| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| rsa.h | 26 int salt_len; member in struct:rsa_pss_params_30_st
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| rsa.h | 26 int salt_len; member in struct:rsa_pss_params_30_st
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| pwhash_scrypt_ll.c | 30 size_t salt_len = strlen(salt); local 35 salt_len, N, r, p, data, olen) != 0) {
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/ |
| scrypt.c | 26 size_t salt_len; member in struct:__anon2060 84 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 131 return pkey_scrypt_set_membuf(&kctx->salt, &kctx->salt_len, p2, p1); 232 kctx->salt_len, kctx->N, kctx->r, kctx->p,
|
| hkdf.c | 21 const unsigned char *salt, size_t salt_len, 27 const unsigned char *salt, size_t salt_len, 40 size_t salt_len; member in struct:__anon2059 64 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 94 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 100 kctx->salt_len = p1; 183 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key, 215 return HKDF_Extract(kctx->md, kctx->salt, kctx->salt_len, kctx->key, 258 const unsigned char *salt, size_t salt_len, [all...] |
| /src/lib/libcrypt/ |
| bcrypt.c | 215 u_int8_t key_len, salt_len, logr, minor; local 265 salt_len = BCRYPT_MAXSALT; 275 Blowfish_expandstate(&state, csalt, salt_len, 279 Blowfish_expand0state(&state, csalt, salt_len);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| pbkdf1.c | 42 size_t salt_len; member in struct:__anon553 145 if (!ossl_prov_memdup(src->salt, src->salt_len, 146 &dest->salt, &dest->salt_len) 197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| pvkkdf.c | 35 size_t salt_len; member in struct:__anon556 81 if (!ossl_prov_memdup(src->salt, src->salt_len, 82 &dest->salt, &dest->salt_len) 172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) 196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| pbkdf2.c | 55 size_t salt_len; member in struct:__anon554 97 OPENSSL_clear_free(ctx->salt, ctx->salt_len); 133 if (!ossl_prov_memdup(src->salt, src->salt_len, 134 &dest->salt, &dest->salt_len) 213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter, 249 ctx->salt, ctx->salt_len, ctx->iter, 296 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| pkcs12kdf.c | 42 size_t salt_len; member in struct:__anon555 185 if (!ossl_prov_memdup(src->salt, src->salt_len, 186 &dest->salt, &dest->salt_len) 238 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 259 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| scrypt.c | 49 size_t salt_len; member in struct:__anon557 115 if (!ossl_prov_memdup(src->salt, src->salt_len, 116 &dest->salt, &dest->salt_len) 207 ctx->salt_len, ctx->N, ctx->r, ctx->p, 231 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| hkdf.c | 55 const unsigned char *salt, size_t salt_len, 60 const unsigned char *salt, size_t salt_len, 87 size_t salt_len; member in struct:__anon548 132 OPENSSL_clear_free(ctx->salt, ctx->salt_len); 152 if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, 153 &dest->salt_len) 240 return HKDF(libctx, md, ctx->salt, ctx->salt_len, 244 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, 313 &ctx->salt_len)) 455 const unsigned char *salt, size_t salt_len, [all...] |
| sskdf.c | 65 size_t salt_len; member in struct:__anon559 238 const unsigned char *salt, size_t salt_len, 262 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) 332 OPENSSL_clear_free(ctx->salt, ctx->salt_len); 361 || !ossl_prov_memdup(src->salt, src->salt_len, 362 &dest->salt, &dest->salt_len) 458 if (ctx->salt == NULL || ctx->salt_len <= 0) { 462 ctx->salt_len = default_salt_len; 466 ctx->salt, ctx->salt_len, 600 &ctx->salt, &ctx->salt_len) [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| pbkdf1.c | 41 size_t salt_len; member in struct:__anon1601 178 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 196 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p))
|
| pbkdf2.c | 58 size_t salt_len; member in struct:__anon1602 165 ctx->salt, ctx->salt_len, ctx->iter, 199 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p))
|
| pkcs12kdf.c | 41 size_t salt_len; member in struct:__anon1603 220 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 241 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len,p))
|
| scrypt.c | 48 size_t salt_len; member in struct:__anon1604 175 ctx->salt_len, ctx->N, ctx->r, ctx->p, 199 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| sskdf.c | 63 size_t salt_len; member in struct:__anon1606 215 const unsigned char *salt, size_t salt_len, 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { 400 ctx->salt_len = default_salt_len; 404 ctx->salt, ctx->salt_len, 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p))
|
| hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member in struct:__anon1597 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, 240 &ctx->salt_len)) 404 const unsigned char *salt, size_t salt_len, 420 salt, salt_len, ikm, ikm_len, prk, prk_len)) 455 const unsigned char *salt, size_t salt_len, 470 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| pkcs5.c | 27 size_t salt_len; member in struct:pkcs5_params 179 params->salt_len = hdr.length; 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); 327 params->salt_len = hdr.length; 329 params->salt, params->salt_len); 373 params->salt, params->salt_len); 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, 401 size_t salt_len, u8 id, unsigned int iter, 419 S_len = v * ((salt_len + v - 1) / v); 425 if (salt_len) { [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local 431 salt_len = *ptr++; 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); 448 salt_pwd_len[1] = salt_len; 454 (int) salt_len); 455 ptr += salt_len; 468 salt_len = *ptr++; 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_pwd.c | 31 size_t salt_len; member in struct:eap_pwd_data 121 data->salt_len = sm->user->salt_len; 122 if (data->salt_len) { 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); 156 bin_clear_free(data->salt, data->salt_len); 194 if (data->salt_len) 196 data->salt, data->salt_len); 202 if (data->salt_len) { 283 (data->salt ? 1 + data->salt_len : 0)) [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| passwd.c | 334 size_t passwd_len, salt_len, magic_len; local 348 salt_len = strlen(ascii_salt); 350 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 380 assert(salt_len <= 8); 394 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 401 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 430 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 466 output = salt_out + salt_len; 525 size_t passwd_len, salt_len, magic_len; local 578 salt_len = strlen(ascii_salt) [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| passwd.c | 326 size_t passwd_len, salt_len, magic_len; local 340 salt_len = strlen(ascii_salt); 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 372 if (salt_len > 8) 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 459 output = salt_out + salt_len; 520 size_t passwd_len, salt_len, magic_len; local 573 salt_len = strlen(ascii_salt) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| passwd.c | 323 size_t passwd_len, salt_len, magic_len; local 337 salt_len = strlen(ascii_salt); 339 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 369 if (salt_len > 8) 384 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 391 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 420 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 456 output = salt_out + salt_len; 517 size_t passwd_len, salt_len, magic_len; local 570 salt_len = strlen(ascii_salt) [all...] |