Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 434) sorted by relevance

12345678910>>...18

/third_party/grpc/third_party/upb/third_party/wyhash/
Dwyhash.h83 …4_t _wyfinish16(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t i){ in _wyfinish16() argument
92 return _wymix(secret[1]^len,_wymix(a^secret[1], b^seed)); in _wyfinish16()
95 …return _wymix(secret[1]^len,_wymix((_wyr8(p)<<oneshot_shift)^secret[1],(_wyr8(p+i-8)>>oneshot_shif… in _wyfinish16()
99 …t64_t _wyfinish(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t i){ in _wyfinish() argument
100 if(_likely_(i<=16)) return _wyfinish16(p,len,seed,secret,i); in _wyfinish()
101 return _wyfinish(p+16,len,_wymix(_wyr8(p)^secret[1],_wyr8(p+8)^seed),secret,i-16); in _wyfinish()
104 static inline uint64_t wyhash(const void *key, uint64_t len, uint64_t seed, const uint64_t *secret){ in wyhash() argument
106 uint64_t i=len; seed^=*secret; in wyhash()
110 … seed=_wymix(_wyr8(p)^secret[1],_wyr8(p+8)^seed)^_wymix(_wyr8(p+16)^secret[2],_wyr8(p+24)^seed); in wyhash()
111 …see1=_wymix(_wyr8(p+32)^secret[3],_wyr8(p+40)^see1)^_wymix(_wyr8(p+48)^secret[4],_wyr8(p+56)^see1); in wyhash()
[all …]
/third_party/lwip/src/netif/ppp/
Dchap_ms.c250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument
273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response()
298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument
313 (const char *)secret, secret_len, md, in chapms2_verify_response()
375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() argument
382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response()
386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() argument
397 our_name, secret, secret_len, response, private_, in chapms2_make_response()
572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument
577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash()
[all …]
Dauth.c1572 char secret[MAXWORDLEN];
1616 if (scan_authfile(f, ppp_settings.user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1623 int login_secret = strcmp(secret, "@login") == 0;
1636 if (secret[0] != 0 && !login_secret) {
1638 if ((cryptpap || strcmp(ppp_settings.passwd, secret) != 0)
1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0)
1674 BZERO(secret, sizeof(secret));
1692 char secret[MAXWORDLEN];
1712 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0);
1713 ret = i >= 0 && secret[0] == 0;
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius.h240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
273 const u8 *secret, size_t secret_len);
[all …]
Dradius.c367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
370 if (secret) { in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
426 addr[3] = secret; in radius_msg_finish_srv()
439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
464 addr[1] = secret; in radius_msg_finish_das_resp()
478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius.h243 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
245 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
247 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
250 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
252 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
255 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
257 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
269 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
276 const u8 *secret, size_t secret_len);
[all …]
Dradius.c367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
370 if (secret) { in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
426 addr[3] = secret; in radius_msg_finish_srv()
439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
464 addr[1] = secret; in radius_msg_finish_das_resp()
478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/third_party/boost/boost/graph/detail/
Dindexed_properties.hpp116 struct secret struct in boost::detail::indexed_vertex_properties
123 typedef secret vertex_map_type;
124 typedef secret const_vertex_map_type;
126 secret operator[](secret) { return secret(); } in operator []() argument
255 struct secret struct in boost::detail::indexed_edge_properties
263 typedef secret edge_map_type;
264 typedef secret const_edge_map_type;
266 secret operator[](secret) { return secret(); } in operator []() argument
/third_party/grpc/examples/python/cancellation/
Dsearch.py63 def _get_hash(secret): argument
65 hasher.update(secret)
128 for secret in _all_bytestrings():
131 candidate_hash = _get_hash(secret)
136 secret=base64.b64encode(secret),
142 secret=base64.b64encode(secret),
/third_party/curl/tests/data/
Dtest156119 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER; secure;
20 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login/; secure;
23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com
38 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER; httponly;
39 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER/; httponly;
40 Set-Cookie: super=secret; domain=example.com; path=/15; httponly;
42 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login/en;
43 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login;
95 .example.com TRUE / TRUE 0 supersupersuper secret
97 .example.com TRUE /%TESTNUMBER/login/ TRUE 0 supersuper secret
[all …]
Dtest83615 REPLY "LOGIN user.one secret" A002 OK LOGIN completed
