Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 275) sorted by relevance

1234567891011

/external/scapy/scapy/layers/tls/crypto/
Dprf.py22 def _tls_P_hash(secret, seed, req_len, hm): argument
43 a = hm(secret).digest(seed) # A(1)
46 res += hm(secret).digest(a + raw(seed))
47 a = hm(secret).digest(a)
53 def _tls_P_MD5(secret, seed, req_len): argument
54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"])
56 def _tls_P_SHA1(secret, seed, req_len): argument
57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"])
59 def _tls_P_SHA256(secret, seed, req_len): argument
60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"])
[all …]
Dhkdf.py37 def expand_label(self, secret, label, hash_value, length): argument
44 return self.expand(secret, hkdf_label, length)
46 def derive_secret(self, secret, label, messages): argument
51 return self.expand_label(secret, label, hash_messages, hash_len)
/external/ppp/pppd/plugins/radius/
Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) in rc_pack_list() argument
106 secretlen = strlen (secret); in rc_pack_list()
110 strcpy ((char *) md5buf, secret); in rc_pack_list()
141 secretlen = strlen (secret); in rc_pack_list()
142 strcpy ((char *) md5buf, secret); in rc_pack_list()
209 char secret[MAX_SECRET_LENGTH + 1]; in rc_send_server() local
223 strcpy(secret, MGMT_POLL_SECRET); in rc_send_server()
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) in rc_send_server()
238 memset (secret, '\0', sizeof (secret)); in rc_send_server()
253 memset (secret, '\0', sizeof (secret)); in rc_send_server()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
DBaseAgreementSpi.java202 protected static byte[] trimZeroes(byte[] secret) in trimZeroes() argument
204 if (secret[0] != 0) in trimZeroes()
206 return secret; in trimZeroes()
211 while (ind < secret.length && secret[ind] == 0) in trimZeroes()
216 byte[] rv = new byte[secret.length - ind]; in trimZeroes()
218 System.arraycopy(secret, ind, rv, 0, rv.length); in trimZeroes()
229 byte[] secret = calcSecret(); in engineGenerateSecret()
232 return getSharedSecretBytes(secret, null, secret.length * 8); in engineGenerateSecret()
248 byte[] secret = engineGenerateSecret(); in engineGenerateSecret()
250 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret()
[all …]
/external/nos/host/android/hals/authsecret/test/
Dtest.cpp82 hidl_vec<uint8_t> secret; in TEST() local
83 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST()
84 hal.primaryUserCredential(secret); in TEST()
99 hidl_vec<uint8_t> secret; in TEST() local
100 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST()
101 hal.primaryUserCredential(secret); in TEST()
115 hidl_vec<uint8_t> secret(19); in TEST() local
116 hal.primaryUserCredential(secret); in TEST()
144 hidl_vec<uint8_t> secret; in TEST() local
145 secret.setToExternal(SECRET_STRING, sizeof(SECRET_STRING) - 1); in TEST()
[all …]
/external/boringssl/src/ssl/test/runner/
Dprf.go17 func splitPreMasterSecret(secret []byte) (s1, s2 []byte) {
18 s1 = secret[0 : (len(secret)+1)/2]
19 s2 = secret[len(secret)/2:]
24 func pHash(result, secret, seed []byte, hash func() hash.Hash) { argument
25 h := hmac.New(hash, secret)
49 func prf10(result, secret, label, seed []byte) { argument
57 s1, s2 := splitPreMasterSecret(secret)
68 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
69 return func(result, secret, label, seed []byte) {
74 pHash(result, secret, labelAndSeed, hashFunc)
[all …]
/external/ppp/pppd/
Dchap_ms.c194 unsigned char *secret, int secret_len, in chapms_verify_response() argument
216 ChapMS(challenge, (char *)secret, secret_len, md); in chapms_verify_response()
242 unsigned char *secret, int secret_len, in chapms2_verify_response() argument
257 (char *)secret, secret_len, md, in chapms2_verify_response()
319 unsigned char *challenge, char *secret, int secret_len, in chapms_make_response() argument
324 ChapMS(challenge, secret, secret_len, response); in chapms_make_response()
385 unsigned char *challenge, char *secret, int secret_len, in chapms2_make_response() argument
404 our_name, secret, secret_len, response, auth_response, in chapms2_make_response()
579 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) in NTPasswordHash() argument
597 MD4Update(&md4Context, secret, 512); in NTPasswordHash()
[all …]
Dauth.c1381 char secret[MAXWORDLEN];
