crypto/heimdal/lib/hx509/softp11.c
1278
if (obj->attrs[j].secret) {
crypto/heimdal/lib/hx509/softp11.c
1283
if (pTemplate[i].pValue != NULL_PTR && obj->attrs[j].secret == 0) {
crypto/heimdal/lib/hx509/softp11.c
337
int secret,
crypto/heimdal/lib/hx509/softp11.c
353
o->attrs[i].secret = secret;
crypto/heimdal/lib/hx509/softp11.c
54
int secret;
crypto/krb5/src/include/krad.h
174
krad_packet_new_request(krb5_context ctx, const char *secret, krad_code code,
crypto/krb5/src/include/krad.h
186
krad_packet_new_response(krb5_context ctx, const char *secret, krad_code code,
crypto/krb5/src/include/krad.h
203
krad_packet_decode_request(krb5_context ctx, const char *secret,
crypto/krb5/src/include/krad.h
221
krad_packet_decode_response(krb5_context ctx, const char *secret,
crypto/krb5/src/include/krad.h
274
const char *remote, const char *secret, int timeout,
crypto/krb5/src/lib/krad/attr.c
146
user_password_encode(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attr.c
165
seclen = strlen(secret);
crypto/krb5/src/lib/krad/attr.c
170
memcpy(tmp.data, secret, seclen);
crypto/krb5/src/lib/krad/attr.c
198
user_password_decode(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attr.c
215
seclen = strlen(secret);
crypto/krb5/src/lib/krad/attr.c
220
memcpy(tmp.data, secret, seclen);
crypto/krb5/src/lib/krad/attr.c
265
kr_attr_encode(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attr.c
285
return attributes[type - 1].encode(ctx, secret, auth, in, outbuf, outlen);
crypto/krb5/src/lib/krad/attr.c
289
kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
crypto/krb5/src/lib/krad/attr.c
308
return attributes[type - 1].decode(ctx, secret, auth, in, outbuf, outlen);
crypto/krb5/src/lib/krad/attr.c
39
(*attribute_transform_fn)(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attr.c
52
user_password_encode(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attr.c
57
user_password_decode(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attrset.c
170
append_attr(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/attrset.c
178
retval = kr_attr_encode(ctx, secret, auth, type, data, buffer, &attrlen);
crypto/krb5/src/lib/krad/attrset.c
194
kr_attrset_encode(const krad_attrset *set, const char *secret,
crypto/krb5/src/lib/krad/attrset.c
213
retval = append_attr(set->ctx, secret, auth,
crypto/krb5/src/lib/krad/attrset.c
221
retval = append_attr(set->ctx, secret, auth, a->type, &a->attr,
crypto/krb5/src/lib/krad/attrset.c
232
kr_attrset_decode(krb5_context ctx, const krb5_data *in, const char *secret,
crypto/krb5/src/lib/krad/attrset.c
257
retval = kr_attr_decode(ctx, secret, auth, type, &tmp, buffer, &len);
crypto/krb5/src/lib/krad/client.c
119
const struct addrinfo *ai, const char *secret, int timeout,
crypto/krb5/src/lib/krad/client.c
158
retval = get_server(rc, tmp, secret, &rqst->remotes[i++].remote);
crypto/krb5/src/lib/krad/client.c
282
const char *remote, const char *secret, int timeout,
crypto/krb5/src/lib/krad/client.c
299
retval = request_new(rc, code, attrs, &usock, secret, timeout, retries,
crypto/krb5/src/lib/krad/client.c
304
retval = request_new(rc, code, attrs, ai, secret, timeout, retries,
crypto/krb5/src/lib/krad/client.c
79
get_server(krad_client *rc, const struct addrinfo *ai, const char *secret,
crypto/krb5/src/lib/krad/client.c
86
if (kr_remote_equals(srv->serv, ai, secret)) {
crypto/krb5/src/lib/krad/client.c
96
retval = kr_remote_new(rc->kctx, rc->vctx, ai, secret, &srv->serv);
crypto/krb5/src/lib/krad/internal.h
123
const char *secret);
crypto/krb5/src/lib/krad/internal.h
60
kr_attr_encode(krb5_context ctx, const char *secret, const unsigned char *auth,
crypto/krb5/src/lib/krad/internal.h
66
kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
crypto/krb5/src/lib/krad/internal.h
73
kr_attrset_encode(const krad_attrset *set, const char *secret,
crypto/krb5/src/lib/krad/internal.h
79
kr_attrset_decode(krb5_context ctx, const krb5_data *in, const char *secret,
crypto/krb5/src/lib/krad/internal.h
86
const char *secret, krad_remote **rr);
crypto/krb5/src/lib/krad/packet.c
171
auth_generate_response(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/packet.c
180
retval = alloc_data(&data, response->pkt.length + strlen(secret));
crypto/krb5/src/lib/krad/packet.c
188
memcpy(data.data + response->pkt.length, secret, strlen(secret));
crypto/krb5/src/lib/krad/packet.c
218
packet_set_attrset(krb5_context ctx, const char *secret, krad_packet *pkt)
crypto/krb5/src/lib/krad/packet.c
223
return kr_attrset_decode(ctx, &tmp, secret, pkt_auth(pkt), &pkt->attrset);
crypto/krb5/src/lib/krad/packet.c
228
requires_msgauth(const char *secret, krad_code code)
crypto/krb5/src/lib/krad/packet.c
232
if (*secret == '\0')
crypto/krb5/src/lib/krad/packet.c
278
calculate_mac(const char *secret, const krad_packet *pkt,
crypto/krb5/src/lib/krad/packet.c
317
ksecr = string2data((char *)secret);
crypto/krb5/src/lib/krad/packet.c
346
krad_packet_new_request(krb5_context ctx, const char *secret, krad_code code,
crypto/krb5/src/lib/krad/packet.c
375
msgauth_required = (*secret != '\0' && code == KRAD_CODE_ACCESS_REQUEST);
crypto/krb5/src/lib/krad/packet.c
378
retval = kr_attrset_encode(set, secret, pkt_auth(pkt), msgauth_required,
crypto/krb5/src/lib/krad/packet.c
390
retval = calculate_mac(secret, pkt, pkt_auth(pkt), pkt_attr(pkt) + 2);
crypto/krb5/src/lib/krad/packet.c
396
retval = packet_set_attrset(ctx, secret, pkt);
crypto/krb5/src/lib/krad/packet.c
410
krad_packet_new_response(krb5_context ctx, const char *secret, krad_code code,
crypto/krb5/src/lib/krad/packet.c
424
msgauth_required = requires_msgauth(secret, code);
crypto/krb5/src/lib/krad/packet.c
427
retval = kr_attrset_encode(set, secret, pkt_auth(request),
crypto/krb5/src/lib/krad/packet.c
439
retval = auth_generate_response(ctx, secret, pkt, pkt_auth(request),
crypto/krb5/src/lib/krad/packet.c
450
retval = calculate_mac(secret, pkt, pkt_auth(request),
crypto/krb5/src/lib/krad/packet.c
457
retval = packet_set_attrset(ctx, secret, pkt);
crypto/krb5/src/lib/krad/packet.c
472
verify_msgauth(const char *secret, const krad_packet *pkt,
crypto/krb5/src/lib/krad/packet.c
486
retval = calculate_mac(secret, pkt, auth, mac);
crypto/krb5/src/lib/krad/packet.c
501
decode_packet(krb5_context ctx, const char *secret, const krb5_data *buffer,
crypto/krb5/src/lib/krad/packet.c
531
retval = packet_set_attrset(ctx, secret, tmp);
crypto/krb5/src/lib/krad/packet.c
544
krad_packet_decode_request(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/packet.c
553
retval = decode_packet(ctx, secret, buffer, &req);
crypto/krb5/src/lib/krad/packet.c
559
retval = verify_msgauth(secret, req, pkt_auth(req));
crypto/krb5/src/lib/krad/packet.c
582
krad_packet_decode_response(krb5_context ctx, const char *secret,
crypto/krb5/src/lib/krad/packet.c
591
retval = decode_packet(ctx, secret, buffer, rsppkt);
crypto/krb5/src/lib/krad/packet.c
598
retval = auth_generate_response(ctx, secret, *rsppkt,
crypto/krb5/src/lib/krad/packet.c
611
if (verify_msgauth(secret, *rsppkt, pkt_auth(tmp)) != 0)
crypto/krb5/src/lib/krad/remote.c
351
retval = krad_packet_decode_response(rr->kctx, rr->secret, &rr->buffer,
crypto/krb5/src/lib/krad/remote.c
387
const char *secret, krad_remote **rr)
crypto/krb5/src/lib/krad/remote.c
401
tmp->secret = strdup(secret);
crypto/krb5/src/lib/krad/remote.c
402
if (tmp->secret == NULL)
crypto/krb5/src/lib/krad/remote.c
437
free(rr->secret);
crypto/krb5/src/lib/krad/remote.c
458
retval = krad_packet_new_request(rr->kctx, rr->secret, code, attrs,
crypto/krb5/src/lib/krad/remote.c
505
const char *secret)
crypto/krb5/src/lib/krad/remote.c
509
if (strcmp(rr->secret, secret) != 0)
crypto/krb5/src/lib/krad/remote.c
64
char *secret;
crypto/krb5/src/lib/krad/t_attr.c
47
const char *secret = "foo";
crypto/krb5/src/lib/krad/t_attr.c
66
noerror(kr_attr_decode(ctx, secret, auth, KRAD_ATTR_USER_PASSWORD,
crypto/krb5/src/lib/krad/t_attr.c
73
