/third_party/openssl/demos/keyexch/ |
H A D | x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member 115 * secret is pointed to by *secret. The caller must free it. 127 local_peer->secret = NULL; in keyexch_x25519_after() 157 /* Determine the secret length. */ in keyexch_x25519_after() 164 * We are using X25519, so the secret generated will always be 32 bytes. in keyexch_x25519_after() 174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); in keyexch_x25519_after() 175 if (local_peer->secret == NULL) { in keyexch_x25519_after() 176 fprintf(stderr, "Could not allocate memory for secret\ in keyexch_x25519_after() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_ [all...] |
H A D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument 499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument 520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument 542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument 799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument 849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument 981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument 1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument 1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument 1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument 1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument 1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument 1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument 1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius.h | 243 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 245 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 247 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 250 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 252 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 255 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 257 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 269 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 276 const u8 *secret, size_ [all...] |
H A D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument 499 radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_authenticator) radius_msg_finish_acct_resp() argument 520 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) radius_msg_verify_acct_req() argument 542 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len, int require_message_authenticator) radius_msg_verify_das_req() argument 799 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) radius_msg_verify_msg_auth() argument 849 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) radius_msg_verify() argument 981 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) decrypt_ms_key() argument 1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) encrypt_ms_key() argument 1108 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_ms_keys() argument 1157 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) radius_msg_get_cisco_keys() argument 1186 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) radius_msg_add_mppe_keys() argument 1288 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) radius_user_password_hide() argument 1342 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) radius_msg_add_attr_user_password() argument 1555 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) radius_msg_get_tunnel_password() argument [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() 273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response() 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 577 lwip_md4_update(&md4Context, secret, secret_le in NTPasswordHash() 249 chapms_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms_verify_response() argument 297 chapms2_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chapms2_verify_response() argument 374 chapms_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms_make_response() argument 385 chapms2_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chapms2_make_response() argument 582 ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS_NT() argument 594 ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, const char *secret, int secret_len, u_char NTResponse[24]) ChapMS2_NT() argument 612 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) ChapMS_LANMan() argument 690 GenerateAuthenticatorResponsePlain( const char *secret, int secret_len, u_char NTResponse[24], const u_char PeerChallenge[16], const u_char *rchallenge, const char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) GenerateAuthenticatorResponsePlain() argument 714 Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len) Set_Start_Key() argument 744 SetMasterKeys(ppp_pcb *pcb, const char *secret, int secret_len, u_char NTResponse[24], int IsServer) SetMasterKeys() argument 838 ChapMS(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_len, unsigned char *response) ChapMS() argument 873 ChapMS2(ppp_pcb *pcb, const u_char *rchallenge, const u_char *PeerChallenge, const char *user, const char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) ChapMS2() argument [all...] |
H A D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() 75 /* Generate hash of ID, secret, challenge */ in chap_md5_verify_response() 79 lwip_md5_update(&ctx, secret, secret_len); in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response() 108 lwip_md5_update(&ctx, (const u_char *)secret, secret_len); in chap_md5_make_response() 61 chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name, const unsigned char *secret, int secret_len, const unsigned char *challenge, const unsigned char *response, char *message, int message_space) chap_md5_verify_response() argument 95 chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, const unsigned char *challenge, const char *secret, int secret_len, unsigned char *private_) chap_md5_make_response() argument
|
/third_party/openssl/test/recipes/ |
H A D | 20-test_kdf.t | 19 { cmd => [qw{openssl kdf -keylen 16 -digest SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 22 { cmd => [qw{openssl kdf -keylen 16 -digest MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 25 { cmd => [qw{openssl kdf -keylen 10 -digest SHA256 -kdfopt key:secret -kdfopt salt:salt -kdfopt info:label HKDF}], 45 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:SHA256 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 48 { cmd => [qw{openssl kdf -keylen 16 -kdfopt digest:MD5-SHA1 -kdfopt secret:secret -kdfopt seed:seed TLS1-PRF}], 51 { cmd => [qw{openssl kdf -keylen 10 -kdfopt digest:SHA256 -kdfopt key:secret [all...] |
/third_party/openssl/ssl/ |
H A D | tls13_enc.c | 28 * Given a |secret|; a |label| of length |labellen|; and |data| of length 30 * secret |outlen| bytes long and store it in the location pointed to be |out|. 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv() 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 426 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 757 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/third_party/node/deps/npm/test/lib/commands/ |
H A D | hook.js | 17 add: async (pkg, uri, secret, opts) => { 18 hookArgs = { pkg, uri, secret, opts } 46 update: async (id, uri, secret, opts) => { 47 hookArgs = { id, uri, secret, opts } 76 await hook.exec(['add', 'semver', 'https://google.com', 'some-secret']) 83 secret: 'some-secret', 93 await hook.exec(['add', '~npm', 'https://google.com', 'some-secret']) 100 secret: 'some-secret', [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | librist.c | 53 char *secret; member 75 { "secret", "set encryption secret",OFFSET(secret), AV_OPT_TYPE_STRING,{.str=NULL}, 0, 0, .flags = D|E }, 166 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open() 167 ((peer_config->key_size == 128 || peer_config->key_size == 256) && !peer_config->secret[0])) { in librist_open() 168 av_log(h, AV_LOG_ERROR, "secret is mandatory if encryption is enabled\n"); in librist_open() 173 if (s->secret && peer_config->secret[0] == 0) in librist_open() 174 av_strlcpy(peer_config->secret, in librist_open() [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 44 * :macro:`NGTCP2_CRYPTO_INITIAL_SECRETLEN` is the length of secret 146 const uint8_t *secret, size_t secretlen, 160 const uint8_t *secret, 175 const uint8_t *secret, size_t secretlen, 190 const uint8_t *secret, 337 * |secret| and installs new keys to |conn|. 346 * |secretlen| specifies the length of |secret|. 378 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen); 384 * |secret| and installs new keys to |conn|. 393 * |secretlen| specifies the length of |secret| [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_quic.h | 108 const uint8_t *secret, 114 const uint8_t *secret, size_t secretlen); 119 const uint8_t *secret, size_t secretlen); 122 size_t salen, const uint8_t *secret, size_t secretlen); 125 socklen_t salen, const uint8_t *secret, size_t secretlen); 128 const uint8_t *secret,
