/third_party/grpc/third_party/upb/third_party/wyhash/ |
D | wyhash.h | 83 …4_t _wyfinish16(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t i){ in _wyfinish16() argument 92 return _wymix(secret[1]^len,_wymix(a^secret[1], b^seed)); in _wyfinish16() 95 …return _wymix(secret[1]^len,_wymix((_wyr8(p)<<oneshot_shift)^secret[1],(_wyr8(p+i-8)>>oneshot_shif… in _wyfinish16() 99 …t64_t _wyfinish(const uint8_t *p, uint64_t len, uint64_t seed, const uint64_t *secret, uint64_t i){ in _wyfinish() argument 100 if(_likely_(i<=16)) return _wyfinish16(p,len,seed,secret,i); in _wyfinish() 101 return _wyfinish(p+16,len,_wymix(_wyr8(p)^secret[1],_wyr8(p+8)^seed),secret,i-16); in _wyfinish() 104 static inline uint64_t wyhash(const void *key, uint64_t len, uint64_t seed, const uint64_t *secret){ in wyhash() argument 106 uint64_t i=len; seed^=*secret; in wyhash() 110 … seed=_wymix(_wyr8(p)^secret[1],_wyr8(p+8)^seed)^_wymix(_wyr8(p+16)^secret[2],_wyr8(p+24)^seed); in wyhash() 111 …see1=_wymix(_wyr8(p+32)^secret[3],_wyr8(p+40)^see1)^_wymix(_wyr8(p+48)^secret[4],_wyr8(p+56)^see1); in wyhash() [all …]
|
/third_party/lwip/src/netif/ppp/ |
D | chap_ms.c | 250 const unsigned char *secret, int secret_len, in chapms_verify_response() argument 273 ChapMS(pcb, (const u_char *)challenge, (const char *)secret, secret_len, md); in chapms_verify_response() 298 const unsigned char *secret, int secret_len, in chapms2_verify_response() argument 313 (const char *)secret, secret_len, md, in chapms2_verify_response() 375 const unsigned char *challenge, const char *secret, int secret_len, in chapms_make_response() argument 382 ChapMS(pcb, challenge, secret, secret_len, response); in chapms_make_response() 386 const unsigned char *challenge, const char *secret, int secret_len, in chapms2_make_response() argument 397 our_name, secret, secret_len, response, private_, in chapms2_make_response() 572 static void NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) { in NTPasswordHash() argument 577 lwip_md4_update(&md4Context, secret, secret_len); in NTPasswordHash() [all …]
|
D | auth.c | 1572 char secret[MAXWORDLEN]; 1616 if (scan_authfile(f, ppp_settings.user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1623 int login_secret = strcmp(secret, "@login") == 0; 1636 if (secret[0] != 0 && !login_secret) { 1638 if ((cryptpap || strcmp(ppp_settings.passwd, secret) != 0) 1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0) 1674 BZERO(secret, sizeof(secret)); 1692 char secret[MAXWORDLEN]; 1712 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0); 1713 ret = i >= 0 && secret[0] == 0; [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius.h | 243 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 245 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 247 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 250 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 252 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 255 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 257 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 269 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 276 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/third_party/boost/boost/graph/detail/ |
D | indexed_properties.hpp | 116 struct secret struct in boost::detail::indexed_vertex_properties 123 typedef secret vertex_map_type; 124 typedef secret const_vertex_map_type; 126 secret operator[](secret) { return secret(); } in operator []() argument 255 struct secret struct in boost::detail::indexed_edge_properties 263 typedef secret edge_map_type; 264 typedef secret const_edge_map_type; 266 secret operator[](secret) { return secret(); } in operator []() argument
|
/third_party/grpc/examples/python/cancellation/ |
D | search.py | 63 def _get_hash(secret): argument 65 hasher.update(secret) 128 for secret in _all_bytestrings(): 131 candidate_hash = _get_hash(secret) 136 secret=base64.b64encode(secret), 142 secret=base64.b64encode(secret),
|
/third_party/curl/tests/data/ |
D | test1561 | 19 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER; secure; 20 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login/; secure; 23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com 38 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER; httponly; 39 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER/; httponly; 40 Set-Cookie: super=secret; domain=example.com; path=/15; httponly; 42 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login/en; 43 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login; 95 .example.com TRUE / TRUE 0 supersupersuper secret 97 .example.com TRUE /%TESTNUMBER/login/ TRUE 0 supersuper secret [all …]
|
D | test836 | 15 REPLY "LOGIN user.one secret" A002 OK LOGIN completed 16 REPLY "LOGIN user.two secret" B002 OK LOGIN completed 39 …/%TESTNUMBER/;MAILINDEX=1' -u user.one:secret -: 'imap://%HOSTIP:%IMAPPORT/%TESTNUMBER/;UID=2' -u … 48 A002 LOGIN user.one secret 53 B002 LOGIN user.two secret
|
D | test882 | 15 REPLY "PASS secret" +OK Login successful 38 …STIP:%POP3PORT/%TESTNUMBER001 -u user.one:secret -: pop3://%HOSTIP:%POP3PORT/%TESTNUMBER002 -u use… 48 PASS secret 53 PASS secret