retval = kr_attr_encode(ctx, secret, auth, KRAD_ATTR_USER_PASSWORD,
crypto/krb5/src/lib/krad/t_packet.c
113
do_auth(krb5_context ctx, struct addrinfo *ai, const char *secret,
crypto/krb5/src/lib/krad/t_packet.c
147
retval = krad_packet_decode_response(ctx, secret, &response, iterator, &i,
crypto/krb5/src/plugins/preauth/otp/otp_state.c
124
*secret = k5memdup0(&buf[i], j - i, &retval);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
140
free(type->secret);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
148
char *name = NULL, *server = NULL, *secret = NULL;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
157
secret = strdup("");
crypto/krb5/src/plugins/preauth/otp/otp_state.c
158
if (secret == NULL)
crypto/krb5/src/plugins/preauth/otp/otp_state.c
163
out->secret = secret;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
172
free(secret);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
180
char *server = NULL, *name_copy = NULL, *secret = NULL, *pstr = NULL;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
220
retval = read_secret_file(pstr, &secret);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
232
secret = strdup("");
crypto/krb5/src/plugins/preauth/otp/otp_state.c
233
if (secret == NULL) {
crypto/krb5/src/plugins/preauth/otp/otp_state.c
265
out->secret = secret;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
270
name_copy = server = secret = NULL;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
276
free(secret);
crypto/krb5/src/plugins/preauth/otp/otp_state.c
51
char *secret;
crypto/krb5/src/plugins/preauth/otp/otp_state.c
672
req->attrs, t->server, t->secret, t->timeout,
crypto/krb5/src/plugins/preauth/otp/otp_state.c
83
read_secret_file(const char *secret_file, char **secret)
crypto/krb5/src/plugins/preauth/otp/otp_state.c
91
*secret = NULL;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_clnt.c
515
krb5_data secret;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_clnt.c
616
secret = make_data(client_key, client_key_len);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_clnt.c
617
retval = pkinit_kdf(context, &secret, kdc_reply->u.dh_Info.kdfID,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto.h
539
pkinit_kdf(krb5_context context, krb5_data *secret, const krb5_data *alg_oid,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2576
const krb5_data *secret, krb5_keyblock *key_block)
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2586
buf = k5alloc(secret->length, &retval);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2601
!EVP_DigestUpdate(sha1_ctx, secret->data, secret->length) ||
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2607
if (secret->length - offset < sizeof(md))
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2608
memcpy(buf + offset, md, secret->length - offset);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2614
} while (offset < secret->length);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2667
openssl_sskdf(krb5_context context, const EVP_MD *md, const krb5_data *secret,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2695
secret->data, secret->length);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2717
builtin_sskdf(krb5_context context, const EVP_MD *md, const krb5_data *secret,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2759
!EVP_DigestUpdate(ctx, secret->data, secret->length) ||
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2784
pkinit_kdf(krb5_context context, krb5_data *secret, const krb5_data *alg_oid,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2801
return octetstring2key(context, enctype, secret, key_block);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
2850
ret = sskdf(context, md, secret, other_info, rand_len, &random_data);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
129
retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
157
retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
185
retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
207
free(secret.data);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
72
krb5_data secret;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
92
if (NULL == (secret.data = malloc(secret_len))) {
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
97
secret.length = secret_len;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_kdf_test.c
98
memset(secret.data, 0, secret_len);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_srv.c
752
krb5_data secret;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_srv.c
879
secret = make_data(server_key, server_key_len);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_srv.c
880
retval = pkinit_kdf(context, &secret, rep->u.dh_Info.kdfID,
crypto/libecc/src/examples/sss/sss.c
125
ATTRIBUTE_WARN_UNUSED_RET static int _sss_raw_generate(sss_share *shares, u16 k, u16 n, sss_secret *secret, boolean input_secret)
crypto/libecc/src/examples/sss/sss.c
142
MUST_HAVE((shares != NULL) && (secret != NULL), ret, err);
crypto/libecc/src/examples/sss/sss.c
181
ret = fp_import_from_buf(&a0, secret->secret, SSS_SECRET_SIZE); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
260
ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &a0);
crypto/libecc/src/examples/sss/sss.c
289
ATTRIBUTE_WARN_UNUSED_RET static int _sss_raw_lagrange(const sss_share *shares, u16 k, sss_secret *secret, u16 val)
crypto/libecc/src/examples/sss/sss.c
302
MUST_HAVE((shares != NULL) && (secret != NULL), ret, err);
crypto/libecc/src/examples/sss/sss.c
387
ret = fp_export_to_buf(secret->secret, SSS_SECRET_SIZE, &y);
crypto/libecc/src/examples/sss/sss.c
410
ATTRIBUTE_WARN_UNUSED_RET static int _sss_raw_combine(const sss_share *shares, u16 k, sss_secret *secret)
crypto/libecc/src/examples/sss/sss.c
412
return _sss_raw_lagrange(shares, k, secret, 0);
crypto/libecc/src/examples/sss/sss.c
426
int sss_generate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret, boolean input_secret)
crypto/libecc/src/examples/sss/sss.c
436
ret = _sss_raw_generate(shares, k, n, secret, input_secret); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
460
ret = hmac_scattered((const u8*)secret, SSS_SECRET_SIZE, SHA256, inputs, ilens, cur_share_hmac, &len); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
476
int sss_combine(const sss_share *shares, unsigned short k, sss_secret *secret)
crypto/libecc/src/examples/sss/sss.c
486
ret = _sss_raw_combine(shares, k, secret); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
511
ret = hmac_scattered((const u8*)secret, SSS_SECRET_SIZE, SHA256, inputs, ilens, hmac_val, &len); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
540
int sss_regenerate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret)
crypto/libecc/src/examples/sss/sss.c
555
ret = _sss_raw_lagrange(shares, k, secret, 0); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
582
ret = hmac_scattered((const u8*)secret, SSS_SECRET_SIZE, SHA256, inputs, ilens, hmac_val, &len); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
635
ret = hmac_scattered((const u8*)secret, SSS_SECRET_SIZE, SHA256, inputs, ilens, cur_share_hmac, &len); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
661
sss_secret secret;
crypto/libecc/src/examples/sss/sss.c
668
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
670
ret = sss_generate(shares, K, N, &secret, SSS_FALSE);
crypto/libecc/src/examples/sss/sss.c
676
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
685
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
686
ret = sss_combine(shares_, K - 1, &secret);
crypto/libecc/src/examples/sss/sss.c
690
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
697
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
698
ret = sss_combine(shares_, K, &secret);
crypto/libecc/src/examples/sss/sss.c
703
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
710
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
711
ret = sss_combine(shares_, K + 1, &secret);
crypto/libecc/src/examples/sss/sss.c
