| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_policy.c | 39 * of the secret (1.2 backport only). 48 BYTE secret[UI_MAX_SECRET_STRING_LENGTH] = { 0 }; local 56 /* pin the area where the secret will be put in memory */ 57 if (pin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH)) { 58 LogError("Failed to pin secret in memory."); 63 DisplayNewPINWindow(secret, &secret_len, popup_str); 65 DisplayPINWindow(secret, &secret_len, popup_str); 68 unpin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH); 75 LogDebug("Hashing these %u bytes as the secret:", secret_len); 76 LogDebugData(secret_len, secret); [all...] |
| tsp_auth.c | 41 TCPA_SECRET secret; local 46 /* This validates that the secret can be used */ 105 &secret))) 108 HMAC_Auth(secret.authdata, hashDigest->digest, auth); 201 /* If the secret mode is NONE here, we don't return an error. This is 203 * session even when creating no-auth keys. A secret of all 0's will be 355 validateReturnAuth(BYTE *secret, BYTE *hash, TPM_AUTH *auth) 360 HMAC_Auth(secret, hash, auth); 366 HMAC_Auth(BYTE * secret, BYTE * Digest, TPM_AUTH * auth) 377 Trspi_HMAC(TSS_HASH_SHA1, 20, secret, offset, Blob, (BYTE *)&auth->HMAC) [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/kdf/ |
| argon2.c | 38 * different salt if possible. The salt is not considered secret information 47 * Optional secret for KDF 49 static unsigned char secret[] = { variable 125 /* Set optional secret */ 126 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET, secret, sizeof(secret));
|
| /src/external/bsd/libfido2/dist/src/ |
| ecdh.c | 21 hkdf_sha256(uint8_t *key, const char *info, const fido_blob_t *secret) 28 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, 36 hkdf_sha256(uint8_t *key, char *info, fido_blob_t *secret) 46 if (secret->len > INT_MAX || strlen(info) > INT_MAX) { 59 EVP_PKEY_CTX_set1_hkdf_key(ctx, secret->ptr, (int)secret->len) < 1 || 81 kdf(uint8_t prot, fido_blob_t *key, /* const */ fido_blob_t *secret) 88 /* use sha256 on the resulting secret */ 91 SHA256(secret->ptr, secret->len, key->ptr) != key->ptr) 122 fido_blob_t *secret = NULL; local [all...] |
| /src/common/lib/libc/hash/sha3/ |
| keccak.c | 43 #define secret /* can't use in variable-time operations, should zero */ macro 54 static inline secret uint64_t 55 rol64(secret uint64_t v, unsigned c) 62 keccakf1600_theta(secret uint64_t A[25]) 64 secret uint64_t C0, C1, C2, C3, C4; 85 keccakf1600_rho_pi(secret uint64_t A[25]) 87 secret uint64_t T, U; 121 keccakf1600_chi(secret uint64_t A[25]) 123 secret uint64_t B0, B1, B2, B3, B4; 141 keccakf1600_round(secret uint64_t A[25] [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/keyexch/ |
| ecdh.c | 22 * to the other peer. A peer can then derive the same shared secret using their 32 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st 109 unsigned char *secret = NULL; local 126 * optionally using a X963KDF to expand the secret data. This can be done 144 * Note: After the secret is generated below, the peer could alternatively 145 * pass the secret to a KDF to derive additional key data from the secret. 146 * See demos/kdf/hkdf.c for an example (where ikm is the secret key) 149 /* Calculate the size of the secret and allocate space * [all...] |
| x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st 115 * secret is pointed to by *secret. The caller must free it. 127 local_peer->secret = NULL; 156 /* Determine the secret length. */ 163 * We are using X25519, so the secret generated will always be 32 bytes. 168 fprintf(stderr, "Secret is always 32 bytes for X25519\n"); 173 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); 174 if (local_peer->secret == NULL) [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/libpaa/ |
| libpaa.h | 39 /* constant and secret info for server side */ 42 char *secret; /* raw secret of server */ member in struct:paa_server_info_t
|
| /src/crypto/external/bsd/openssl/dist/demos/keyexch/ |
| x25519.c | 55 unsigned char *secret; /* allocated shared secret buffer */ member in struct:peer_data_st 115 * secret is pointed to by *secret. The caller must free it. 127 local_peer->secret = NULL; 157 /* Determine the secret length. */ 164 * We are using X25519, so the secret generated will always be 32 bytes. 169 fprintf(stderr, "Secret is always 32 bytes for X25519\n"); 174 local_peer->secret = OPENSSL_malloc(local_peer->secret_len); 175 if (local_peer->secret == NULL) [all...] |
| /src/external/apache2/argon2/dist/phc-winner-argon2/src/ |
| genkat.c | 62 printf("Secret[%u]: ", context->secretlen); 68 printf("%2.2x ", ((unsigned char *)context->secret)[i]); 140 unsigned char secret[TEST_SECRETLEN]; local 151 memset(secret, 3, TEST_SECRETLEN); 161 context.secret = secret;
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| srp-crypto.h | 34 uint8_t *NONNULL secret; member in struct:hmac_key
