HomeSort by: relevance | last modified time | path
    Searched refs:salt_len (Results 1 - 25 of 71) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
pkcs5.c 52 * @param salt_len Length of salt.
65 const void * salt, size_t salt_len,
82 datalen = salt_len + 4;
90 if (salt_len)
91 memcpy(data, salt, salt_len);
138 * @param salt_len Length of salt.
149 const void * salt, size_t salt_len,
153 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iter,
  /src/crypto/external/apache2/openssl/dist/crypto/rand/
prov_seed.c 77 const void *salt, size_t salt_len)
91 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0))
103 const void *salt, size_t salt_len)
109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len);
114 if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) {
  /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/
hkdf.c 21 const unsigned char *salt, size_t salt_len,
27 const unsigned char *salt, size_t salt_len,
40 size_t salt_len; member in struct:__anon2059
64 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
94 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
100 kctx->salt_len = p1;
183 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key,
215 return HKDF_Extract(kctx->md, kctx->salt, kctx->salt_len, kctx->key,
258 const unsigned char *salt, size_t salt_len,
    [all...]
scrypt.c 26 size_t salt_len; member in struct:__anon2060
84 OPENSSL_clear_free(kctx->salt, kctx->salt_len);
131 return pkey_scrypt_set_membuf(&kctx->salt, &kctx->salt_len, p2, p1);
232 kctx->salt_len, kctx->N, kctx->r, kctx->p,
  /src/sys/external/isc/libsodium/dist/test/default/
pwhash_scrypt_ll.c 30 size_t salt_len = strlen(salt); local
35 salt_len, N, r, p, data, olen) != 0) {
  /src/crypto/external/apache2/openssl/dist/providers/implementations/include/prov/
seeding.h 28 const void *salt, size_t salt_len);
  /src/crypto/external/bsd/openssl/dist/crypto/rand/
prov_seed.c 49 const void *salt, size_t salt_len)
63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0))
  /src/crypto/external/bsd/openssl/dist/providers/common/
provider_seeding.c 65 const void *salt,size_t salt_len)
70 min_len, max_len, salt, salt_len);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/include/prov/
seeding.h 39 const void *salt, size_t salt_len);
  /src/crypto/external/apache2/openssl/dist/providers/common/
provider_seeding.c 112 const void *salt, size_t salt_len)
117 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len);
119 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len);
  /src/external/bsd/libarchive/dist/libarchive/
archive_cryptor.c 51 size_t salt_len, unsigned rounds, uint8_t *derived_key,
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds,
67 size_t salt_len, unsigned rounds, uint8_t *derived_key,
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds,
92 size_t salt_len, unsigned rounds, uint8_t *derived_key,
111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key);
121 size_t salt_len, unsigned rounds, uint8_t *derived_key,
124 salt_len, salt, derived_key_len, derived_key);
132 size_t salt_len, unsigned rounds, uint8_t *derived_key,
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds
    [all...]
archive_cryptor_private.h 164 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\
165 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)
190 size_t salt_len, unsigned rounds, uint8_t *derived_key,
  /src/crypto/external/apache2/openssl/dist/include/internal/
quic_record_util.h 30 const unsigned char *salt, size_t salt_len,
  /src/crypto/external/apache2/openssl/dist/include/crypto/
rand.h 122 const void *salt, size_t salt_len);
125 const void *salt, size_t salt_len);
  /src/external/bsd/wpa/dist/src/tls/
pkcs5.c 27 size_t salt_len; member in struct:pkcs5_params
179 params->salt_len = hdr.length;
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
327 params->salt_len = hdr.length;
329 params->salt, params->salt_len);
373 params->salt, params->salt_len);
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
401 size_t salt_len, u8 id, unsigned int iter,
419 S_len = v * ((salt_len + v - 1) / v);
425 if (salt_len) {
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/
pbkdf1.c 42 size_t salt_len; member in struct:__anon553
145 if (!ossl_prov_memdup(src->salt, src->salt_len,
146 &dest->salt, &dest->salt_len)
197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len,
215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p))
pvkkdf.c 35 size_t salt_len; member in struct:__anon556
81 if (!ossl_prov_memdup(src->salt, src->salt_len,
82 &dest->salt, &dest->salt_len)
172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len)
196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p))
  /src/crypto/external/apache2/openssl/dist/apps/
passwd.c 334 size_t passwd_len, salt_len, magic_len; local
348 salt_len = strlen(ascii_salt);
350 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
380 assert(salt_len <= 8);
394 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
401 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
430 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
466 output = salt_out + salt_len;
525 size_t passwd_len, salt_len, magic_len; local
578 salt_len = strlen(ascii_salt)
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
passwd.c 326 size_t passwd_len, salt_len, magic_len; local
340 salt_len = strlen(ascii_salt);
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
372 if (salt_len > 8)
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
459 output = salt_out + salt_len;
520 size_t passwd_len, salt_len, magic_len; local
573 salt_len = strlen(ascii_salt)
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/
sskdf.c 63 size_t salt_len; member in struct:__anon1606
215 const unsigned char *salt, size_t salt_len,
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL))
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len);
394 if (ctx->salt == NULL || ctx->salt_len <= 0) {
400 ctx->salt_len = default_salt_len;
404 ctx->salt, ctx->salt_len,
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p))
hkdf.c 50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member in struct:__anon1597
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len,
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len,
240 &ctx->salt_len))
404 const unsigned char *salt, size_t salt_len,
420 salt, salt_len, ikm, ikm_len, prk, prk_len))
455 const unsigned char *salt, size_t salt_len,
470 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
passwd.c 323 size_t passwd_len, salt_len, magic_len; local
337 salt_len = strlen(ascii_salt);
339 ebcdic2ascii(ascii_salt, ascii_salt, salt_len);
369 if (salt_len > 8)
384 if (!EVP_DigestUpdate(md, ascii_salt, salt_len))
391 || !EVP_DigestUpdate(md2, ascii_salt, salt_len)
420 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len))
456 output = salt_out + salt_len;
517 size_t passwd_len, salt_len, magic_len; local
570 salt_len = strlen(ascii_salt)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_pwd.c 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local
431 salt_len = *ptr++;
432 exp_len = 1 + salt_len + 2 * prime_len + order_len;
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
448 salt_pwd_len[1] = salt_len;
454 (int) salt_len);
455 ptr += salt_len;
468 salt_len = *ptr++;
469 exp_len = 1 + salt_len + 2 * prime_len + order_len;
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
    [all...]
  /src/lib/libcrypt/
bcrypt.c 215 u_int8_t key_len, salt_len, logr, minor; local
265 salt_len = BCRYPT_MAXSALT;
275 Blowfish_expandstate(&state, csalt, salt_len,
279 Blowfish_expand0state(&state, csalt, salt_len);
  /src/crypto/external/bsd/openssl/dist/include/crypto/
rand.h 118 const void *salt, size_t salt_len);

Completed in 51 milliseconds

1 2 3