716
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
721
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
723
ret = sss_combine(shares_, K + 1, &secret);
crypto/libecc/src/examples/sss/sss.c
727
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
732
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
733
ret = sss_regenerate(shares, K, MAX_N, &secret); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
738
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
747
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
748
ret = sss_combine(shares_, K, &secret);
crypto/libecc/src/examples/sss/sss.c
753
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.c
758
ret = local_memset(&secret, 0x00, sizeof(secret)); EG(ret, err);
crypto/libecc/src/examples/sss/sss.c
760
ret = sss_combine(shares_, K, &secret);
crypto/libecc/src/examples/sss/sss.c
764
buf_print(" secret", (u8*)&secret, SSS_SECRET_SIZE);
crypto/libecc/src/examples/sss/sss.h
44
unsigned char secret[SSS_SECRET_SIZE];
crypto/libecc/src/examples/sss/sss.h
75
ATTRIBUTE_WARN_UNUSED_RET int sss_generate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret, boolean input_secret);
crypto/libecc/src/examples/sss/sss.h
84
ATTRIBUTE_WARN_UNUSED_RET int sss_combine(const sss_share *shares, unsigned short k, sss_secret *secret);
crypto/libecc/src/examples/sss/sss.h
96
ATTRIBUTE_WARN_UNUSED_RET int sss_regenerate(sss_share *shares, unsigned short k, unsigned short n, sss_secret *secret);
crypto/openssh/regress/misc/fuzz-harness/mkcorpus_sntrup761.c
60
unsigned char secret[crypto_kem_sntrup761_BYTES];
crypto/openssh/regress/misc/fuzz-harness/mkcorpus_sntrup761.c
73
if (crypto_kem_sntrup761_enc(ciphertext, secret, pk) != 0)
crypto/openssh/regress/misc/fuzz-harness/sntrup761_dec_fuzz.cc
56
unsigned char secret[crypto_kem_sntrup761_BYTES];
crypto/openssh/regress/misc/fuzz-harness/sntrup761_dec_fuzz.cc
69
(void)crypto_kem_sntrup761_dec(secret, ciphertext, zero_sk);
crypto/openssh/regress/misc/fuzz-harness/sntrup761_dec_fuzz.cc
70
(void)crypto_kem_sntrup761_dec(secret, ciphertext, rnd_sk);
crypto/openssh/regress/misc/fuzz-harness/sntrup761_enc_fuzz.cc
42
unsigned char secret[crypto_kem_sntrup761_BYTES];
crypto/openssh/regress/misc/fuzz-harness/sntrup761_enc_fuzz.cc
51
(void)crypto_kem_sntrup761_enc(ciphertext, secret, pk);
crypto/openssh/regress/misc/fuzz-harness/sntrup761_enc_fuzz.cc
53
(void)crypto_kem_sntrup761_enc(ciphertext, secret, pk);
crypto/openssl/apps/pkeyutl.c
159
unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL, *secret = NULL;
crypto/openssl/apps/pkeyutl.c
39
unsigned char *secret, size_t *psecretlen);
crypto/openssl/apps/pkeyutl.c
590
secret = app_malloc(secretlen, "secret output");
crypto/openssl/apps/pkeyutl.c
593
buf_in, buf_inlen, secret, &secretlen);
crypto/openssl/apps/pkeyutl.c
616
BIO_write(secout ? secout : out, secret, secretlen);
crypto/openssl/apps/pkeyutl.c
632
OPENSSL_free(secret);
crypto/openssl/apps/pkeyutl.c
820
unsigned char *secret, size_t *pseclen)
crypto/openssl/apps/pkeyutl.c
846
rv = EVP_PKEY_encapsulate(ctx, out, poutlen, secret, pseclen);
crypto/openssl/apps/pkeyutl.c
850
rv = EVP_PKEY_decapsulate(ctx, secret, pseclen, in, inlen);
crypto/openssl/apps/speed.c
1516
unsigned char *secret = tempargs->kem_send_secret[testnum];
crypto/openssl/apps/speed.c
1520
if (EVP_PKEY_encapsulate(ctx, out, &out_len, secret, &secret_len) <= 0)
crypto/openssl/apps/speed.c
1533
unsigned char *secret = tempargs->kem_send_secret[testnum];
crypto/openssl/apps/speed.c
1537
if (EVP_PKEY_decapsulate(ctx, secret, &secret_len, out, out_len) <= 0)
crypto/openssl/crypto/cms/cms_env.c
255
ASN1_OCTET_STRING *secret, unsigned int flags,
crypto/openssl/crypto/cms/cms_env.c
272
if (secret != NULL
crypto/openssl/crypto/cms/cms_env.c
273
&& CMS_decrypt_set1_password(ci, (unsigned char *)ASN1_STRING_get0_data(secret),
crypto/openssl/crypto/cms/cms_env.c
274
ASN1_STRING_length(secret))
crypto/openssl/crypto/cms/cms_env.c
277
res = CMS_decrypt(ci, secret == NULL ? pkey : NULL,
crypto/openssl/crypto/cms/cms_env.c
278
secret == NULL ? cert : NULL, detached_data, bio, flags);
crypto/openssl/crypto/crmf/crmf_lib.c
668
X509 *cert, ASN1_OCTET_STRING *secret,
crypto/openssl/crypto/crmf/crmf_lib.c
703
NULL, pkey, cert, secret, 0,
crypto/openssl/crypto/crmf/crmf_lib.c
753
((void)ts, (void)extra, (void)cert, (void)secret);
crypto/openssl/crypto/ec/ecx_key.c
111
unsigned char *secret, size_t *secretlen, size_t outlen)
crypto/openssl/crypto/ec/ecx_key.c
126
if (secret == NULL) {
crypto/openssl/crypto/ec/ecx_key.c
139
if (s390x_x25519_mul(secret, peer->pubkey, priv->privkey) == 0) {
crypto/openssl/crypto/ec/ecx_key.c
145
if (ossl_x25519(secret, priv->privkey, peer->pubkey) == 0) {
crypto/openssl/crypto/ec/ecx_key.c
153
if (s390x_x448_mul(secret, peer->pubkey, priv->privkey) == 0) {
crypto/openssl/crypto/ec/ecx_key.c
159
if (ossl_x448(secret, priv->privkey, peer->pubkey) == 0) {
crypto/openssl/crypto/evp/kem.c
226
unsigned char *secret, size_t *secretlen)
crypto/openssl/crypto/evp/kem.c
241
if (out != NULL && secret == NULL)
crypto/openssl/crypto/evp/kem.c
245
out, outlen, secret, secretlen);
crypto/openssl/crypto/evp/kem.c
262
unsigned char *secret, size_t *secretlen,
crypto/openssl/crypto/evp/kem.c
267
|| (secret == NULL && secretlen == NULL))
crypto/openssl/crypto/evp/kem.c
280
secret, secretlen, in, inlen);
crypto/openssl/crypto/hpke/hpke.c
1247
unsigned char *secret, size_t secretlen,
crypto/openssl/crypto/hpke/hpke.c
1256
if (ctx == NULL || secret == NULL || secretlen == 0) {
crypto/openssl/crypto/hpke/hpke.c
1290
erv = ossl_hpke_labeled_expand(kctx, secret, secretlen,
crypto/openssl/crypto/hpke/hpke.c
663
unsigned char secret[OSSL_HPKE_MAXSIZE];
crypto/openssl/crypto/hpke/hpke.c
743
if (ossl_hpke_labeled_extract(kctx, secret, secretlen,
crypto/openssl/crypto/hpke/hpke.c
760
secret, secretlen, OSSL_HPKE_SEC51LABEL,
crypto/openssl/crypto/hpke/hpke.c
773
secret, secretlen, OSSL_HPKE_SEC51LABEL,
crypto/openssl/crypto/hpke/hpke.c
787
secret, secretlen, OSSL_HPKE_SEC51LABEL,
crypto/openssl/crypto/hpke/hpke.c
799
OPENSSL_cleanse(secret, OSSL_HPKE_MAXSIZE);
crypto/openssl/crypto/ml_kem/ml_kem.c
1758
static int encap(uint8_t *ctext, uint8_t secret[ML_KEM_SHARED_SECRET_BYTES],
crypto/openssl/crypto/ml_kem/ml_kem.c
1774
memcpy(secret, Kr, ML_KEM_SHARED_SECRET_BYTES);
crypto/openssl/crypto/ml_kem/ml_kem.c
1793
static int decap(uint8_t secret[ML_KEM_SHARED_SECRET_BYTES],
crypto/openssl/crypto/ml_kem/ml_kem.c
1831
memcpy(secret, failure_key, ML_KEM_SHARED_SECRET_BYTES);
crypto/openssl/crypto/ml_kem/ml_kem.c
1838
secret[i] = constant_time_select_8(mask, Kr[i], failure_key[i]);
crypto/openssl/demos/kdf/argon2.c
126
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET, secret, sizeof(secret));
crypto/openssl/demos/kdf/argon2.c
49
static unsigned char secret[] = {
crypto/openssl/demos/keyexch/ecdh.c
109
unsigned char *secret = NULL;
crypto/openssl/demos/keyexch/ecdh.c
152
secret = (unsigned char *)OPENSSL_malloc(secretlen);
crypto/openssl/demos/keyexch/ecdh.c
153
if (secret == NULL)
crypto/openssl/demos/keyexch/ecdh.c
161
if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0)
crypto/openssl/demos/keyexch/ecdh.c
163
peerA->secret = secret;
crypto/openssl/demos/keyexch/ecdh.c
167
BIO_dump_indent_fp(stdout, peerA->secret, peerA->secretlen, 2);
crypto/openssl/demos/keyexch/ecdh.c
172
OPENSSL_free(secret);
crypto/openssl/demos/keyexch/ecdh.c
208
|| CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secretlen) != 0) {
crypto/openssl/demos/keyexch/ecdh.c
32
unsigned char *secret; /* allocated shared secret buffer */
crypto/openssl/demos/keyexch/x25519.c
127
local_peer->secret = NULL;
crypto/openssl/demos/keyexch/x25519.c
173
local_peer->secret = OPENSSL_malloc(local_peer->secret_len);
crypto/openssl/demos/keyexch/x25519.c
174
if (local_peer->secret == NULL) {
crypto/openssl/demos/keyexch/x25519.c
180
if (EVP_PKEY_derive(ctx, local_peer->secret,