|
| /src/external/mpl/bind/dist/bin/named/ |
| tsigconf.c | 42 unsigned char *secret = NULL; local 67 (void)cfg_map_get(key, "secret", &secretobj); 100 secret = isc_mem_get(mctx, secretlen); 101 isc_buffer_init(&secretbuf, secret, secretlen); 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, mctx, 110 isc_mem_put(mctx, secret, secretalloc); 111 secret = NULL; 131 if (secret != NULL) { 132 isc_mem_put(mctx, secret, secretalloc);
|
| /src/lib/libtelnet/ |
| pk.c | 41 genkeys(char *public, char *secret) 42 common_key(char *secret, char *public, desData *deskey) 47 char secret[HEXKEYBYTES + 1]; 130 * get common key from my secret key and his public key 136 BIGNUM *secret = BN_new(); local 143 (void)BN_hex2bn(&secret, xsecret); 146 BN_mod_exp(common, public, secret, modulus, ctx); 153 BN_free(secret); 171 * Generate a random public/secret key pair 174 genkeys(char *public, char *secret) [all...] |
| /src/lib/libradius/ |
| radlib_private.h | 68 char *secret; /* Shared secret */ member in struct:rad_server
|
| /src/sys/crypto/nist_hash_drbg/ |
| nist_hash_drbg.c | 75 #define secret /* must not use in variable-time operations; should zero */ 96 static void hashgen(secret uint8_t *, size_t, 97 const secret uint8_t[SEEDLEN_BYTES]); 98 static void add8(secret uint8_t *, size_t, const secret uint8_t *, size_t); 99 static void hash_df(secret void *, size_t, const struct hvec *, size_t); 100 static void hash_df_block(secret void *, uint8_t, uint8_t[4], 120 nist_hash_drbg_instantiate(secret struct nist_hash_drbg *D, 121 const secret void *entropy, size_t entropylen, 160 nist_hash_drbg_reseed(secret struct nist_hash_drbg *D 74 #define secret macro [all...] |
| /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/engine/ |
| falcon.h | 33 u8 secret; member in struct:nvkm_falcon
|
| /src/sys/lib/libkern/ |
| entpool.c | 91 #define secret /* must not use in variable-time operations; should zero */ 240 entpool_extract(struct entpool *P, secret void *buf, size_t len) 90 #define secret macro
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| sskdf.c | 24 * Z is a shared secret required to produce the derived key material. 58 unsigned char *secret; member in struct:__anon1606 89 * counter is appended to the secret 'z'. 306 OPENSSL_clear_free(ctx->secret, ctx->secret_len); 358 if (ctx->secret == NULL) { 405 ctx->secret, ctx->secret_len, 414 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, 428 if (ctx->secret == NULL) { 445 return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len, 476 if (!sskdf_set_buffer(&ctx->secret, &ctx->secret_len, p) [all...] |
| /src/external/bsd/unbound/dist/util/ |
| edns.c | 158 edns_cookie_server_hash(const uint8_t* in, const uint8_t* secret, int v4, 161 v4?siphash(in, 20, secret, hash, 8):siphash(in, 32, secret, hash, 8); 166 edns_cookie_server_write(uint8_t* buf, const uint8_t* secret, int v4, 175 (void)edns_cookie_server_hash(buf, secret, v4, hash); 181 const uint8_t* secret, size_t secret_len, int v4, 203 if(memcmp(edns_cookie_server_hash(hash_input, secret, v4, hash), 240 /** Read the cookie secret file */ 245 char secret[UNBOUND_COOKIE_SECRET_SIZE * 2 + 2/*'\n' and '\0'*/]; local 256 log_err("Could not read cookie-secret-file '%s': %s" [all...] |
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_initiator.c | 1067 struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; local 1206 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, 1210 if (!secret) { 1211 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); 1234 wpabuf_head(secret), wpabuf_len(secret), 1253 wpabuf_free(secret); 1254 secret = NULL; 1349 wpabuf_free(secret);
|
| pasn_responder.c | 305 struct wpabuf *secret) 350 wpabuf_head(secret), wpabuf_len(secret), 608 struct wpabuf *wrapped_data = NULL, *secret = NULL; local 748 secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, 751 if (!secret) { 752 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); 820 wpa_printf(MSG_DEBUG, "PASN: Storing secret"); 821 pasn->secret = secret; [all...] |
| /src/external/mpl/bind/dist/bin/named/include/named/ |
| server.h | 104 unsigned char secret[32]; /*%< Server Cookie Secret */ member in struct:named_server
|
| /src/external/mpl/bind/dist/fuzz/ |
| dns_message_checksig.c | 136 unsigned char secret[16] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, local 206 result = dns_tsigkey_create(name, DST_ALG_HMACSHA256, secret, 207 sizeof(secret), mctx, &tsigkey);
|
| /src/external/mpl/dhcp/dist/dhcpctl/ |
| omshell.c | 112 struct data_string secret; local 405 memset (&secret, 0, sizeof secret); 406 if (!parse_base64 (&secret, cfile)) { 433 secret.data, 434 secret.len);
|
| /src/external/mpl/bind/dist/tests/dns/ |
| tsig_test.c | 274 unsigned char secret[16] = { 0 }; local 287 result = dns_tsigkey_create(keyname, DST_ALG_HMACSHA256, secret, 288 sizeof(secret), mctx, &key);
|