|
H A D | shrpx_quic.cc | 285 const uint8_t *secret, in generate_quic_stateless_reset_token() 287 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token() 298 const uint8_t *secret, size_t secretlen) { in generate_retry_token() 304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 317 const uint8_t *secret, size_t secretlen) { in verify_retry_token() 323 if (ngtcp2_crypto_verify_retry_token(&odcid, token, tokenlen, secret, in verify_retry_token() 333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() 339 token, secret, secretlen, sa, salen, t); in generate_token() 350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() 355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretle in verify_token() 284 generate_quic_stateless_reset_token(uint8_t *token, const ngtcp2_cid &cid, const uint8_t *secret, size_t secretlen) generate_quic_stateless_reset_token() argument 295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument 314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument 332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument 349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument 364 generate_quic_connection_id_encryption_key(uint8_t *key, size_t keylen, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) generate_quic_connection_id_encryption_key() argument [all...] |
/third_party/musl/src/malloc/mallocng/ |
H A D | glue.h | 46 uint64_t secret = (uintptr_t)&secret * 1103515245; in get_random_secret() local 49 memcpy(&secret, (char *)libc.auxv[i+1]+8, sizeof secret); in get_random_secret() 50 return secret; in get_random_secret()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256() 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256() 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_le in tls_prf_sha256() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha256() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha256() 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) in tls_prf_sha256() 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_le in tls_prf_sha256() [all...] |
H A D | sha384-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) in tls_prf_sha384() 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. in tls_prf_sha384() 50 * PRF(secret, label, seed) = P_SHA384(secret, label + seed) in tls_prf_sha384() 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_le in tls_prf_sha384() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 137 if (secret == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 137 if (secret == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 48 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_expand_label() 63 return ngtcp2_crypto_hkdf_expand(dest, destlen, md, secret, secretlen, info, in ngtcp2_crypto_hkdf_expand_label() 138 const uint8_t *secret, size_t secretlen) { in ngtcp2_crypto_derive_packet_protection_key() 172 if (ngtcp2_crypto_hkdf_expand_label(key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 177 if (ngtcp2_crypto_hkdf_expand_label(iv, ivlen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 183 ngtcp2_crypto_hkdf_expand_label(hp_key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 193 const uint8_t *secret, in ngtcp2_crypto_update_traffic_secret() 197 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret() 208 const uint8_t *secret, in ngtcp2_crypto_derive_and_install_rx_key() 270 md, secret, secretle in ngtcp2_crypto_derive_and_install_rx_key() 46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument 135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument 191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument 205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument 346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument 816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument 833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument 896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument 973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument 1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument 1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | tls13_enc.c | 28 * Given a |secret|; a |label| of length |labellen|; and |data| of length 30 * secret |outlen| bytes long and store it in the location pointed to be |out|. 34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on 110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on 127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 136 return tls13_hkdf_expand(s, md, secret, ivlabe in tls13_derive_iv() 140 tls13_derive_finishedkey(SSL *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) tls13_derive_finishedkey() argument 333 derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, unsigned char *iv, EVP_CIPHER_CTX *ciph_ctx) derive_secret_key_and_iv() argument 630 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_change_cipher_state() local 967 unsigned char secret[EVP_MAX_MD_SIZE]; tls13_update_key() local [all...] |
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_test_common_source.c | 17 const unsigned char *secret, in eap_tls_key_derivation() 25 /* We're only interested in the TLS 1.2 master secret */ in eap_tls_key_derivation() 33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation() 41 const unsigned char *secret, in nss_keylog_export() 52 /* We're only interested in the TLS 1.2 master secret */ in nss_keylog_export() 73 "%02x", secret[j]); in nss_keylog_export() 111 const unsigned char *secret, in dtls_srtp_key_derivation() 119 /* We're only interested in the TLS 1.2 master secret */ in dtls_srtp_key_derivation() 127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation() 15 eap_tls_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) eap_tls_key_derivation() argument 39 nss_keylog_export(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) nss_keylog_export() argument 109 dtls_srtp_key_derivation(void *p_expkey, mbedtls_ssl_key_export_type secret_type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type) dtls_srtp_key_derivation() argument
|
/third_party/node/test/common/ |
H A D | tls.js | 29 'primary secret', 147 function PRF12(algo, secret, label, seed, size) { 149 return P_hash(algo, secret, newSeed, size); 152 function P_hash(algo, secret, seed, size) { 154 let hmac = crypto.createHmac(algo, secret); 159 hmac = crypto.createHmac(algo, secret); 169 hmac = crypto.createHmac(algo, secret);
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
H A D | boringssl.c | 284 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract() 298 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf_expand() 303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand() 311 const ngtcp2_crypto_md *md, const uint8_t *secret, in ngtcp2_crypto_hkdf() 316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf() 540 const SSL_CIPHER *cipher, const uint8_t *secret, in set_read_secret() 549 secret, secretlen) != 0) { in set_read_secret() 557 const SSL_CIPHER *cipher, const uint8_t *secret, in set_write_secret() 566 secret, secretle in set_write_secret() 283 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 297 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 310 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 539 set_read_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_read_secret() argument 556 set_write_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_write_secret() argument [all...] |