crypto/openssl/demos/keyexch/x25519.c
188
BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2);
crypto/openssl/demos/keyexch/x25519.c
196
OPENSSL_clear_free(local_peer->secret, local_peer->secret_len);
crypto/openssl/demos/keyexch/x25519.c
197
local_peer->secret = NULL;
crypto/openssl/demos/keyexch/x25519.c
243
if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) {
crypto/openssl/demos/keyexch/x25519.c
249
if (use_kat && CRYPTO_memcmp(peer1.secret, expected_result, peer1.secret_len) != 0) {
crypto/openssl/demos/keyexch/x25519.c
257
OPENSSL_clear_free(peer1.secret, peer1.secret_len);
crypto/openssl/demos/keyexch/x25519.c
258
OPENSSL_clear_free(peer2.secret, peer2.secret_len);
crypto/openssl/demos/keyexch/x25519.c
55
unsigned char *secret; /* allocated shared secret buffer */
crypto/openssl/include/crypto/ecx.h
85
unsigned char *secret, size_t *secretlen,
crypto/openssl/include/internal/quic_record_rx.h
167
const unsigned char *secret,
crypto/openssl/include/internal/quic_record_tx.h
118
const unsigned char *secret,
crypto/openssl/include/internal/quic_tls.h
51
const unsigned char *secret, size_t secret_len,
crypto/openssl/include/internal/recordmethod.h
118
unsigned char *secret,
crypto/openssl/include/openssl/cms.h
315
ASN1_OCTET_STRING *secret, unsigned int flags,
crypto/openssl/include/openssl/core_dispatch.h
272
const unsigned char *secret, size_t secret_len, void *arg))
crypto/openssl/include/openssl/core_dispatch.h
725
OSSL_CORE_MAKE_FUNC(int, keyexch_derive, (void *ctx, unsigned char *secret, size_t *secretlen, size_t outlen))
crypto/openssl/include/openssl/core_dispatch.h
930
OSSL_CORE_MAKE_FUNC(int, kem_encapsulate, (void *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen))
crypto/openssl/include/openssl/crmf.h
268
X509 *cert, ASN1_OCTET_STRING *secret,
crypto/openssl/include/openssl/hpke.h
135
unsigned char *secret,
crypto/openssl/include/openssl/ssl.h
280
typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len,
crypto/openssl/providers/fips/self_test_kats.c
406
unsigned char secret[256];
crypto/openssl/providers/fips/self_test_kats.c
411
if (secret_len > sizeof(secret))
crypto/openssl/providers/fips/self_test_kats.c
439
|| EVP_PKEY_derive(dctx, secret, &secret_len) <= 0)
crypto/openssl/providers/fips/self_test_kats.c
442
OSSL_SELF_TEST_oncorrupt_byte(st, secret);
crypto/openssl/providers/fips/self_test_kats.c
445
|| memcmp(secret, t->expected, t->expected_len) != 0)
crypto/openssl/providers/fips/self_test_kats.c
665
unsigned char *wrapped = NULL, *secret = NULL;
crypto/openssl/providers/fips/self_test_kats.c
684
secret = OPENSSL_malloc(secretlen);
crypto/openssl/providers/fips/self_test_kats.c
685
if (wrapped == NULL || secret == NULL)
crypto/openssl/providers/fips/self_test_kats.c
689
if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0)
crypto/openssl/providers/fips/self_test_kats.c
698
OSSL_SELF_TEST_oncorrupt_byte(st, secret);
crypto/openssl/providers/fips/self_test_kats.c
700
|| memcmp(secret, t->secret, t->secret_len) != 0)
crypto/openssl/providers/fips/self_test_kats.c
706
OPENSSL_free(secret);
crypto/openssl/providers/fips/self_test_kats.c
722
unsigned char *secret = NULL, *alloced = NULL;
crypto/openssl/providers/fips/self_test_kats.c
723
const unsigned char *test_secret = t->secret;
crypto/openssl/providers/fips/self_test_kats.c
746
secret = OPENSSL_malloc(secretlen);
crypto/openssl/providers/fips/self_test_kats.c
747
if (secret == NULL)
crypto/openssl/providers/fips/self_test_kats.c
751
if (EVP_PKEY_decapsulate(ctx, secret, &secretlen,
crypto/openssl/providers/fips/self_test_kats.c
757
OSSL_SELF_TEST_oncorrupt_byte(st, secret);
crypto/openssl/providers/fips/self_test_kats.c
759
|| memcmp(secret, test_secret, t->secret_len) != 0)
crypto/openssl/providers/fips/self_test_kats.c
765
OPENSSL_free(secret);
crypto/openssl/providers/implementations/exchange/dh_exch.c
176
unsigned char *secret, size_t *secretlen,
crypto/openssl/providers/implementations/exchange/dh_exch.c
190
if (secret == NULL) {
crypto/openssl/providers/implementations/exchange/dh_exch.c
201
ret = DH_compute_key_padded(secret, pub_key, pdhctx->dh);
crypto/openssl/providers/implementations/exchange/dh_exch.c
203
ret = DH_compute_key(secret, pub_key, pdhctx->dh);
crypto/openssl/providers/implementations/exchange/dh_exch.c
211
static int dh_X9_42_kdf_derive(void *vpdhctx, unsigned char *secret,
crypto/openssl/providers/implementations/exchange/dh_exch.c
219
if (secret == NULL) {
crypto/openssl/providers/implementations/exchange/dh_exch.c
237
if (!ossl_dh_kdf_X9_42_asn1(secret, pdhctx->kdf_outlen,
crypto/openssl/providers/implementations/exchange/dh_exch.c
253
static int dh_derive(void *vpdhctx, unsigned char *secret,
crypto/openssl/providers/implementations/exchange/dh_exch.c
263
return dh_plain_derive(pdhctx, secret, psecretlen, outlen,
crypto/openssl/providers/implementations/exchange/dh_exch.c
266
return dh_X9_42_kdf_derive(pdhctx, secret, psecretlen, outlen);
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
460
static ossl_inline int ecdh_plain_derive(void *vpecdhctx, unsigned char *secret,
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
482
if (secret == NULL) {
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
550
retlen = ECDH_compute_key(secret, size, ppubkey, privk, NULL);
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
564
static ossl_inline int ecdh_X9_63_kdf_derive(void *vpecdhctx, unsigned char *secret,
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
572
if (secret == NULL) {
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
589
if (!ossl_ecdh_kdf_X9_63(secret, pecdhctx->kdf_outlen,
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
604
static int ecdh_derive(void *vpecdhctx, unsigned char *secret,
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
611
return ecdh_plain_derive(vpecdhctx, secret, psecretlen, outlen);
crypto/openssl/providers/implementations/exchange/ecdh_exch.c
613
return ecdh_X9_63_kdf_derive(vpecdhctx, secret, psecretlen, outlen);
crypto/openssl/providers/implementations/exchange/ecx_exch.c
130
static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen,
crypto/openssl/providers/implementations/exchange/ecx_exch.c
138
secret, secretlen, outlen);
crypto/openssl/providers/implementations/exchange/kdf_exch.c
110
if (secret == NULL) {
crypto/openssl/providers/implementations/exchange/kdf_exch.c
123
ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL);
crypto/openssl/providers/implementations/exchange/kdf_exch.c
98
static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen,
crypto/openssl/providers/implementations/kdfs/argon2.c
1135
if (ctx->secret != NULL)
crypto/openssl/providers/implementations/kdfs/argon2.c
1136
OPENSSL_clear_free(ctx->secret, ctx->secretlen);
crypto/openssl/providers/implementations/kdfs/argon2.c
1235
if (ctx->secret != NULL) {
crypto/openssl/providers/implementations/kdfs/argon2.c
1236
OPENSSL_clear_free(ctx->secret, ctx->secretlen);
crypto/openssl/providers/implementations/kdfs/argon2.c
1237
ctx->secret = NULL;
crypto/openssl/providers/implementations/kdfs/argon2.c
1241
if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->secret, 0, &buflen))
crypto/openssl/providers/implementations/kdfs/argon2.c
1245
OPENSSL_free(ctx->secret);
crypto/openssl/providers/implementations/kdfs/argon2.c
1246
ctx->secret = NULL;
crypto/openssl/providers/implementations/kdfs/argon2.c
162
uint8_t *secret;
crypto/openssl/providers/implementations/kdfs/argon2.c
695
if (ctx->secret != NULL) {
crypto/openssl/providers/implementations/kdfs/argon2.c
696
if (EVP_DigestUpdate(mdctx, ctx->secret, ctx->secretlen) != 1)
crypto/openssl/providers/implementations/kdfs/argon2.c
699
OPENSSL_cleanse(ctx->secret, ctx->secretlen);
crypto/openssl/providers/implementations/kdfs/argon2.c
994
if (ctx->secret != NULL)
crypto/openssl/providers/implementations/kdfs/argon2.c
995
OPENSSL_clear_free(ctx->secret, ctx->secretlen);
