, opts) => {
47 hookArgs = { id, uri, secret, opts }
76 await hook.exec(['add', 'semver', 'https://google.com', 'some-secret'])
83 secret: 'some-secret',
93 await hook.exec(['add', '~npm', 'https://google.com', 'some-secret'])
100 secret: 'some-secret',
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/
H A Dngtcp2_crypto.h44 * :macro:`NGTCP2_CRYPTO_INITIAL_SECRETLEN` is the length of secret
146 const uint8_t *secret, size_t secretlen,
160 const uint8_t *secret,
175 const uint8_t *secret, size_t secretlen,
190 const uint8_t *secret,
337 * |secret| and installs new keys to |conn|.
346 * |secretlen| specifies the length of |secret|.
378 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen);
384 * |secret| and installs new keys to |conn|.
393 * |secretlen| specifies the length of |secret|
[all...]
/third_party/musl/src/malloc/mallocng/
H A Dglue.h46 uint64_t secret = (uintptr_t)&secret * 1103515245; in get_random_secret() local
49 memcpy(&secret, (char *)libc.auxv[i+1]+8, sizeof secret); in get_random_secret()
50 return secret; in get_random_secret()
/third_party/nghttp2/src/
H A Dshrpx_quic.h108 const uint8_t *secret,
114 const uint8_t *secret, size_t secretlen);
119 const uint8_t *secret, size_t secretlen);
122 size_t salen, const uint8_t *secret, size_t secretlen);
125 socklen_t salen, const uint8_t *secret, size_t secretlen);
128 const uint8_t *secret,

Completed in 13 milliseconds

12345678910>>...16