/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): argument 43 a = hm(secret).digest(seed) # A(1) 46 res += hm(secret).digest(a + raw(seed)) 47 a = hm(secret).digest(a) 53 def _tls_P_MD5(secret, seed, req_len): argument 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): argument 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len): argument 60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"]) [all …]
|
D | hkdf.py | 37 def expand_label(self, secret, label, hash_value, length): argument 44 return self.expand(secret, hkdf_label, length) 46 def derive_secret(self, secret, label, messages): argument 51 return self.expand_label(secret, label, hash_messages, hash_len)
|
/external/ppp/pppd/plugins/radius/ |
D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument 106 secretlen = strlen (secret); in rc_pack_list() 110 strcpy ((char *) md5buf, secret); in rc_pack_list() 141 secretlen = strlen (secret); in rc_pack_list() 142 strcpy ((char *) md5buf, secret); in rc_pack_list() 209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local 223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server() 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server() 238 memset (secret, '\0', sizeof (secret)); in rc_send_server() 253 memset (secret, '\0', sizeof (secret)); in rc_send_server() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 202 protected static byte[] trimZeroes(byte[] secret) in trimZeroes() argument 204 if (secret[0] != 0) in trimZeroes() 206 return secret; in trimZeroes() 211 while (ind < secret.length && secret[ind] == 0) in trimZeroes() 216 byte[] rv = new byte[secret.length - ind]; in trimZeroes() 218 System.arraycopy(secret, ind, rv, 0, rv.length); in trimZeroes() 229 byte[] secret = calcSecret(); in engineGenerateSecret() 232 return getSharedSecretBytes(secret, null, secret.length * 8); in engineGenerateSecret() 248 byte[] secret = engineGenerateSecret(); in engineGenerateSecret() 250 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() [all …]
|
/external/nos/host/android/hals/authsecret/test/ |
D | test.cpp | 82 hidl_vec<uint8_t> secret; in TEST() local 83 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST() 84 hal.primaryUserCredential(secret); in TEST() 99 hidl_vec<uint8_t> secret; in TEST() local 100 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST() 101 hal.primaryUserCredential(secret); in TEST() 115 hidl_vec<uint8_t> secret(19); in TEST() local 116 hal.primaryUserCredential(secret); in TEST() 144 hidl_vec<uint8_t> secret; in TEST() local 145 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST() [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | prf.go | 17 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) { 18 s1 = secret[0 : (len(secret)+1)/2] 19 s2 = secret[len(secret)/2:] 24 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument 25 h := hmac.New(hash, secret) 49 func prf10(result, secret, label, seed []byte) { argument 57 s1, s2 := splitPreMasterSecret(secret) 68 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) { 69 return func(result, secret, label, seed []byte) { 74 pHash(result, secret, labelAndSeed, hashFunc) [all …]
|
/external/ppp/pppd/ |
D | chap_ms.c | 194 unsigned char *secret, int secret_len, in chapms_verify_response() argument 216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response() 242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument 257 (char *)secret, secret_len, md, in chapms2_verify_response() 319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument 324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response() 385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument 404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response() 579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument 597 MD4Update(&md4Context, secret, 512); in NTPasswordHash() [all …]
|
D | auth.c | 1381 char secret[MAXWORDLEN]; 1425 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1432 int login_secret = strcmp(secret, "@login") == 0; 1445 if (secret[0] != 0 && !login_secret) { 1447 if (cryptpap || strcmp(passwd, secret) != 0) { 1448 char *cbuf = crypt(passwd, secret); 1449 if (!cbuf || strcmp(cbuf, secret) != 0) 1485 BZERO(secret, sizeof(secret)); 1504 char secret[MAXWORDLEN]; local 1524 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0); [all …]
|
D | chap-md5.c | 58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument 73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response() 89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument 98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | BaseAgreementSpi.java | 206 protected static byte[] trimZeroes(byte[] secret) in trimZeroes() argument 208 if (secret[0] != 0) in trimZeroes() 210 return secret; in trimZeroes() 215 while (ind < secret.length && secret[ind] == 0) in trimZeroes() 220 byte[] rv = new byte[secret.length - ind]; in trimZeroes() 222 System.arraycopy(secret, ind, rv, 0, rv.length); in trimZeroes() 233 byte[] secret = calcSecret(); in engineGenerateSecret() 236 return getSharedSecretBytes(secret, null, secret.length * 8); in engineGenerateSecret() 252 byte[] secret = engineGenerateSecret(); in engineGenerateSecret() 254 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret() [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_key_share.cc | 118 Array<uint8_t> secret; in Finish() local 119 if (!secret.Init((EC_GROUP_get_degree(group.get()) + 7) / 8) || in Finish() 120 !BN_bn2bin_padded(secret.data(), secret.size(), x)) { in Finish() 124 *out_secret = std::move(secret); in Finish() 176 Array<uint8_t> secret; in Finish() local 177 if (!secret.Init(32)) { in Finish() 183 !X25519(secret.data(), private_key_, peer_key.data())) { in Finish() 189 *out_secret = std::move(secret); in Finish() 241 Array<uint8_t> secret; in Accept() local 242 if (!secret.Init(32 + HRSS_KEY_BYTES)) { in Accept() [all …]
|