1425 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1432 int login_secret = strcmp(secret, "@login") == 0;
1445 if (secret[0] != 0 && !login_secret) {
1447 if (cryptpap || strcmp(passwd, secret) != 0) {
1448 char *cbuf = crypt(passwd, secret);
1449 if (!cbuf || strcmp(cbuf, secret) != 0)
1485 BZERO(secret, sizeof(secret));
1504 char secret[MAXWORDLEN]; local
1524 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0);
[all …]
Dchap-md5.c58 unsigned char *secret, int secret_len, in chap_md5_verify_response() argument
73 MD5_Update(&ctx, secret, secret_len); in chap_md5_verify_response()
89 unsigned char *challenge, char *secret, int secret_len, in chap_md5_make_response() argument
98 MD5_Update(&ctx, (u_char *)secret, secret_len); in chap_md5_make_response()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/util/
DBaseAgreementSpi.java206 protected static byte[] trimZeroes(byte[] secret) in trimZeroes() argument
208 if (secret[0] != 0) in trimZeroes()
210 return secret; in trimZeroes()
215 while (ind < secret.length && secret[ind] == 0) in trimZeroes()
220 byte[] rv = new byte[secret.length - ind]; in trimZeroes()
222 System.arraycopy(secret, ind, rv, 0, rv.length); in trimZeroes()
233 byte[] secret = calcSecret(); in engineGenerateSecret()
236 return getSharedSecretBytes(secret, null, secret.length * 8); in engineGenerateSecret()
252 byte[] secret = engineGenerateSecret(); in engineGenerateSecret()
254 if (sharedSecret.length - offset < secret.length) in engineGenerateSecret()
[all …]
/external/boringssl/src/ssl/
Dssl_key_share.cc118 Array<uint8_t> secret; in Finish() local
119 if (!secret.Init((EC_GROUP_get_degree(group.get()) + 7) / 8) || in Finish()
120 !BN_bn2bin_padded(secret.data(), secret.size(), x)) { in Finish()
124 *out_secret = std::move(secret); in Finish()
176 Array<uint8_t> secret; in Finish() local
177 if (!secret.Init(32)) { in Finish()
183 !X25519(secret.data(), private_key_, peer_key.data())) { in Finish()
189 *out_secret = std::move(secret); in Finish()
241 Array<uint8_t> secret; in Accept() local
242 if (!secret.Init(32 + HRSS_KEY_BYTES)) { in Accept()
[all …]
Dtls13_enc.cc44 OPENSSL_memset(hs->secret, 0, hs->hash_len); in init_key_schedule()
56 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, in tls13_init_key_schedule()
57 psk_len, hs->secret, hs->hash_len); in tls13_init_key_schedule()
65 HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), psk, in tls13_init_early_key_schedule()
66 psk_len, hs->secret, hs->hash_len); in tls13_init_early_key_schedule()
70 const uint8_t *secret, size_t secret_len, in hkdf_expand_label() argument
92 return HKDF_expand(out, len, digest, secret, secret_len, hkdf_label.data(), in hkdf_expand_label()
107 if (!hkdf_expand_label(hs->secret, hs->transcript.Digest(), hs->secret, in tls13_advance_key_schedule()
114 return HKDF_extract(hs->secret, &hs->hash_len, hs->transcript.Digest(), in, in tls13_advance_key_schedule()
115 len, hs->secret, hs->hash_len); in tls13_advance_key_schedule()
[all …]
/external/wpa_supplicant_8/src/radius/
Dradius.h240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
273 const u8 *secret, size_t secret_len);
[all …]
Dradius.c367 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, in radius_msg_finish() argument
370 if (secret) { in radius_msg_finish()
384 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish()
398 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_srv() argument
416 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_srv()
426 addr[3] = secret; in radius_msg_finish_srv()
439 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_das_resp() argument
458 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), in radius_msg_finish_das_resp()
464 addr[1] = secret; in radius_msg_finish_das_resp()
478 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, in radius_msg_finish_acct() argument
[all …]
/external/curl/tests/data/
Dtest156119 Set-Cookie: super=secret; domain=example.com; path=/1561; secure;
20 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/; secure;
23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com
38 Set-Cookie: super=secret; domain=example.com; path=/1561; httponly;
39 Set-Cookie: super=secret; domain=example.com; path=/1561/; httponly;
40 Set-Cookie: super=secret; domain=example.com; path=/15; httponly;