16 REPLY "LOGIN user.two secret" B002 OK LOGIN completed
39 …/%TESTNUMBER/;MAILINDEX=1' -u user.one:secret -: 'imap://%HOSTIP:%IMAPPORT/%TESTNUMBER/;UID=2' -u …
48 A002 LOGIN user.one secret
53 B002 LOGIN user.two secret
Dtest88215 REPLY "PASS secret" +OK Login successful
38 …STIP:%POP3PORT/%TESTNUMBER001 -u user.one:secret -: pop3://%HOSTIP:%POP3PORT/%TESTNUMBER002 -u use…
48 PASS secret
53 PASS secret
/third_party/openssl/ssl/
Dtls13_enc.c28 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument
95 || EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, hashlen) <= 0 in tls13_hkdf_expand()
116 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument
125 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key()
133 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument
142 return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1, in tls13_derive_iv()
147 const unsigned char *secret, in tls13_derive_finishedkey() argument
156 return tls13_hkdf_expand(s, md, secret, finishedlabel, in tls13_derive_finishedkey()
365 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument
382 secret, hashlen, 1)) { in derive_secret_key_and_iv()
[all …]
/third_party/node/deps/npm/node_modules/libnpmhook/
Dindex.js17 cmd.add = (name, endpoint, secret, opts) => { argument
19 validate('SSSO', [name, endpoint, secret, opts])
30 body: { type, name, endpoint, secret } field
48 cmd.update = (id, endpoint, secret, opts) => { argument
50 validate('SSSO', [id, endpoint, secret, opts])
53 body: {endpoint, secret} field
/third_party/ffmpeg/libavformat/
Dlibrist.c48 char *secret; member
68 …{ "secret", "set encryption secret",OFFSET(secret), AV_OPT_TYPE_STRING,{.str=NULL}, …
152 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open()
153 … ((peer_config->key_size == 128 || peer_config->key_size == 256) && !peer_config->secret[0])) { in librist_open()
159 if (s->secret && peer_config->secret[0] == 0) in librist_open()
160 av_strlcpy(peer_config->secret, s->secret, RIST_MAX_STRING_SHORT); in librist_open()
162 if (s->secret && (s->encryption == 128 || s->encryption == 256)) in librist_open()
/third_party/node/deps/npm/test/tap/
Dhook.js15 secret: 'sekrit' property
76 secret: 'sekrit' property
102 secret: 'sekrit' property
116 secret: 'sekrit' property
194 secret: 'sekrit' property
219 secret: 'sekrit' property
226 secret: 'sekrit' property
239 secret: 'sekrit' property
/third_party/node/deps/npm/node_modules/http-signature/lib/
Dverify.js52 verifyHMAC: function verifyHMAC(parsedSignature, secret) {
54 assert.string(secret, 'secret');
62 var hmac = crypto.createHmac(hashAlg, secret);
72 var h1 = crypto.createHmac(hashAlg, secret);
75 var h2 = crypto.createHmac(hashAlg, secret);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
Dsha384-tlsprf.c29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument
53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384()
58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384()
60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dsha256-tlsprf.c29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256()
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256()
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/
Dkey_agreement.cc118 uint8_t *secret = reinterpret_cast<uint8_t *>(OPENSSL_malloc(len));
119 if (secret == nullptr) {
125 if (EVP_PKEY_derive(ctx, secret, &len) <= 0) {
127 OPENSSL_free(secret);
131 …if (!PKCS5_PBKDF2_HMAC(reinterpret_cast<char *>(secret), len, salt, salt_len, ITERATION, EVP_sha25…
133 OPENSSL_free(secret);
137 OPENSSL_free(secret);
/third_party/node/deps/npm/docs/content/cli-commands/
Dnpm-hook.md15 npm hook add <entity> <url> <secret>
16 npm hook update <id> <url> [secret]
24 $ npm hook add lodash https://example.com/ my-shared-secret
29 $ npm hook add ~substack https://example.com/ my-shared-secret
34 $ npm hook add @npm https://example.com/ my-shared-secret
75 The shared secret will be sent along to the URL endpoint so you can verify the
/third_party/boost/libs/hana/include/boost/hana/functional/
Ddemux.hpp174 struct secret { };
192 return {make_pre_demux_t::secret{}, this->f, static_cast<G&&>(g)...};
199 return {make_pre_demux_t::secret{}, static_cast<F&&>(this->f), static_cast<G&&>(g)...};
206 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
237 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
/third_party/boost/boost/hana/functional/
Ddemux.hpp174 struct secret { };
192 return {make_pre_demux_t::secret{}, this->f, static_cast<G&&>(g)...};
199 return {make_pre_demux_t::secret{}, static_cast<F&&>(this->f), static_cast<G&&>(g)...};
206 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
237 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
/third_party/openssl/doc/man3/
DEVP_PKEY_CTX_set_tls1_prf_md.pod29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF
30 to B<seclen> bytes of the buffer B<sec>. Any existing secret value is replaced
42 The B<type> parameters "secret" and "seed" use the supplied B<value> parameter
43 as a secret or seed value.
55 The digest, secret value and seed must be set before a key is derived or an
75 This example derives 10 bytes using SHA-256 with the secret key "secret"
87 if (EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, "secret", 6) <= 0)

12345678910>>...18