HomeSort by: relevance | last modified time | path
    Searched defs:salt_len (Results 1 - 25 of 37) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/include/crypto/
rsa.h 26 int salt_len; member in struct:rsa_pss_params_30_st
  /src/crypto/external/bsd/openssl/dist/include/crypto/
rsa.h 26 int salt_len; member in struct:rsa_pss_params_30_st
  /src/sys/external/isc/libsodium/dist/test/default/
pwhash_scrypt_ll.c 30 size_t salt_len = strlen(salt); local
35 salt_len, N, r, p, data, olen) != 0) {
  /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/
scrypt.c 26 size_t salt_len; member in struct:__anon2060
84 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
131 return pkey_scrypt_set_membuf(&kctx->salt, &kctx->salt_len, p2, p1);
232 kctx->salt_len, kctx->N, kctx->r, kctx->p,
hkdf.c 21 const unsigned char *salt, size_t salt_len,
27 const unsigned char *salt, size_t salt_len,
40 size_t salt_len; member in struct:__anon2059
64 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
94 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
100 kctx->salt_len = p1;
183 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key,
215 return HKDF_Extract(kctx->md, kctx->salt, kctx->salt_len, kctx->key,
258 const unsigned char *salt, size_t salt_len,
    [all...]
  /src/lib/libcrypt/
bcrypt.c 215 u_int8_t key_len, salt_len, logr, minor; local
265 salt_len = BCRYPT_MAXSALT;
275 Blowfish_expandstate(&state, csalt, salt_len,
279 Blowfish_expand0state(&state, csalt, salt_len);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/
pbkdf1.c 42 size_t salt_len; member in struct:__anon553
145 if (!ossl_prov_memdup(src->salt, src->salt_len,
146 &dest->salt, &dest->salt_len)
197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len,
215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p))
pvkkdf.c 35 size_t salt_len; member in struct:__anon556
81 if (!ossl_prov_memdup(src->salt, src->salt_len,
82 &dest->salt, &dest->salt_len)
172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len)
196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p))
pbkdf2.c 55 size_t salt_len; member in struct:__anon554
97 OPENSSL_clear_free(ctx->salt, ctx->salt_len);
133 if (!ossl_prov_memdup(src->salt, src->salt_len,
134 &dest->salt, &dest->salt_len)
213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter,
249 ctx->salt, ctx->salt_len, ctx->iter,
296 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p))
pkcs12kdf.c 42 size_t salt_len; member in struct:__anon555
185 if (!ossl_prov_memdup(src->salt, src->salt_len,
186 &dest->salt, &dest->salt_len)
238 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len,
259 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p))
scrypt.c 49 size_t salt_len; member in struct:__anon557
115 if (!ossl_prov_memdup(src->salt, src->salt_len,
116 &dest->salt, &dest->salt_len)
207 ctx->salt_len, ctx->N, ctx->r, ctx->p,
231 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
hkdf.c 55 const unsigned char *salt, size_t salt_len,
60 const unsigned char *salt, size_t salt_len,
87 size_t salt_len; member in struct:__anon548
132 OPENSSL_clear_free(ctx->salt, ctx->salt_len);
152 if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt,
153 &dest->salt_len)
240 return HKDF(libctx, md, ctx->salt, ctx->salt_len,
244 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len,
313 &ctx->salt_len))
455 const unsigned char *salt, size_t salt_len,
    [all...]
sskdf.c 65 size_t salt_len; member in struct:__anon559
238 const unsigned char *salt, size_t salt_len,
262 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL))
332 OPENSSL_clear_free(ctx->salt, ctx->salt_len);
361 || !ossl_prov_memdup(src->salt, src->salt_len,
362 &dest->salt, &dest->salt_len)
458 if (ctx->salt == NULL || ctx->salt_len <= 0) {
462 ctx->salt_len = default_salt_len;
466 ctx->salt, ctx->salt_len,
600 &ctx->salt, &ctx->salt_len)
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/
pbkdf1.c 41 size_t salt_len; member in struct:__anon1601
178 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len,
196 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p))
pbkdf2.c 58 size_t salt_len; member in struct:__anon1602
165 ctx->salt, ctx->salt_len, ctx->iter,
199 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p))
pkcs12kdf.c 41 size_t salt_len; member in struct:__anon1603
220 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len,
241 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len,p))
scrypt.c 48 size_t salt_len; member in struct:__anon1604
175 ctx->salt_len, ctx->N, ctx->r, ctx->p,
199 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
sskdf.c 63 size_t salt_len; member in struct:__anon1606
215 const unsigned char *salt, size_t salt_len,
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL))
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len);
394 if (ctx->salt == NULL || ctx->salt_len <= 0) {
400 ctx->salt_len = default_salt_len;
404 ctx->salt, ctx->salt_len,
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p))
hkdf.c 50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member in struct:__anon1597
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len,
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len,
240 &ctx->salt_len))
404 const unsigned char *salt, size_t salt_len,
420 salt, salt_len, ikm, ikm_len, prk, prk_len))
455 const unsigned char *salt, size_t salt_len,
470 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
pkcs5.c 27 size_t salt_len; member in struct:pkcs5_params
179 params->salt_len = hdr.length;
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
327 params->salt_len = hdr.length;
329 params->salt, params->salt_len);
373 params->salt, params->salt_len);
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
401 size_t salt_len, u8 id, unsigned int iter,
419 S_len = v * ((salt_len + v - 1) / v);
425 if (salt_len) {
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_pwd.c 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local
431 salt_len = *ptr++;
432 exp_len = 1 + salt_len + 2 * prime_len + order_len;
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
448 salt_pwd_len[1] = salt_len;
454 (int) salt_len);
455 ptr += salt_len;
468 salt_len = *ptr++;
469 exp_len = 1 + salt_len + 2 * prime_len + order_len;
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_pwd.c 31 size_t salt_len; member in struct:eap_pwd_data
121 data->salt_len = sm->user->salt_len;
122 if (data->salt_len) {
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len);
156 bin_clear_free(data->salt, data->salt_len);
194 if (data->salt_len)
196 data->salt, data->salt_len);
202 if (data->salt_len) {
283 (data->salt ? 1 + data->salt_len : 0))
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
passwd.c 334 size_t passwd_len, salt_len, magic_len; local
348 salt_len = strlen(ascii_salt);
350 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
380 assert(salt_len <= 8);
394 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
401 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
430 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
466 output = salt_out + salt_len;
525 size_t passwd_len, salt_len, magic_len; local
578 salt_len = strlen(ascii_salt)
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
passwd.c 326 size_t passwd_len, salt_len, magic_len; local
340 salt_len = strlen(ascii_salt);
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
372 if (salt_len > 8)
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
459 output = salt_out + salt_len;
520 size_t passwd_len, salt_len, magic_len; local
573 salt_len = strlen(ascii_salt)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
passwd.c 323 size_t passwd_len, salt_len, magic_len; local
337 salt_len = strlen(ascii_salt);
339 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
369 if (salt_len > 8)
384 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
391 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
420 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
456 output = salt_out + salt_len;
517 size_t passwd_len, salt_len, magic_len; local
570 salt_len = strlen(ascii_salt)
    [all...]

Completed in 44 milliseconds

1 2