| /src/external/apache2/llvm/dist/libcxx/utils/ci/ |
| secrets.env | 8 BUILDKITE_AGENT_TOKEN=<secret>
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-tsig.conf.j2 | 14 /* Bad secret */ 17 secret "jEdD+BPKg==";
|
| bad-kasp-keydir2.conf.j2 | 22 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 27 secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
|
| bad-kasp-keydir1.conf.j2 | 22 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 27 secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
|
| bad-kasp-keydir3.conf.j2 | 23 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 28 secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
|
| bad-kasp-keydir4.conf.j2 | 22 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 27 secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
|
| bad-kasp-keydir5.conf.j2 | 23 secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; 28 secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
|
| /src/external/mpl/bind/dist/bin/tests/system/tsig/ns1/ |
| named-md5.conf.j2 | 15 secret "97rnFx24Tfna4mHPfgnerA=="; 20 secret "97rnFx24Tfna4mHPfgnerA=="; 26 secret "B7HCXJs0XnSPzypG5oHuGw==";
|
| named.conf.j2 | 32 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0="; 37 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA=="; 42 secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY="; 47 secret "OaDdoAk2LAcLtYeUnsT7A9XHjsb6ZEma7OCvUpMraQIJX6HetGrlKmF7yglO1G2h"; 52 secret "jI/Pa4qRu96t76Pns5Z/Ndxbn3QCkwcxLOgt9vgvnJw5wqTRvNyk3FtD6yIMd1dWVlqZ+Y4fe6Uasc0ckctEmg=="; 58 secret "TxGx9XBp6Pp5yYAOKXdERA=="; 63 secret "H8Hyw718rLqToQFRLAeFWQ=="; 68 secret "fdT9hiPov4ThMEfRv1FNmA=="; 73 secret "fnshFIjQTLFap6+j2JGBkA=="; 78 secret "BZwNLICp2tj4hi6gil41eg==" [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/_common/ |
| rndc.key | 13 secret "1234abcd8765";
|
| controls.conf.in | 15 secret "1234abcd8765";
|
| /src/external/mpl/bind/dist/bin/tests/system/rndc/ns2/ |
| secondkey.conf.j2 | 19 secret "abcd1234abcd8765";
|
| /src/external/bsd/openldap/dist/tests/data/ |
| lloadd-empty.conf | 25 credentials=secret
|
| slapd-config-undo.conf | 9 rootpw secret
|
| /src/external/bsd/tcpdump/dist/tests/ |
| setkey2esp-secrets.pl | 19 ($secret = $2) =~ s/\s+//g; 21 printf"0x%x@%s %s:0x%s\n", $spi, $dst, $algo, $secret;
|
| /src/lib/libtelnet/ |
| pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 23 addr[1] = secret;
|
| chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
| /src/external/mpl/bind/dist/bin/tests/system/optout/ns2/ |
| controls.conf.j2 | 15 secret "1234abcd8765";
|
| /src/external/mpl/bind/dist/bin/tests/system/allow_query/ns2/ |
| controls.conf.j2 | 15 secret "1234abcd8765";
|
| named11.conf.j2 | 16 secret "1234abcd8765"; 21 secret "1234efgh8765";
|
| /src/external/mpl/bind/dist/bin/tests/system/xfer_servers_list/ns1/ |
| named.conf.j2 | 35 secret "9999abcd8765"; 40 secret "2222abcd8765"; 45 secret "3333abcd8765"; 50 secret "4444abcd8765"; 71 secret "1234abcd8765";
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_policy.c | 39 * of the secret (1.2 backport only). 48 BYTE secret[UI_MAX_SECRET_STRING_LENGTH] = { 0 }; local 56 /* pin the area where the secret will be put in memory */ 57 if (pin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH)) { 58 LogError("Failed to pin secret in memory."); 63 DisplayNewPINWindow(secret, &secret_len, popup_str); 65 DisplayPINWindow(secret, &secret_len, popup_str); 68 unpin_mem(&secret, UI_MAX_SECRET_STRING_LENGTH); 75 LogDebug("Hashing these %u bytes as the secret:", secret_len); 76 LogDebugData(secret_len, secret); [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0 [all...] |
| sha384-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA384(secret, label + seed) 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0 [all...] |