crypto/openssl/providers/implementations/kdfs/sskdf.c
330
OPENSSL_clear_free(ctx->secret, ctx->secret_len);
crypto/openssl/providers/implementations/kdfs/sskdf.c
363
|| !ossl_prov_memdup(src->secret, src->secret_len,
crypto/openssl/providers/implementations/kdfs/sskdf.c
364
&dest->secret, &dest->secret_len)
crypto/openssl/providers/implementations/kdfs/sskdf.c
421
if (ctx->secret == NULL) {
crypto/openssl/providers/implementations/kdfs/sskdf.c
467
ctx->secret, ctx->secret_len,
crypto/openssl/providers/implementations/kdfs/sskdf.c
476
return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len,
crypto/openssl/providers/implementations/kdfs/sskdf.c
531
if (ctx->secret == NULL) {
crypto/openssl/providers/implementations/kdfs/sskdf.c
548
return SSKDF_hash_kdm(md, ctx->secret, ctx->secret_len,
crypto/openssl/providers/implementations/kdfs/sskdf.c
587
&ctx->secret, &ctx->secret_len);
crypto/openssl/providers/implementations/kdfs/sskdf.c
590
&ctx->secret, &ctx->secret_len);
crypto/openssl/providers/implementations/kdfs/sskdf.c
60
unsigned char *secret;
crypto/openssl/providers/implementations/kdfs/x942kdf.c
356
OPENSSL_clear_free(ctx->secret, ctx->secret_len);
crypto/openssl/providers/implementations/kdfs/x942kdf.c
384
if (!ossl_prov_memdup(src->secret, src->secret_len,
crypto/openssl/providers/implementations/kdfs/x942kdf.c
385
&dest->secret, &dest->secret_len)
crypto/openssl/providers/implementations/kdfs/x942kdf.c
43
unsigned char *secret;
crypto/openssl/providers/implementations/kdfs/x942kdf.c
488
if (ctx->secret == NULL) {
crypto/openssl/providers/implementations/kdfs/x942kdf.c
521
ret = x942kdf_hash_kdm(md, ctx->secret, ctx->secret_len,
crypto/openssl/providers/implementations/kdfs/x942kdf.c
557
if (!x942kdf_set_buffer(&ctx->secret, &ctx->secret_len, p))
crypto/openssl/providers/implementations/kem/ec_kem.c
562
static int derive_secret(PROV_EC_CTX *ctx, unsigned char *secret,
crypto/openssl/providers/implementations/kem/ec_kem.c
615
if (!dhkem_extract_and_expand(kdfctx, secret, info->Nsecret,
crypto/openssl/providers/implementations/kem/ec_kem.c
646
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/ec_kem.c
690
if (!derive_secret(ctx, secret,
crypto/openssl/providers/implementations/kem/ec_kem.c
723
unsigned char *secret, size_t *secretlen,
crypto/openssl/providers/implementations/kem/ec_kem.c
733
if (secret == NULL) {
crypto/openssl/providers/implementations/kem/ec_kem.c
758
if (!derive_secret(ctx, secret,
crypto/openssl/providers/implementations/kem/ec_kem.c
771
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/ec_kem.c
777
return dhkem_encap(ctx, out, outlen, secret, secretlen);
crypto/openssl/providers/implementations/kem/ecx_kem.c
472
static int derive_secret(PROV_ECX_CTX *ctx, unsigned char *secret,
crypto/openssl/providers/implementations/kem/ecx_kem.c
517
if (!dhkem_extract_and_expand(kdfctx, secret, info->Nsecret,
crypto/openssl/providers/implementations/kem/ecx_kem.c
548
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/ecx_kem.c
582
if (!derive_secret(ctx, secret,
crypto/openssl/providers/implementations/kem/ecx_kem.c
615
unsigned char *secret, size_t *secretlen,
crypto/openssl/providers/implementations/kem/ecx_kem.c
624
if (secret == NULL) {
crypto/openssl/providers/implementations/kem/ecx_kem.c
646
if (!derive_secret(ctx, secret,
crypto/openssl/providers/implementations/kem/ecx_kem.c
660
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/ecx_kem.c
666
return dhkem_encap(ctx, out, outlen, secret, secretlen);
crypto/openssl/providers/implementations/kem/rsa_kem.c
279
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/rsa_kem.c
315
if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen))
crypto/openssl/providers/implementations/kem/rsa_kem.c
319
ret = RSA_public_encrypt((int)nlen, secret, out, prsactx->rsa,
crypto/openssl/providers/implementations/kem/rsa_kem.c
322
OPENSSL_cleanse(secret, nlen);
crypto/openssl/providers/implementations/kem/rsa_kem.c
400
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/kem/rsa_kem.c
409
return rsasve_generate(prsactx, out, outlen, secret, secretlen);
crypto/openssl/providers/implementations/kem/template_kem.c
134
unsigned char *secret, size_t *secretlen)
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
117
secret, sizeof(secret), key);
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
121
secret, sizeof(secret),
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
134
if (operation_result != 1 || memcmp(out, secret, sizeof(out)) != 0)
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
74
unsigned char secret[ML_KEM_SHARED_SECRET_BYTES];
crypto/openssl/ssl/quic/quic_channel.c
1049
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_channel.c
1090
secret, secret_len))
crypto/openssl/ssl/quic/quic_channel.c
1118
secret, secret_len))
crypto/openssl/ssl/quic/quic_channel.c
70
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_record_rx.c
496
const unsigned char *secret, size_t secret_len)
crypto/openssl/ssl/quic/quic_record_rx.c
507
secret,
crypto/openssl/ssl/quic/quic_record_shared.c
105
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_record_shared.c
141
secret,
crypto/openssl/ssl/quic/quic_record_shared.c
151
secret,
crypto/openssl/ssl/quic/quic_record_shared.c
202
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_record_shared.c
267
secret,
crypto/openssl/ssl/quic/quic_record_shared.c
276
init_keyslot, secret, secret_len))
crypto/openssl/ssl/quic/quic_record_shared.c
285
secret,
crypto/openssl/ssl/quic/quic_record_shared.h
115
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_record_tx.c
184
const unsigned char *secret,
crypto/openssl/ssl/quic/quic_record_tx.c
196
secret,
crypto/openssl/ssl/quic/quic_tls.c
101
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/quic/quic_tls.c
187
(EVP_MD *)kdfdigest, secret, secretlen,
crypto/openssl/ssl/quic/quic_tls_api.c
48
const unsigned char *secret, size_t secret_len,
crypto/openssl/ssl/quic/quic_tls_api.c
57
secret, secret_len, sc->qtarg);
crypto/openssl/ssl/record/methods/dtls_meth.c
633
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/record/methods/ktls_meth.c
401
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/record/methods/tls_common.c
1399
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/record/rec_layer_s3.c
1245
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/record/rec_layer_s3.c
1423
secret, secretlen, key, keylen, iv,
crypto/openssl/ssl/record/record.h
176
unsigned char *secret, size_t secretlen,
crypto/openssl/ssl/ssl_lib.c
7030
const uint8_t *secret,
crypto/openssl/ssl/ssl_lib.c
7037
secret,
crypto/openssl/ssl/ssl_local.h
1213
const unsigned char *secret, size_t secret_len,
crypto/openssl/ssl/ssl_local.h
2783
const unsigned char *secret,
crypto/openssl/ssl/ssl_local.h
2789
const unsigned char *secret,
crypto/openssl/ssl/ssl_local.h
2795
const unsigned char *secret, unsigned char *key,
crypto/openssl/ssl/ssl_local.h
2798
const unsigned char *secret, unsigned char *iv,
crypto/openssl/ssl/ssl_local.h
2801
const unsigned char *secret,
crypto/openssl/ssl/ssl_local.h
2957
const uint8_t *secret, size_t secret_len);
crypto/openssl/ssl/tls13_enc.c
101
const unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
110
secret, label, labellen, data, datalen,
crypto/openssl/ssl/tls13_enc.c
123
const unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
129
return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1,
crypto/openssl/ssl/tls13_enc.c
138
const unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
144
return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1,
crypto/openssl/ssl/tls13_enc.c
149
const unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
155
return tls13_hkdf_expand(s, md, secret, finishedlabel,
crypto/openssl/ssl/tls13_enc.c
35
const unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
355
size_t labellen, unsigned char *secret,
crypto/openssl/ssl/tls13_enc.c
372
secret, hashlen, 1)) {
