/kernel/linux/linux-5.10/include/crypto/ |
H A D | curve25519.h | 29 const u8 secret[CURVE25519_KEY_SIZE]); 33 const u8 secret[CURVE25519_KEY_SIZE], in curve25519() 37 curve25519_arch(mypublic, secret, basepoint); in curve25519() 39 curve25519_generic(mypublic, secret, basepoint); in curve25519() 46 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public() 48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 53 curve25519_base_arch(pub, secret); in curve25519_generate_public() 55 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public() 59 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() argument 61 secret[ in curve25519_clamp_secret() 32 curve25519(u8 mypublic[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE], const u8 basepoint[CURVE25519_KEY_SIZE]) curve25519() argument 45 curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_public() argument 65 curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_secret() argument [all...] |
/kernel/linux/linux-6.6/include/crypto/ |
H A D | curve25519.h | 29 const u8 secret[CURVE25519_KEY_SIZE]); 35 const u8 secret[CURVE25519_KEY_SIZE], in curve25519() 39 curve25519_arch(mypublic, secret, basepoint); in curve25519() 41 curve25519_generic(mypublic, secret, basepoint); in curve25519() 48 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public() 50 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 55 curve25519_base_arch(pub, secret); in curve25519_generate_public() 57 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public() 61 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() argument 63 secret[ in curve25519_clamp_secret() 34 curve25519(u8 mypublic[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE], const u8 basepoint[CURVE25519_KEY_SIZE]) curve25519() argument 47 curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_public() argument 67 curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE]) curve25519_generate_secret() argument [all...] |
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | keyring.c | 41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument 43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret() 44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret() 59 * The master key secret and any embedded subkeys should have already in fscrypt_free_master_key() 410 * Allocate a new fscrypt_master_key, transfer the given secret over to it, and 414 struct fscrypt_master_key_secret *secret, in add_new_master_key() 441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key() 458 struct fscrypt_master_key_secret *secret) in add_existing_master_key() 481 /* Re-add the secret i in add_existing_master_key() 413 add_new_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) add_new_master_key() argument 457 add_existing_master_key(struct fscrypt_master_key *mk, struct fscrypt_master_key_secret *secret) add_existing_master_key() argument 491 do_add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) do_add_master_key() argument 530 add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, struct fscrypt_key_specifier *key_spec) add_master_key() argument 629 get_keyring_key(u32 key_id, u32 type, struct fscrypt_master_key_secret *secret) get_keyring_key() argument 691 struct fscrypt_master_key_secret secret; fscrypt_ioctl_add_key() local 747 fscrypt_get_test_dummy_secret(struct fscrypt_master_key_secret *secret) fscrypt_get_test_dummy_secret() argument 761 struct fscrypt_master_key_secret secret; fscrypt_get_test_dummy_key_identifier() local 792 struct fscrypt_master_key_secret secret; fscrypt_add_test_dummy_key() local [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | ecdh_helper.c | 37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 61 struct kpp_secret secret; in crypto_ecdh_decode_key() local 66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 70 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key() 75 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
H A D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 71 struct kpp_secret secret; in crypto_dh_decode_key() local 76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key() 77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key() 84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
|
H A D | curve25519-generic.c | 12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 15 curve25519_generate_secret(secret); in curve25519_set_secret() 18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | ecdh_helper.c | 37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 60 struct kpp_secret secret; in crypto_ecdh_decode_key() local 65 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 66 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key() 73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
H A D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 69 struct kpp_secret secret; in __crypto_dh_decode_key() local 74 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in __crypto_dh_decode_key() 75 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in __crypto_dh_decode_key() 81 if (secret.len != crypto_dh_key_len(params)) in __crypto_dh_decode_key()
|
H A D | curve25519-generic.c | 12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 15 curve25519_generate_secret(secret); in curve25519_set_secret() 18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
|
/kernel/linux/linux-5.10/fs/crypto/ |
H A D | keyring.c | 41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument 43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret() 44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret() 59 * The master key secret and any embedded subkeys should have already in fscrypt_free_master_key() 409 * Allocate a new fscrypt_master_key, transfer the given secret over to it, and 413 struct fscrypt_master_key_secret *secret, in add_new_master_key() 441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key() 458 struct fscrypt_master_key_secret *secret) in add_existing_master_key() 481 /* Re-add the secret i in add_existing_master_key() 412 add_new_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) add_new_master_key() argument 457 add_existing_master_key(struct fscrypt_master_key *mk, struct fscrypt_master_key_secret *secret) add_existing_master_key() argument 491 do_add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, const struct fscrypt_key_specifier *mk_spec) do_add_master_key() argument 530 add_master_key(struct super_block *sb, struct fscrypt_master_key_secret *secret, struct fscrypt_key_specifier *key_spec) add_master_key() argument 629 get_keyring_key(u32 key_id, u32 type, struct fscrypt_master_key_secret *secret) get_keyring_key() argument 691 struct fscrypt_master_key_secret secret; fscrypt_ioctl_add_key() local 755 struct fscrypt_master_key_secret secret; fscrypt_add_test_dummy_key() local [all...] |
/third_party/openssl/demos/keyexch/ |
