/third_party/node/deps/npm/test/tap/ |
D | hook.js | 15 secret: 'sekrit' property 76 secret: 'sekrit' property 102 secret: 'sekrit' property 116 secret: 'sekrit' property 194 secret: 'sekrit' property 219 secret: 'sekrit' property 226 secret: 'sekrit' property 239 secret: 'sekrit' property
|
/third_party/lwip/src/netif/ppp/ |
D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() 582 static void ChapMS_NT(const u_char *rchallenge, const char *secret, int secret_len, in ChapMS_NT() 595 const char *secret, int secret_len, u_char NTResponse[24]) { in ChapMS2_NT() 612 static void ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, in ChapMS_LANMan() 691 const char *secret, int secret_len, in GenerateAuthenticatorResponsePlain() 714 static void Set_Start_Key(ppp_pcb *pcb, const u_char *rchallenge, const char *secret, int secret_le… in Set_Start_Key() [all …]
|
D | chap-md5.c | 62 const unsigned char *secret, int secret_len, in chap_md5_verify_response() 96 const unsigned char *challenge, const char *secret, int secret_len, in chap_md5_make_response()
|
/third_party/node/deps/npm/node_modules/libnpmhook/ |
D | index.js | 17 cmd.add = (name, endpoint, secret, opts) => { argument 30 body: { type, name, endpoint, secret } field 48 cmd.update = (id, endpoint, secret, opts) => { argument 53 body: {endpoint, secret} field
|
D | README.md | 82 secret: 'supersekrit', argument 197 secret: 'newsekrit', argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() 499 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct_resp() 520 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_acct_req() 542 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_das_req() 799 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_msg_auth() 849 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, in radius_msg_verify() 983 const u8 *secret, size_t secret_len, size_t *reslen) in decrypt_ms_key() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() 499 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct_resp() 520 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_acct_req() 542 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_das_req() 799 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, in radius_msg_verify_msg_auth() 849 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, in radius_msg_verify() 983 const u8 *secret, size_t secret_len, size_t *reslen) in decrypt_ms_key() [all …]
|
/third_party/grpc/third_party/upb/third_party/wyhash/ |
D | wyhash.h | 83 …t64_t _wyfinish16(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t … in _wyfinish16() 99 …int64_t _wyfinish(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t … in _wyfinish() 104 static inline uint64_t wyhash(const void *key, uint64_t len, uint64_t seed, const uint64_t *secret){ in wyhash() 126 static inline void make_secret(uint64_t seed, uint64_t *secret){ in make_secret()
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 28 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() 116 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() 133 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() 147 const unsigned char *secret, in tls13_derive_finishedkey() 365 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() 459 unsigned char secret[EVP_MAX_MD_SIZE]; in tls13_change_cipher_state() local 733 unsigned char secret[EVP_MAX_MD_SIZE]; in tls13_update_key() local
|
/third_party/boringssl/src/crypto/fipsmodule/tls/ |
D | kdf.c | 69 const uint8_t *secret, size_t secret_len, in tls1_P_hash() 139 const uint8_t *secret, size_t secret_len, in CRYPTO_tls1_prf()
|
/third_party/boringssl/src/ssl/ |
D | ssl_key_share.cc | 117 Array<uint8_t> secret; in Finish() local 175 Array<uint8_t> secret; in Finish() local 240 Array<uint8_t> secret; in Accept() local 277 Array<uint8_t> secret; in Finish() local
|
/third_party/node/test/common/ |
D | tls.js | 147 function PRF12(algo, secret, label, seed, size) { argument 152 function P_hash(algo, secret, seed, size) { argument
|
/third_party/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 27 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() 43 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF_extract()
|
/third_party/node/test/node-api/test_cleanup_hook/ |
D | binding.c | 9 static int secret = 42; variable
|
/third_party/node/test/parallel/ |
D | test-crypto-dh-padding.js | 90 const secret = constant
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, in chap_md5()
|
/third_party/boost/boost/graph/detail/ |
D | indexed_properties.hpp | 116 struct secret struct in boost::detail::indexed_vertex_properties 126 secret operator[](secret) { return secret(); } in operator []() argument 255 struct secret struct in boost::detail::indexed_edge_properties 266 secret operator[](secret) { return secret(); } in operator []() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf()
|
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256()
|
D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256()
|
D | sha384-kdf.c | 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, in hmac_sha384_kdf()
|
D | sha256-kdf.c | 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, in hmac_sha256_kdf()
|
/third_party/grpc/examples/python/cancellation/ |
D | hash_name.proto | 37 string secret = 1; field
|