crypto/openssl/ssl/tls13_enc.c
440
if (!tls13_derive_key(s, md, secret, key, *keylen)
crypto/openssl/ssl/tls13_enc.c
441
|| !tls13_derive_iv(s, md, secret, *iv, *ivlen)) {
crypto/openssl/ssl/tls13_enc.c
495
unsigned char secret[EVP_MAX_MD_SIZE];
crypto/openssl/ssl/tls13_enc.c
696
insecret, hash, label, labellen, secret, key,
crypto/openssl/ssl/tls13_enc.c
703
memcpy(s->server_app_traffic_secret, secret, hashlen);
crypto/openssl/ssl/tls13_enc.c
720
memcpy(s->client_app_traffic_secret, secret, hashlen);
crypto/openssl/ssl/tls13_enc.c
722
if (!ssl_log_secret(s, log_label, secret, hashlen)) {
crypto/openssl/ssl/tls13_enc.c
728
&& !tls13_derive_finishedkey(s, ssl_handshake_md(s), secret,
crypto/openssl/ssl/tls13_enc.c
749
level, secret, hashlen, key, keylen, iv,
crypto/openssl/ssl/tls13_enc.c
765
OPENSSL_cleanse(secret, sizeof(secret));
crypto/openssl/ssl/tls13_enc.c
77
(unsigned char *)secret, hashlen);
crypto/openssl/ssl/tls13_enc.c
779
unsigned char secret[EVP_MAX_MD_SIZE];
crypto/openssl/ssl/tls13_enc.c
804
sizeof(application_traffic) - 1, secret, key,
crypto/openssl/ssl/tls13_enc.c
810
memcpy(insecret, secret, hashlen);
crypto/openssl/ssl/tls13_enc.c
824
if (!ssl_log_secret(s, log_label, secret, hashlen)) {
crypto/openssl/ssl/tls13_enc.c
831
OPENSSL_cleanse(secret, sizeof(secret));
crypto/openssl/test/cmp_msg_test.c
141
unsigned char secret[16];
crypto/openssl/test/cmp_msg_test.c
149
if (!TEST_int_eq(1, RAND_bytes_ex(libctx, secret, sizeof(secret), 0))
crypto/openssl/test/cmp_msg_test.c
152
|| !TEST_true(OSSL_CMP_CTX_set1_secretValue(ctx, secret,
crypto/openssl/test/cmp_msg_test.c
153
sizeof(secret)))) {
crypto/openssl/test/cmp_protect_test.c
285
static unsigned char secret[] = { 47, 11, 8, 15 };
crypto/openssl/test/cmp_protect_test.c
294
secret, sizeof(secret))
crypto/openssl/test/evp_extra_test.c
5933
unsigned char *secret = NULL;
crypto/openssl/test/evp_extra_test.c
5950
|| !TEST_ptr(secret = OPENSSL_malloc(secretlen)))
crypto/openssl/test/evp_extra_test.c
5953
if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, ct, &ctlen, secret, &secretlen), 0))
crypto/openssl/test/evp_extra_test.c
5959
OPENSSL_free(secret);
crypto/openssl/test/evp_extra_test2.c
1719
unsigned char *out = NULL, *secret = NULL, *secret2 = NULL;
crypto/openssl/test/evp_extra_test2.c
1738
secret = OPENSSL_malloc(secretlen);
crypto/openssl/test/evp_extra_test2.c
1740
if (out == NULL || secret == NULL || secret2 == NULL
crypto/openssl/test/evp_extra_test2.c
1741
|| !TEST_int_eq(EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen), 1)
crypto/openssl/test/evp_extra_test2.c
1744
|| !TEST_mem_eq(secret, secretlen, secret2, secretlen2))
crypto/openssl/test/evp_extra_test2.c
1750
OPENSSL_free(secret);
crypto/openssl/test/evp_kdf_test.c
36
static OSSL_PARAM *construct_tls1_prf_params(const char *digest, const char *secret,
crypto/openssl/test/evp_kdf_test.c
48
(unsigned char *)secret,
crypto/openssl/test/evp_kdf_test.c
49
strlen(secret));
crypto/openssl/test/evp_libctx_test.c
718
unsigned char secret[256] = {
crypto/openssl/test/evp_libctx_test.c
742
&& TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret,
crypto/openssl/test/evp_libctx_test.c
756
&& TEST_mem_eq(unwrap, unwraplen, secret, secretlen);
crypto/openssl/test/evp_libctx_test.c
761
if (!TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret,
crypto/openssl/test/evp_libctx_test.c
818
unsigned char secret[256] = {
crypto/openssl/test/evp_libctx_test.c
842
&& TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct,
crypto/openssl/test/evp_libctx_test.c
845
&& TEST_uchar_eq(secret[0], 0)
crypto/openssl/test/evp_libctx_test.c
848
&& (is_fips_lt_3_5 || (TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, &ctlen, NULL, &secretlen), 1) && TEST_true(ctlen <= sizeof(ct)) && TEST_true(secretlen <= sizeof(secret)) && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), 1)))
crypto/openssl/test/evp_libctx_test.c
857
&& TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, NULL), 1)
crypto/openssl/test/evp_libctx_test.c
861
&& TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, NULL, secret, &secretlen), 1)
crypto/openssl/test/evp_libctx_test.c
870
&& TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, NULL, secret, NULL), 1)
crypto/openssl/test/evp_libctx_test.c
874
&& TEST_int_eq(EVP_PKEY_decapsulate(privctx, secret, NULL, ct, sizeof(ct)), 1)
crypto/openssl/test/evp_libctx_test.c
879
&& TEST_int_eq(EVP_PKEY_decapsulate(privctx, secret, &secretlen, NULL, 0), 0)
crypto/openssl/test/evp_libctx_test.c
880
&& TEST_int_eq(EVP_PKEY_decapsulate(privctx, secret, &secretlen, NULL, sizeof(ct)), 0)
crypto/openssl/test/evp_libctx_test.c
881
&& TEST_int_eq(EVP_PKEY_decapsulate(privctx, secret, &secretlen, ct, 0), 0);
crypto/openssl/test/evp_pkey_dhkem_test.c
187
unsigned char secret[256];
crypto/openssl/test/evp_pkey_dhkem_test.c
189
size_t secretlen = sizeof(secret);
crypto/openssl/test/evp_pkey_dhkem_test.c
203
secret, &secretlen),
crypto/openssl/test/evp_pkey_dhkem_test.c
616
unsigned char secret[256];
crypto/openssl/test/evp_pkey_dhkem_test.c
618
size_t secretlen = sizeof(secret);
crypto/openssl/test/evp_pkey_dhkem_test.c
639
secret, &secretlen),
crypto/openssl/test/evp_pkey_dhkem_test.c
645
if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
crypto/openssl/test/evp_pkey_dhkem_test.c
665
unsigned char secret[256];
crypto/openssl/test/evp_pkey_dhkem_test.c
668
size_t secretlen = sizeof(secret);
crypto/openssl/test/evp_pkey_dhkem_test.c
684
secret, &secretlen),
crypto/openssl/test/evp_pkey_dhkem_test.c
689
|| !TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
crypto/openssl/test/evp_pkey_dhkem_test.c
707
unsigned char secret[256];
crypto/openssl/test/evp_pkey_dhkem_test.c
708
size_t secretlen = sizeof(secret);
crypto/openssl/test/evp_pkey_dhkem_test.c
715
&& TEST_int_eq(EVP_PKEY_decapsulate(ctx, secret, &secretlen,
crypto/openssl/test/evp_test.c
2221
unsigned char *wrapped = NULL, *secret = NULL;
crypto/openssl/test/evp_test.c
2258
secret = OPENSSL_malloc(secretlen);
crypto/openssl/test/evp_test.c
2259
if (!TEST_ptr(wrapped) || !TEST_ptr(secret)) {
crypto/openssl/test/evp_test.c
2263
if (EVP_PKEY_encapsulate(ctx, wrapped, &wrappedlen, secret, &secretlen) <= 0) {
crypto/openssl/test/evp_test.c
2276
&& !TEST_mem_eq(secret, secretlen, kdata->output, kdata->outputlen)) {
crypto/openssl/test/evp_test.c
2286
*outsecret = secret;
crypto/openssl/test/evp_test.c
2294
OPENSSL_free(secret);
crypto/openssl/test/evp_test.c
2361
unsigned char *wrapped = NULL, *secret = NULL;
crypto/openssl/test/evp_test.c
2404
&secret, &secretlen);
crypto/openssl/test/evp_test.c
2411
secret, secretlen);
crypto/openssl/test/evp_test.c
2423
OPENSSL_free(secret);
crypto/openssl/test/helpers/pkcs12.c
436
void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret,
crypto/openssl/test/helpers/pkcs12.c
444
TEST_info("Adding secret <%s>", secret);
crypto/openssl/test/helpers/pkcs12.c
446
bag = PKCS12_add_secret(&pb->bags, secret_nid, (const unsigned char *)secret, strlen(secret));
crypto/openssl/test/helpers/pkcs12.c
641
void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs)
crypto/openssl/test/helpers/pkcs12.c
657
|| !TEST_true(check_asn1_string(PKCS12_SAFEBAG_get0_bag_obj(bag), secret)))
crypto/openssl/test/helpers/pkcs12.h
80
void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret,
crypto/openssl/test/helpers/pkcs12.h
99
void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret,
crypto/openssl/test/quic_txp_test.c
316
#define OP_PROVIDE_SECRET(el, suite, secret) \
crypto/openssl/test/quic_txp_test.c
317
{ OPK_PROVIDE_SECRET, (el), (suite), (secret), sizeof(secret) },
crypto/openssl/test/sslapitest.c
10584
unsigned char *secret = secretin;
crypto/openssl/test/sslapitest.c
10588
secret[i] = 0xff;
crypto/openssl/test/sslapitest.c
12903
const unsigned char *secret, size_t secret_len,
crypto/openssl/test/sslapitest.c
12920
memcpy(data->rsecret[prot_level - 1], secret, secret_len);