H A D | x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member 115 * secret is pointed to by *secret. The caller must free it. 127 local_peer->secret = NULL; in keyexch_x25519_after() 157 /* Determine the secret length. */ in keyexch_x25519_after() 164 * We are using X25519, so the secret generated will always be 32 bytes. in keyexch_x25519_after() 174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after() 175 if (local_peer->secret == NULL) { in keyexch_x25519_after() 176 fprintf(stderr, "Could not allocate memory for secret\ in keyexch_x25519_after() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_ [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.h | 243 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 245 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 247 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 250 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 252 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 255 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 257 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 269 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 276 const u8 *secret, size_ [all...] |
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | curve25519-glue.c | 23 const u8 secret[CURVE25519_KEY_SIZE], 43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch() 45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch() 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 55 curve25519_generate_secret(secret); in curve25519_set_secret() 58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 85 curve25519_arch(buf, secret, bp); in curve25519_compute_value() 42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
|
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | curve25519-glue.c | 23 const u8 secret[CURVE25519_KEY_SIZE], 43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch() 45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch() 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 55 curve25519_generate_secret(secret); in curve25519_set_secret() 58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 85 curve25519_arch(buf, secret, bp); in curve25519_compute_value() 42 curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], const u8 secret[CURVE25519_KEY_SIZE]) curve25519_base_arch() argument
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() 273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response() 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 577 lwip_md4_update(&md4Context, secret, secret_le in NTPasswordHash() 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument [all...] |
/third_party/openssl/test/recipes/ |
H A D | 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 51 { cmd => [qw{openssl kdf -keylen 10 -kdfopt digest:SHA256 -kdfopt key:secret [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | key_manager.h | 79 const std::vector<uint8_t> &secret); 81 const std::vector<uint8_t> &secret); 90 const std::vector<uint8_t> &secret); 97 const std::vector<uint8_t> &secret); 106 const std::vector<uint8_t> &secret); 109 const std::vector<uint8_t> &secret); 112 const std::vector<uint8_t> &secret); 141 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey); 144 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey); 151 bool UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, in [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key() 237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key() 618 const std::vector<uint8_t> &secret) in GenerateUserKeyByType() 638 if (!secret.empty() && !token.empty()) { in GenerateUserKeyByType() 642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; in GenerateUserKeyByType() 823 UserAuth userAuth = {.token = authToken, .secret = newSecret, .secureUid = secureUid}; in UpdateUseAuthWithRecoveryKey() 871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; in UpdateESecret() 915 auth.secret = std::move(newSecret); in UpdateCeEceSeceUserAuth() 918 auth.secret in UpdateCeEceSeceUserAuth() 616 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument 933 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1092 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1213 ActiveUeceUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument 1237 ActiveElXUserKey(unsigned int user, const std::vector<uint8_t> &token, KeyType keyType, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument 1273 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1308 UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument 1335 UnlockUece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument 1416 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1867 CheckUserPinProtect(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1880 TryToFixUserCeEceSeceKey(unsigned int userId, KeyType keyType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1915 TryToFixUeceKey(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | librist.c | 53 char *secret; member 75 { "secret", "set encryption secret",OFFSET(secret), AV_OPT_TYPE_STRING,{.str=NULL}, 0, 0, .flags = D|E }, 166 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open() 167 ((peer_config->key_size == 128 || peer_config->key_size == 256) && !peer_config->secret[0])) { in librist_open() 168 av_log(h, AV_LOG_ERROR, "secret is mandatory if encryption is enabled\n"); in librist_open() 173 if (s->secret && peer_config->secret[0] == 0) in librist_open() 174 av_strlcpy(peer_config->secret, in librist_open() [all...] |
/third_party/openssl/ssl/ |
H A D | tls13_enc.c | 28 * Given a |secret|; a |label| of length |labellen|; and |data| of length 30 * secret |outlen| bytes long and store it in the location pointed to be |out|. 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv() 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 426 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 757 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/third_party/node/deps/npm/test/lib/commands/ |
H A D | hook.js | 17 add: async (pkg, uri, secret, opts) => { 18 hookArgs = { pkg, uri, secret, opts } 46 update: async (id, uri, secret, opts) => { 47 hookArgs = { id, uri, secret, opts } 76 await hook.exec(['add', 'semver', 'https://google.com', 'some-secret']) 83 secret: 'some-secret', 93 await hook.exec(['add', '~npm', 'https://google.com', 'some-secret']) 100 secret: 'some-secret', [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 44 * :macro:`NGTCP2_CRYPTO_INITIAL_SECRETLEN` is the length of secret 146 const uint8_t *secret, size_t secretlen, 160 const uint8_t *secret, 175 const uint8_t *secret, size_t secretlen, 190 const uint8_t *secret, 337 * |secret| and installs new keys to |conn|. 346 * |secretlen| specifies the length of |secret|. 378 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen); 384 * |secret| and installs new keys to |conn|. 393 * |secretlen| specifies the length of |secret| [all...] |
/third_party/musl/src/malloc/mallocng/ |
H A D | glue.h | 46 uint64_t secret = (uintptr_t)&secret * 1103515245; in get_random_secret() local 49 memcpy(&secret, (char *)libc.auxv[i+1]+8, sizeof secret); in get_random_secret() 50 return secret; in get_random_secret()
|
/third_party/nghttp2/src/ |
H A D | shrpx_quic.h | 108 const uint8_t *secret, 114 const uint8_t *secret, size_t secretlen); 119 const uint8_t *secret, size_t secretlen); 122 size_t salen, const uint8_t *secret, size_t secretlen); 125 socklen_t salen, const uint8_t *secret, size_t secretlen); 128 const uint8_t *secret,
|