D | tls13_enc.cc | 44 OPENSSL_memset(hs->secret, 0, hs->hash_len); in init_key_schedule() 56 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, in tls13_init_key_schedule() 57 psk_len, hs->secret, hs->hash_len); in tls13_init_key_schedule() 65 HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, in tls13_init_early_key_schedule() 66 psk_len, hs->secret, hs->hash_len); in tls13_init_early_key_schedule() 70 const uint8_t *secret, size_t secret_len, in hkdf_expand_label() argument 92 return HKDF_expand(out, len, digest, secret, secret_len, hkdf_label.data(), in hkdf_expand_label() 107 if (!hkdf_expand_label(hs->secret, hs->transcript.Digest(), hs->secret, in tls13_advance_key_schedule() 114 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), in, in tls13_advance_key_schedule() 115 len, hs->secret, hs->hash_len); in tls13_advance_key_schedule() [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_t secret_len); [all …]
|
D | radius.c | 367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument 370 if (secret) { in radius_msg_finish() 384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish() 398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument 416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv() 426 addr[3] = secret; in radius_msg_finish_srv() 439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument 458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp() 464 addr[1] = secret; in radius_msg_finish_das_resp() 478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument [all …]
|
/external/curl/tests/data/ |
D | test1561 | 19 Set-Cookie: super=secret; domain=example.com; path=/1561; secure; 20 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/; secure; 23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com 38 Set-Cookie: super=secret; domain=example.com; path=/1561; httponly; 39 Set-Cookie: super=secret; domain=example.com; path=/1561/; httponly; 40 Set-Cookie: super=secret; domain=example.com; path=/15; httponly; 42 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/en; 43 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login; 98 .example.com TRUE / TRUE 0 supersupersuper secret 100 .example.com TRUE /1561/login/ TRUE 0 supersuper secret [all …]
|
D | test836 | 15 REPLY "LOGIN user.one secret" A002 OK LOGIN completed 16 REPLY "LOGIN user.two secret" B002 OK LOGIN completed 39 …IP:%IMAPPORT/836/;MAILINDEX=1' -u user.one:secret -: 'imap://%HOSTIP:%IMAPPORT/836/;UID=2' -u user… 48 A002 LOGIN user.one secret 53 B002 LOGIN user.two secret
|
D | test882 | 15 REPLY "PASS secret" +OK Login successful 38 pop3://%HOSTIP:%POP3PORT/882001 -u user.one:secret -: pop3://%HOSTIP:%POP3PORT/882002 -u user.two:s… 48 PASS secret 53 PASS secret
|
/external/tcpdump/tests/ |
D | bfd-raw-auth-simple-v.out | 10 Auth Key ID: 2, Password: secret 20 Auth Key ID: 2, Password: secret 30 Auth Key ID: 2, Password: secret 40 Auth Key ID: 2, Password: secret 50 Auth Key ID: 2, Password: secret 60 Auth Key ID: 2, Password: secret 70 Auth Key ID: 2, Password: secret 80 Auth Key ID: 2, Password: secret 90 Auth Key ID: 2, Password: secret 100 Auth Key ID: 2, Password: secret [all …]
|
/external/nos/host/android/hals/authsecret/ |
D | AuthSecret.cpp | 61 nugget_app_password DeriveCitadelUpdatePassword(const hidl_vec<uint8_t>& secret) { in DeriveCitadelUpdatePassword() argument 70 SHA256_Update(&c, secret.data(), secret.size()); in DeriveCitadelUpdatePassword() 153 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument 156 if (secret.size() < 16) { in primaryUserCredential() 160 const nugget_app_password password = DeriveCitadelUpdatePassword(secret); in primaryUserCredential()
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
D | kdf.c | 69 const uint8_t *secret, size_t secret_len, in tls1_P_hash() argument 83 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || in tls1_P_hash() 139 const uint8_t *secret, size_t secret_len, in CRYPTO_tls1_prf() argument 152 if (!tls1_P_hash(out, out_len, EVP_md5(), secret, secret_half, label, in CRYPTO_tls1_prf() 158 secret += secret_len - secret_half; in CRYPTO_tls1_prf() 163 return tls1_P_hash(out, out_len, digest, secret, secret_len, label, label_len, in CRYPTO_tls1_prf()
|
/external/tcpdump/ |
D | print-esp.c | 118 u_char secret[256]; /* is that big enough for all secrets? */ member 226 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2() 382 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo() 387 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo() 388 memcpy(sa->secret, colon, i); in espprint_decode_encalgo() 391 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo() 392 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo() 658 u_char *secret; in esp_print() local 670 secret = NULL; in esp_print() 676 p = (u_char *)&secret; in esp_print() [all …]
|
/external/python/cpython2/Python/ |
D | random.c | 365 void *secret = &_Py_HashSecret; in _PyRandom_Init() local 379 memset(secret, 0, secret_size); in _PyRandom_Init() 402 memset(secret, 0, secret_size); in _PyRandom_Init() 405 lcg_urandom(seed, (unsigned char*)secret, secret_size); in _PyRandom_Init() 410 (void)win32_urandom((unsigned char *)secret, secret_size, 0); in _PyRandom_Init() 412 vms_urandom((unsigned char *)secret, secret_size, 0); in _PyRandom_Init() 414 (void)py_getentropy(secret, secret_size, 1); in _PyRandom_Init() 416 dev_urandom_noraise(secret, secret_size); in _PyRandom_Init()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha256-tlsprf.c | 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256() 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256() 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
|
/external/ipsec-tools/src/racoon/ |
D | safefile.c | 48 safefile(path, secret) in safefile() argument 50 int secret; 84 if (secret) {
|
/external/cros/system_api/dbus/cryptohome/ |
D | signed_secret.proto | 17 // The secret currently assumes a password-equivalent key and a 18 // revision, to avoid rollbacks. This secret should be serialized 23 optional bytes secret = 2; field 25 // and different secret types.
|