crypto/openssl/test/sslapitest.c
12928
memcpy(data->wsecret[prot_level - 1], secret, secret_len);
crypto/openssl/test/sslapitest.c
12949
const unsigned char *secret, size_t secret_len,
crypto/openssl/test/sslapitest.c
12955
(void)secret;
crypto/openssl/test/tls-provider.c
495
static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen,
crypto/openssl/test/tls-provider.c
505
if (secret == NULL)
crypto/openssl/test/tls-provider.c
512
secret[i] = pxorctx->key->privkey[i] ^ pxorctx->peerkey->pubkey[i];
crypto/openssl/test/tls13secretstest.c
190
const uint8_t *secret,
crypto/openssl/test/tls13secretstest.c
229
int level, unsigned char *secret, size_t secretlen,
lib/libiscsiutil/chap.c
305
chap_authenticate(struct chap *chap, const char *secret)
lib/libiscsiutil/chap.c
309
chap_compute_md5(chap->chap_id, secret,
lib/libiscsiutil/chap.c
329
rchap_new(const char *secret)
lib/libiscsiutil/chap.c
337
rchap->rchap_secret = checked_strdup(secret);
lib/libiscsiutil/chap.c
41
chap_compute_md5(const char id, const char *secret,
lib/libiscsiutil/chap.c
51
MD5Update(&ctx, secret, strlen(secret));
lib/libiscsiutil/libiscsiutil.h
105
const char *secret);
lib/libiscsiutil/libiscsiutil.h
108
struct rchap *rchap_new(const char *secret);
lib/libradius/radlib.c
113
MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
lib/libradius/radlib.c
145
MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
lib/libradius/radlib.c
1591
return (h->servers[h->srv].secret);
lib/libradius/radlib.c
161
HMAC_Init_ex(ctx, srvp->secret, strlen(srvp->secret), EVP_md5(), NULL);
lib/libradius/radlib.c
217
MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
lib/libradius/radlib.c
247
HMAC_Init_ex(hctx, srvp->secret,
lib/libradius/radlib.c
248
strlen(srvp->secret), EVP_md5(), NULL);
lib/libradius/radlib.c
311
MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
lib/libradius/radlib.c
343
HMAC_Init_ex(hctx, srvp->secret,
lib/libradius/radlib.c
344
strlen(srvp->secret), EVP_md5(), NULL);
lib/libradius/radlib.c
412
const char *secret, int timeout, int tries)
lib/libradius/radlib.c
417
return rad_add_server_ex(h, host, port, secret, timeout, tries,
lib/libradius/radlib.c
423
const char *secret, int timeout, int tries, int dead_time,
lib/libradius/radlib.c
461
if ((srvp->secret = strdup(secret)) == NULL) {
lib/libradius/radlib.c
484
memset(h->servers[srv].secret, 0,
lib/libradius/radlib.c
485
strlen(h->servers[srv].secret));
lib/libradius/radlib.c
486
free(h->servers[srv].secret);
lib/libradius/radlib.c
523
char *secret;
lib/libradius/radlib.c
588
secret = fields[2];
lib/libradius/radlib.c
656
if (rad_add_server_ex(h, host, port, secret, timeout, maxtries,
lib/libradius/radlib_private.h
68
char *secret; /* Shared secret */
lib/librpcsvc/xcrypt.c
103
hex2bin(len, secret, buf);
lib/librpcsvc/xcrypt.c
112
bin2hex(len, (unsigned char *) buf, secret);
lib/librpcsvc/xcrypt.c
57
xencrypt(char *secret, char *passwd)
lib/librpcsvc/xcrypt.c
65
len = strlen(secret) / 2;
lib/librpcsvc/xcrypt.c
70
hex2bin(len, secret, buf);
lib/librpcsvc/xcrypt.c
79
bin2hex(len, (unsigned char *) buf, secret);
lib/librpcsvc/xcrypt.c
90
xdecrypt(char *secret, char *passwd)
lib/librpcsvc/xcrypt.c
98
len = strlen(secret) / 2;
lib/libtacplus/taclib.c
314
const char *secret;
lib/libtacplus/taclib.c
321
secret = h->servers[h->cur_server].secret;
lib/libtacplus/taclib.c
322
if (secret[0] == '\0')
lib/libtacplus/taclib.c
331
MD5Update(&base_ctx, secret, strlen(secret));
lib/libtacplus/taclib.c
687
const char *secret, int timeout, int flags, const char *const *avs)
lib/libtacplus/taclib.c
714
if ((srvp->secret = xstrdup(h, secret)) == NULL)
lib/libtacplus/taclib.c
740
memset_s(srvp->secret, strlen(srvp->secret), 0, strlen(srvp->secret));
lib/libtacplus/taclib.c
741
free(srvp->secret);
lib/libtacplus/taclib.c
742
srvp->secret = NULL;
lib/libtacplus/taclib.c
753
const char *secret, int timeout, int flags)
lib/libtacplus/taclib.c
757
return tac_add_server_av(h, host, port, secret, timeout, flags, avs);
lib/libtacplus/taclib.c
768
memset(h->servers[srv].secret, 0,
lib/libtacplus/taclib.c
769
strlen(h->servers[srv].secret));
lib/libtacplus/taclib.c
770
free(h->servers[srv].secret);
lib/libtacplus/taclib.c
815
char *secret;
lib/libtacplus/taclib.c
834
secret = fields[1];
lib/libtacplus/taclib.c
870
if (tac_add_server_av(h, host, port, secret, timeout,
lib/libtacplus/taclib.c
879
memset_s(secret, strlen(secret), 0, strlen(secret));
lib/libtacplus/taclib_private.h
154
char *secret; /* Shared secret */
sbin/pfctl/parse.y
7599
pushfile(const char *name, int secret)
sbin/pfctl/parse.y
7623
} else if (secret &&
sys/crypto/curve25519.c
35
curve25519(uint8_t *public, const uint8_t *secret,
sys/crypto/curve25519.c
38
return (crypto_scalarmult_curve25519(public, secret,
sys/crypto/curve25519.c
43
curve25519_generate_public(uint8_t *public, const uint8_t *secret)
sys/crypto/curve25519.c
45
return (crypto_scalarmult_curve25519_base(public, secret) == 0);
sys/crypto/curve25519.h
38
bool curve25519(uint8_t *public, const uint8_t *secret,
sys/crypto/curve25519.h
41
const uint8_t *secret);
sys/crypto/curve25519.h
44
curve25519_clamp_secret(uint8_t *secret)
sys/crypto/curve25519.h
46
secret[0] &= 248;
sys/crypto/curve25519.h
47
secret[31] &= 127;
sys/crypto/curve25519.h
48
secret[31] |= 64;
sys/crypto/curve25519.h
52
curve25519_generate_secret(uint8_t *secret)
sys/crypto/curve25519.h
54
arc4random_buf(secret, CURVE25519_KEY_SIZE);
sys/crypto/curve25519.h
55
curve25519_clamp_secret(secret);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1143
computeHashKey(CpaFlatBuffer *secret,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1151
status = qatUtilsHashMD5Full(secret->pData,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1153
secret->dataLenInBytes);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1156
status = qatUtilsHashSHA1Full(secret->pData,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1158
secret->dataLenInBytes);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1161
status = qatUtilsHashSHA256Full(secret->pData,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1163
secret->dataLenInBytes);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1166
status = qatUtilsHashSHA384Full(secret->pData,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1168
secret->dataLenInBytes);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1171
status = qatUtilsHashSHA512Full(secret->pData,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1173
secret->dataLenInBytes);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1288
uSecretLen = pKeyGenTlsOpData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1315
(pKeyGenTlsOpData->secret.dataLenInBytes +
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1320
pKeyGenTlsOpData->secret.pData;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1347
pKeyGenTlsOpData->secret.pData +
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1348
(pKeyGenTlsOpData->secret.dataLenInBytes -
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1382
(pKeyGenTlsOpData->secret.dataLenInBytes +
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1389
pKeyGenTlsOpData->secret.pData +
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1390
(pKeyGenTlsOpData->secret.dataLenInBytes -
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1394
pKeyGenTlsOpData->secret.pData;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1408
uSecretLen = pKeyGenTlsOpData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1453
computeHashKey(&pKeyGenTlsOpData->secret,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1473
pKeyGenTlsOpData->secret.pData;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1476
pKeyGenTlsOpData->secret.pData;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1479
pKeyGenTlsOpData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1481
pKeyGenTlsOpData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1515
