HomeSort by: relevance | last modified time | path
    Searched defs:secret (Results 1 - 25 of 95) sorted by relevancy

1 2 3 4

  /src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_policy.c 39 * of the secret (1.2 backport only).
48 BYTE secret[UI_MAX_SECRET_STRING_LENGTH] = { 0 }; local
56 /* pin the area where the secret will be put in memory */
57 if (pin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH)) {
58 LogError("Failed to pin secret in memory.");
63 DisplayNewPINWindow(secret, &secret_len, popup_str);
65 DisplayPINWindow(secret, &secret_len, popup_str);
68 unpin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH);
75 LogDebug("Hashing these %u bytes as the secret:", secret_len);
76 LogDebugData(secret_len, secret);
    [all...]
tsp_auth.c 41 TCPA_SECRET secret; local
46 /* This validates that the secret can be used */
105 &secret)))
108 HMAC_Auth(secret.authdata, hashDigest->digest, auth);
201 /* If the secret mode is NONE here, we don't return an error. This is
203 * session even when creating no-auth keys. A secret of all 0's will be
355 validateReturnAuth(BYTE *secret, BYTE *hash, TPM_AUTH *auth)
360 HMAC_Auth(secret, hash, auth);
366 HMAC_Auth(BYTE * secret, BYTE * Digest, TPM_AUTH * auth)
377 Trspi_HMAC(TSS_HASH_SHA1, 20, secret, offset, Blob, (BYTE *)&auth->HMAC)
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/kdf/
argon2.c 38 * different salt if possible. The salt is not considered secret information
47 * Optional secret for KDF
49 static unsigned char secret[] = { variable
125 /* Set optional secret */
126 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET, secret, sizeof(secret));
  /src/external/bsd/libfido2/dist/src/
ecdh.c 21 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret)
28 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt,
36 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret)
46 if (secret->len > INT_MAX || strlen(info) > INT_MAX) {
59 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 ||
81 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret)
88 /* use sha256 on the resulting secret */
91 SHA256(secret->ptr, secret->len, key->ptr) != key->ptr)
122 fido_blob_t *secret = NULL; local
    [all...]
  /src/common/lib/libc/hash/sha3/
keccak.c 43 #define secret /* can't use in variable-time operations, should zero */ macro
54 static inline secret uint64_t
55 rol64(secret uint64_t v, unsigned c)
62 keccakf1600_theta(secret uint64_t A[25])
64 secret uint64_t C0, C1, C2, C3, C4;
85 keccakf1600_rho_pi(secret uint64_t A[25])
87 secret uint64_t T, U;
121 keccakf1600_chi(secret uint64_t A[25])
123 secret uint64_t B0, B1, B2, B3, B4;
141 keccakf1600_round(secret uint64_t A[25]
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/keyexch/
ecdh.c 22 * to the other peer. A peer can then derive the same shared secret using their
32 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st
109 unsigned char *secret = NULL; local
126 * optionally using a X963KDF to expand the secret data. This can be done
144 * Note: After the secret is generated below, the peer could alternatively
145 * pass the secret to a KDF to derive additional key data from the secret.
146 * See demos/kdf/hkdf.c for an example (where ikm is the secret key)
149 /* Calculate the size of the secret and allocate space *
    [all...]
x25519.c 55 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st
115 * secret is pointed to by *secret. The caller must free it.
127 local_peer->secret = NULL;
156 /* Determine the secret length. */
163 * We are using X25519, so the secret generated will always be 32 bytes.
168 fprintf(stderr, "Secret is always 32 bytes for X25519\n");
173 local_peer->secret = OPENSSL_malloc(local_peer->secret_len);
174 if (local_peer->secret == NULL)
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/libpaa/
libpaa.h 39 /* constant and secret info for server side */
42 char *secret; /* raw secret of server */ member in struct:paa_server_info_t
  /src/crypto/external/bsd/openssl/dist/demos/keyexch/
x25519.c 55 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st
115 * secret is pointed to by *secret. The caller must free it.
127 local_peer->secret = NULL;
157 /* Determine the secret length. */
164 * We are using X25519, so the secret generated will always be 32 bytes.
169 fprintf(stderr, "Secret is always 32 bytes for X25519\n");
174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len);
175 if (local_peer->secret == NULL)
    [all...]
  /src/external/apache2/argon2/dist/phc-winner-argon2/src/
genkat.c 62 printf("Secret[%u]: ", context->secretlen);
68 printf("%2.2x ", ((unsigned char *)context->secret)[i]);
140 unsigned char secret[TEST_SECRETLEN]; local
151 memset(secret, 3, TEST_SECRETLEN);
161 context.secret = secret;
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