42 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/en;
43 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login;
98 .example.com TRUE / TRUE 0 supersupersuper secret
100 .example.com TRUE /1561/login/ TRUE 0 supersuper secret
[all …]
Dtest83615 REPLY "LOGIN user.one secret" A002 OK LOGIN completed
16 REPLY "LOGIN user.two secret" B002 OK LOGIN completed
39 …IP:%IMAPPORT/836/;MAILINDEX=1' -u user.one:secret -: 'imap://%HOSTIP:%IMAPPORT/836/;UID=2' -u user…
48 A002 LOGIN user.one secret
53 B002 LOGIN user.two secret
Dtest88215 REPLY "PASS secret" +OK Login successful
38 pop3://%HOSTIP:%POP3PORT/882001 -u user.one:secret -: pop3://%HOSTIP:%POP3PORT/882002 -u user.two:s…
48 PASS secret
53 PASS secret
/external/tcpdump/tests/
Dbfd-raw-auth-simple-v.out10 Auth Key ID: 2, Password: secret
20 Auth Key ID: 2, Password: secret
30 Auth Key ID: 2, Password: secret
40 Auth Key ID: 2, Password: secret
50 Auth Key ID: 2, Password: secret
60 Auth Key ID: 2, Password: secret
70 Auth Key ID: 2, Password: secret
80 Auth Key ID: 2, Password: secret
90 Auth Key ID: 2, Password: secret
100 Auth Key ID: 2, Password: secret
[all …]
/external/nos/host/android/hals/authsecret/
DAuthSecret.cpp61 nugget_app_password DeriveCitadelUpdatePassword(const hidl_vec<uint8_t>& secret) { in DeriveCitadelUpdatePassword() argument
70 SHA256_Update(&c, secret.data(), secret.size()); in DeriveCitadelUpdatePassword()
153 Return<void> AuthSecret::primaryUserCredential(const hidl_vec<uint8_t>& secret) { in primaryUserCredential() argument
156 if (secret.size() < 16) { in primaryUserCredential()
160 const nugget_app_password password = DeriveCitadelUpdatePassword(secret); in primaryUserCredential()
/external/boringssl/src/crypto/fipsmodule/tls/
Dkdf.c69 const uint8_t *secret, size_t secret_len, in tls1_P_hash() argument
83 if (!HMAC_Init_ex(&ctx_init, secret, secret_len, md, NULL) || in tls1_P_hash()
139 const uint8_t *secret, size_t secret_len, in CRYPTO_tls1_prf() argument
152 if (!tls1_P_hash(out, out_len, EVP_md5(), secret, secret_half, label, in CRYPTO_tls1_prf()
158 secret += secret_len - secret_half; in CRYPTO_tls1_prf()
163 return tls1_P_hash(out, out_len, digest, secret, secret_len, label, label_len, in CRYPTO_tls1_prf()
/external/tcpdump/
Dprint-esp.c118 u_char secret[256]; /* is that big enough for all secrets? */ member
226 if (set_cipher_parameters(ctx, sa->evp, sa->secret, NULL, 0) < 0) in esp_print_decrypt_buffer_by_ikev2()
382 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); in espprint_decode_encalgo()
387 if (i < sizeof(sa->secret)) { in espprint_decode_encalgo()
388 memcpy(sa->secret, colon, i); in espprint_decode_encalgo()
391 memcpy(sa->secret, colon, sizeof(sa->secret)); in espprint_decode_encalgo()
392 sa->secretlen = sizeof(sa->secret); in espprint_decode_encalgo()
658 u_char *secret; in esp_print() local
670 secret = NULL; in esp_print()
676 p = (u_char *)&secret; in esp_print()
[all …]
/external/python/cpython2/Python/
Drandom.c365 void *secret = &_Py_HashSecret; in _PyRandom_Init() local
379 memset(secret, 0, secret_size); in _PyRandom_Init()
402 memset(secret, 0, secret_size); in _PyRandom_Init()
405 lcg_urandom(seed, (unsigned char*)secret, secret_size); in _PyRandom_Init()
410 (void)win32_urandom((unsigned char *)secret, secret_size, 0); in _PyRandom_Init()
412 vms_urandom((unsigned char *)secret, secret_size, 0); in _PyRandom_Init()
414 (void)py_getentropy(secret, secret_size, 1); in _PyRandom_Init()
416 dev_urandom_noraise(secret, secret_size); in _PyRandom_Init()
/external/wpa_supplicant_8/src/crypto/
Dsha256-tlsprf.c29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, in tls_prf_sha256() argument
53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); in tls_prf_sha256()
57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); in tls_prf_sha256()
58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); in tls_prf_sha256()
/external/ipsec-tools/src/racoon/
Dsafefile.c48 safefile(path, secret) in safefile() argument
50 int secret;
84 if (secret) {
/external/cros/system_api/dbus/cryptohome/
Dsigned_secret.proto17 // The secret currently assumes a password-equivalent key and a
18 // revision, to avoid rollbacks. This secret should be serialized
23 optional bytes secret = 2; field
25 // and different secret types.

1234567891011