pKeyGenTlsOpData->secret;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1517
pKeyGenTlsOpData->secret;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1603
pKeyGenSslOpData->secret.dataLenInBytes,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1611
pKeyGenSslOpData->secret.pData);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1750
pKeyGenTlsOpData->secret.dataLenInBytes,
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1841
pKeyGenTlsOpData->secret); /* IKM or PRK */
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
1943
pKeyGenTlsOpData->secret); /* IKM or PRK */
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
2134
uSecretLen = opData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
2144
LAC_CHECK_NULL_PARAM(opData->secret.pData);
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
2190
uSecretLen = opData->secret.dataLenInBytes;
sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c
2228
LAC_CHECK_NULL_PARAM(opData->secret.pData);
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_key.c
156
pKeyGenTlsOpData->secret);
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_key.c
168
pKeyGenTlsOpData->secret);
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_key.c
172
(uint64_t)&pKeyGenTlsOpData->secret);
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_key.c
186
pKeyGenTlsOpData->secret);
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_key.c
190
(uint64_t)&pKeyGenTlsOpData->secret);
sys/dev/qat/qat_api/include/lac/cpa_cy_key.h
103
CpaFlatBuffer secret;
sys/dev/qat/qat_api/include/lac/cpa_cy_key.h
346
Cpa8U secret[CPA_CY_HKDF_KEY_MAX_SECRET_SZ];
sys/dev/qat/qat_api/include/lac/cpa_cy_key.h
399
CpaFlatBuffer secret;
sys/netinet/sctputil.c
1728
int i, secret;
sys/netinet/sctputil.c
1955
secret = (int)inp->sctp_ep.current_secret_number;
sys/netinet/sctputil.c
1957
inp->sctp_ep.secret_key[secret][i] =
sys/netinet/tcp_fastopen.c
1021
V_tcp_fastopen_ccache.secret);
sys/netinet/tcp_fastopen.c
410
V_tcp_fastopen_ccache.secret = arc4random();
sys/netinet/tcp_fastopen.h
79
uint32_t secret;
sys/netinet/tcp_syncache.c
2299
secbit = V_tcp_syncache.secret.oddeven & 0x1;
sys/netinet/tcp_syncache.c
2302
secbits = V_tcp_syncache.secret.key[secbit];
sys/netinet/tcp_syncache.c
2344
secbits = V_tcp_syncache.secret.key[cookie.flags.odd_even];
sys/netinet/tcp_syncache.c
2469
secbit = (sc->secret.oddeven & 0x1) ? 0 : 1;
sys/netinet/tcp_syncache.c
2470
secbits = sc->secret.key[secbit];
sys/netinet/tcp_syncache.c
2472
atomic_add_rel_int(&sc->secret.oddeven, 1);
sys/netinet/tcp_syncache.c
2475
callout_schedule(&sc->secret.reseed, SYNCOOKIE_LIFETIME * hz);
sys/netinet/tcp_syncache.c
300
callout_init(&V_tcp_syncache.secret.reseed, 1);
sys/netinet/tcp_syncache.c
301
arc4rand(V_tcp_syncache.secret.key[0], SYNCOOKIE_SECRET_SIZE, 0);
sys/netinet/tcp_syncache.c
302
arc4rand(V_tcp_syncache.secret.key[1], SYNCOOKIE_SECRET_SIZE, 0);
sys/netinet/tcp_syncache.c
303
callout_reset(&V_tcp_syncache.secret.reseed, SYNCOOKIE_LIFETIME * hz,
sys/netinet/tcp_syncache.c
327
callout_drain(&V_tcp_syncache.secret.reseed);
sys/netinet/tcp_syncache.h
134
struct syncookie_secret secret;
usr.bin/iscsictl/iscsictl.c
300
const char *target_addr, const char *user, const char *secret, int enable)
usr.bin/iscsictl/iscsictl.c
348
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
349
strlcpy(conf->isc_secret, secret, sizeof(conf->isc_secret));
usr.bin/iscsictl/iscsictl.c
637
*target = NULL, *user = NULL, *secret = NULL;
usr.bin/iscsictl/iscsictl.c
709
secret = optarg;
usr.bin/iscsictl/iscsictl.c
750
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
767
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
788
if (user != NULL && secret == NULL)
usr.bin/iscsictl/iscsictl.c
790
if (secret != NULL && user == NULL)
usr.bin/iscsictl/iscsictl.c
811
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
853
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
877
if (secret != NULL)
usr.bin/iscsictl/iscsictl.c
915
user, secret, enable);
usr.bin/iscsictl/iscsictl.c
938
targ->t_secret = secret;
usr.bin/iscsictl/parse.y
109
secret
usr.bin/iscsictl/parse.y
188
secret: SECRET EQUALS STR
usr.sbin/ctld/conf.cc
113
auth_group_add_chap(const char *user, const char *secret)
usr.sbin/ctld/conf.cc
115
return (auth_group->add_chap(user, secret));
usr.sbin/ctld/conf.cc
119
auth_group_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.cc
122
return (auth_group->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/conf.cc
352
target_add_chap(const char *user, const char *secret)
usr.sbin/ctld/conf.cc
354
return (target->add_chap(user, secret));
usr.sbin/ctld/conf.cc
358
target_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.cc
361
return (target->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/conf.h
43
bool auth_group_add_chap(const char *user, const char *secret);
usr.sbin/ctld/conf.h
44
bool auth_group_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.h
80
bool target_add_chap(const char *user, const char *secret);
usr.sbin/ctld/conf.h
81
bool target_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
1303
target::add_chap(const char *user, const char *secret)
usr.sbin/ctld/ctld.cc
1307
return (t_auth_group->add_chap(user, secret));
usr.sbin/ctld/ctld.cc
1311
target::add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
1316
return (t_auth_group->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/ctld.cc
223
auth_group::check_secret_length(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
228
len = strlen(secret);
usr.sbin/ctld/ctld.cc
241
auth_group::add_chap(const char *user, const char *secret)
usr.sbin/ctld/ctld.cc
251
check_secret_length(user, secret, "secret");
usr.sbin/ctld/ctld.cc
253
const auto &pair = ag_auths.try_emplace(user, secret);
usr.sbin/ctld/ctld.cc
264
auth_group::add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
275
check_secret_length(user, secret, "secret");
usr.sbin/ctld/ctld.cc
278
const auto &pair = ag_auths.try_emplace(user, secret, user2, secret2);
usr.sbin/ctld/ctld.hh
108
bool add_chap(const char *user, const char *secret);
usr.sbin/ctld/ctld.hh
109
bool add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.hh
126
void check_secret_length(const char *user, const char *secret,
usr.sbin/ctld/ctld.hh
397
bool add_chap(const char *user, const char *secret);
usr.sbin/ctld/ctld.hh
398
bool add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.hh
64
auth(std::string_view secret) : a_secret(secret) {}
usr.sbin/ctld/ctld.hh
65
auth(std::string_view secret, std::string_view mutual_user,
usr.sbin/ctld/ctld.hh
67
a_secret(secret), a_mutual_user(mutual_user),
usr.sbin/ctld/discovery.cc
202
error = chap_authenticate(conn_chap, auth->secret());
usr.sbin/ctld/login.cc
378
error = chap_authenticate(chap, auth->secret());
usr.sbin/ctld/uclparse.cc
107
auto secret = obj["secret"];
usr.sbin/ctld/uclparse.cc
108
if (!secret || secret.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
130
secret.string_value().c_str(),
usr.sbin/ctld/uclparse.cc
145
auto secret = obj["secret"];
usr.sbin/ctld/uclparse.cc
146
if (!secret || secret.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
154
secret.string_value().c_str()));
usr.sbin/ctld/uclparse.cc
167
auto secret = obj["secret"];
usr.sbin/ctld/uclparse.cc
168
if (!secret || secret.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
190
secret.string_value().c_str(),
usr.sbin/ctld/uclparse.cc
85
auto secret = obj["secret"];
usr.sbin/ctld/uclparse.cc
86
if (!secret || secret.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
94
secret.string_value().c_str()));
usr.sbin/ppp/chap_ms.c
399
mschap_LANMan(char *digest, char *challenge, char *secret)
usr.sbin/ppp/chap_ms.c
406
for (ptr = SECRET; *secret && ptr < end; ptr++, secret++)
usr.sbin/ppp/chap_ms.c
407
*ptr = toupper(*secret);
usr.sbin/ypldap/parse.y
678
pushfile(const char *name, int secret)
usr.sbin/ypldap/parse.y
696
} else if (secret &&