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 28 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_hkdf_expand() argument 95 || EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, hashlen) <= 0 in tls13_hkdf_expand() 116 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_key() argument 125 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, in tls13_derive_key() 133 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret, in tls13_derive_iv() argument 142 return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1, in tls13_derive_iv() 147 const unsigned char *secret, in tls13_derive_finishedkey() argument 156 return tls13_hkdf_expand(s, md, secret, finishedlabel, in tls13_derive_finishedkey() 365 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument 382 secret, hashlen, 1)) { in derive_secret_key_and_iv() [all …]
|
/third_party/node/deps/npm/node_modules/libnpmhook/ |
D | index.js | 17 cmd.add = (name, endpoint, secret, opts) => { argument 19 validate('SSSO', [name, endpoint, secret, opts]) 30 body: { type, name, endpoint, secret } field 48 cmd.update = (id, endpoint, secret, opts) => { argument 50 validate('SSSO', [id, endpoint, secret, opts]) 53 body: {endpoint, secret} field
|
/third_party/ffmpeg/libavformat/ |
D | librist.c | 48 char *secret; member 68 …{ "secret", "set encryption secret",OFFSET(secret), AV_OPT_TYPE_STRING,{.str=NULL}, … 152 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open() 153 … ((peer_config->key_size == 128 || peer_config->key_size == 256) && !peer_config->secret[0])) { in librist_open() 159 if (s->secret && peer_config->secret[0] == 0) in librist_open() 160 av_strlcpy(peer_config->secret, s->secret, RIST_MAX_STRING_SHORT); in librist_open() 162 if (s->secret && (s->encryption == 128 || s->encryption == 256)) in librist_open()
|
/third_party/node/deps/npm/test/tap/ |
D | hook.js | 15 secret: 'sekrit' property 76 secret: 'sekrit' property 102 secret: 'sekrit' property 116 secret: 'sekrit' property 194 secret: 'sekrit' property 219 secret: 'sekrit' property 226 secret: 'sekrit' property 239 secret: 'sekrit' property
|
/third_party/node/deps/npm/node_modules/http-signature/lib/ |
D | verify.js | 52 verifyHMAC: function verifyHMAC(parsedSignature, secret) { 54 assert.string(secret, 'secret'); 62 var hmac = crypto.createHmac(hashAlg, secret); 72 var h1 = crypto.createHmac(hashAlg, secret); 75 var h2 = crypto.createHmac(hashAlg, secret);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
D | sha384-tlsprf.c | 29 int tls_prf_sha384(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha384() argument 53 if (hmac_sha384_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha384() 58 if (hmac_sha384_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha384() 60 hmac_sha384(secret, secret_len, A, SHA384_MAC_LEN, A) < 0) in tls_prf_sha384()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha256-tlsprf.c | 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) in tls_prf_sha256() 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < in tls_prf_sha256() 60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0) in tls_prf_sha256()
|
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/ |
D | key_agreement.cc | 118 uint8_t *secret = reinterpret_cast<uint8_t *>(OPENSSL_malloc(len)); 119 if (secret == nullptr) { 125 if (EVP_PKEY_derive(ctx, secret, &len) <= 0) { 127 OPENSSL_free(secret); 131 …if (!PKCS5_PBKDF2_HMAC(reinterpret_cast<char *>(secret), len, salt, salt_len, ITERATION, EVP_sha25… 133 OPENSSL_free(secret); 137 OPENSSL_free(secret);
|
/third_party/node/deps/npm/docs/content/cli-commands/ |
D | npm-hook.md | 15 npm hook add <entity> <url> <secret> 16 npm hook update <id> <url> [secret] 24 $ npm hook add lodash https://example.com/ my-shared-secret 29 $ npm hook add ~substack https://example.com/ my-shared-secret 34 $ npm hook add @npm https://example.com/ my-shared-secret 75 The shared secret will be sent along to the URL endpoint so you can verify the
|
/third_party/boost/libs/hana/include/boost/hana/functional/ |
D | demux.hpp | 174 struct secret { }; 192 return {make_pre_demux_t::secret{}, this->f, static_cast<G&&>(g)...}; 199 return {make_pre_demux_t::secret{}, static_cast<F&&>(this->f), static_cast<G&&>(g)...}; 206 constexpr demux_t(make_pre_demux_t::secret, T&& ...t) 237 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
|
/third_party/boost/boost/hana/functional/ |
D | demux.hpp | 174 struct secret { }; 192 return {make_pre_demux_t::secret{}, this->f, static_cast<G&&>(g)...}; 199 return {make_pre_demux_t::secret{}, static_cast<F&&>(this->f), static_cast<G&&>(g)...}; 206 constexpr demux_t(make_pre_demux_t::secret, T&& ...t) 237 constexpr demux_t(make_pre_demux_t::secret, T&& ...t)
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF 30 to B<seclen> bytes of the buffer B<sec>. Any existing secret value is replaced 42 The B<type> parameters "secret" and "seed" use the supplied B<value> parameter 43 as a secret or seed value. 55 The digest, secret value and seed must be set before a key is derived or an 75 This example derives 10 bytes using SHA-256 with the secret key "secret" 87 if (EVP_PKEY_CTX_set1_tls1_prf_secret(pctx, "secret", 6) <= 0)
|