srp-crypto.h 34 uint8_t *NONNULL secret; member in struct:hmac_key
  /src/external/mpl/bind/dist/bin/named/
tsigconf.c 42 unsigned char *secret = NULL; local
67 (void)cfg_map_get(key, "secret", &secretobj);
100 secret = isc_mem_get(mctx, secretlen);
101 isc_buffer_init(&secretbuf, secret, secretlen);
108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx,
110 isc_mem_put(mctx, secret, secretalloc);
111 secret = NULL;
131 if (secret != NULL) {
132 isc_mem_put(mctx, secret, secretalloc);
  /src/lib/libtelnet/
pk.c 41 genkeys(char *public, char *secret)
42 common_key(char *secret, char *public, desData *deskey)
47 char secret[HEXKEYBYTES + 1];
130 * get common key from my secret key and his public key
136 BIGNUM *secret = BN_new(); local
143 (void)BN_hex2bn(&secret, xsecret);
146 BN_mod_exp(common, public, secret, modulus, ctx);
153 BN_free(secret);
171 * Generate a random public/secret key pair
174 genkeys(char *public, char *secret)
    [all...]
  /src/lib/libradius/
radlib_private.h 68 char *secret; /* Shared secret */ member in struct:rad_server
  /src/sys/crypto/nist_hash_drbg/
nist_hash_drbg.c 75 #define secret /* must not use in variable-time operations; should zero */
96 static void hashgen(secret uint8_t *, size_t,
97 const secret uint8_t[SEEDLEN_BYTES]);
98 static void add8(secret uint8_t *, size_t, const secret uint8_t *, size_t);
99 static void hash_df(secret void *, size_t, const struct hvec *, size_t);
100 static void hash_df_block(secret void *, uint8_t, uint8_t[4],
120 nist_hash_drbg_instantiate(secret struct nist_hash_drbg *D,
121 const secret void *entropy, size_t entropylen,
160 nist_hash_drbg_reseed(secret struct nist_hash_drbg *D
74 #define secret macro
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/engine/
falcon.h 33 u8 secret; member in struct:nvkm_falcon
  /src/sys/lib/libkern/
entpool.c 91 #define secret /* must not use in variable-time operations; should zero */
240 entpool_extract(struct entpool *P, secret void *buf, size_t len)
90 #define secret macro
  /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/
sskdf.c 24 * Z is a shared secret required to produce the derived key material.
58 unsigned char *secret; member in struct:__anon1606
89 * counter is appended to the secret 'z'.
306 OPENSSL_clear_free(ctx->secret, ctx->secret_len);
358 if (ctx->secret == NULL) {
405 ctx->secret, ctx->secret_len,
414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len,
428 if (ctx->secret == NULL) {
445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len,
476 if (!sskdf_set_buffer(&ctx->secret, &ctx->secret_len, p)
    [all...]
  /src/external/bsd/unbound/dist/util/
edns.c 158 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4,
161 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8);
166 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4,
175 (void)edns_cookie_server_hash(buf, secret, v4, hash);
181 const uint8_t* secret, size_t secret_len, int v4,
203 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash),
240 /** Read the cookie secret file */
245 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; local
256 log_err("Could not read cookie-secret-file '%s': %s"
    [all...]
  /src/external/bsd/wpa/dist/src/pasn/
pasn_initiator.c 1067 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; local
1206 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y,
1210 if (!secret) {
1211 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret");
1234 wpabuf_head(secret), wpabuf_len(secret),
1253 wpabuf_free(secret);
1254 secret = NULL;
1349 wpabuf_free(secret);
pasn_responder.c 305 struct wpabuf *secret)
350 wpabuf_head(secret), wpabuf_len(secret),
608 struct wpabuf *wrapped_data = NULL, *secret = NULL; local
748 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y,
751 if (!secret) {
752 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret");
820 wpa_printf(MSG_DEBUG, "PASN: Storing secret");
821 pasn->secret = secret;
    [all...]
  /src/external/mpl/bind/dist/bin/named/include/named/
server.h 104 unsigned char secret[32]; /*%< Server Cookie Secret */ member in struct:named_server
  /src/external/mpl/bind/dist/fuzz/
dns_message_checksig.c 136 unsigned char secret[16] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, local
206 result = dns_tsigkey_create(name, DST_ALG_HMACSHA256, secret,
207 sizeof(secret), mctx, &tsigkey);
  /src/external/mpl/dhcp/dist/dhcpctl/
omshell.c 112 struct data_string secret; local
405 memset (&secret, 0, sizeof secret);
406 if (!parse_base64 (&secret, cfile)) {
433 secret.data,
434 secret.len);
  /src/external/mpl/bind/dist/tests/dns/
tsig_test.c 274 unsigned char secret[16] = { 0 }; local
287 result = dns_tsigkey_create(keyname, DST_ALG_HMACSHA256, secret,
288 sizeof(secret), mctx, &key);

Completed in 62 milliseconds

1 2 3 4