| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| pkcs5.c | 52 * @param salt_len Length of salt. 65 const void * salt, size_t salt_len, 82 datalen = salt_len + 4; 90 if (salt_len) 91 memcpy(data, salt, salt_len); 138 * @param salt_len Length of salt. 149 const void * salt, size_t salt_len, 153 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iter,
|
| /src/crypto/external/apache2/openssl/dist/crypto/rand/ |
| prov_seed.c | 77 const void *salt, size_t salt_len) 91 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) 103 const void *salt, size_t salt_len) 109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len); 114 if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) {
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/ |
| hkdf.c | 21 const unsigned char *salt, size_t salt_len, 27 const unsigned char *salt, size_t salt_len, 40 size_t salt_len; member in struct:__anon2059 64 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 94 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 100 kctx->salt_len = p1; 183 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key, 215 return HKDF_Extract(kctx->md, kctx->salt, kctx->salt_len, kctx->key, 258 const unsigned char *salt, size_t salt_len, [all...] |
| scrypt.c | 26 size_t salt_len; member in struct:__anon2060 84 OPENSSL_clear_free(kctx->salt, kctx->salt_len); 131 return pkey_scrypt_set_membuf(&kctx->salt, &kctx->salt_len, p2, p1); 232 kctx->salt_len, kctx->N, kctx->r, kctx->p,
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| pwhash_scrypt_ll.c | 30 size_t salt_len = strlen(salt); local 35 salt_len, N, r, p, data, olen) != 0) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/include/prov/ |
| seeding.h | 28 const void *salt, size_t salt_len);
|
| /src/crypto/external/bsd/openssl/dist/crypto/rand/ |
| prov_seed.c | 49 const void *salt, size_t salt_len) 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0))
|
| /src/crypto/external/bsd/openssl/dist/providers/common/ |
| provider_seeding.c | 65 const void *salt,size_t salt_len) 70 min_len, max_len, salt, salt_len);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/include/prov/ |
| seeding.h | 39 const void *salt, size_t salt_len);
|
| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| provider_seeding.c | 112 const void *salt, size_t salt_len) 117 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); 119 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len);
|
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, 124 salt_len, salt, derived_key_len, derived_key); 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds [all...] |
| archive_cryptor_private.h | 164 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\ 165 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len) 190 size_t salt_len, unsigned rounds, uint8_t *derived_key,
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| quic_record_util.h | 30 const unsigned char *salt, size_t salt_len,
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| rand.h | 122 const void *salt, size_t salt_len); 125 const void *salt, size_t salt_len);
|
| /src/external/bsd/wpa/dist/src/tls/ |
| pkcs5.c | 27 size_t salt_len; member in struct:pkcs5_params 179 params->salt_len = hdr.length; 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); 327 params->salt_len = hdr.length; 329 params->salt, params->salt_len); 373 params->salt, params->salt_len); 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, 401 size_t salt_len, u8 id, unsigned int iter, 419 S_len = v * ((salt_len + v - 1) / v); 425 if (salt_len) { [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| pbkdf1.c | 42 size_t salt_len; member in struct:__anon553 145 if (!ossl_prov_memdup(src->salt, src->salt_len, 146 &dest->salt, &dest->salt_len) 197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| pvkkdf.c | 35 size_t salt_len; member in struct:__anon556 81 if (!ossl_prov_memdup(src->salt, src->salt_len, 82 &dest->salt, &dest->salt_len) 172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) 196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p))
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| passwd.c | 334 size_t passwd_len, salt_len, magic_len; local 348 salt_len = strlen(ascii_salt); 350 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 380 assert(salt_len <= 8); 394 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 401 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 430 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 466 output = salt_out + salt_len; 525 size_t passwd_len, salt_len, magic_len; local 578 salt_len = strlen(ascii_salt) [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| passwd.c | 326 size_t passwd_len, salt_len, magic_len; local 340 salt_len = strlen(ascii_salt); 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 372 if (salt_len > 8) 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 459 output = salt_out + salt_len; 520 size_t passwd_len, salt_len, magic_len; local 573 salt_len = strlen(ascii_salt) [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| sskdf.c | 63 size_t salt_len; member in struct:__anon1606 215 const unsigned char *salt, size_t salt_len, 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { 400 ctx->salt_len = default_salt_len; 404 ctx->salt, ctx->salt_len, 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p))
|
| hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member in struct:__anon1597 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, 240 &ctx->salt_len)) 404 const unsigned char *salt, size_t salt_len, 420 salt, salt_len, ikm, ikm_len, prk, prk_len)) 455 const unsigned char *salt, size_t salt_len, 470 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| passwd.c | 323 size_t passwd_len, salt_len, magic_len; local 337 salt_len = strlen(ascii_salt); 339 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); 369 if (salt_len > 8) 384 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) 391 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) 420 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) 456 output = salt_out + salt_len; 517 size_t passwd_len, salt_len, magic_len; local 570 salt_len = strlen(ascii_salt) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local 431 salt_len = *ptr++; 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); 448 salt_pwd_len[1] = salt_len; 454 (int) salt_len); 455 ptr += salt_len; 468 salt_len = *ptr++; 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); [all...] |
| /src/lib/libcrypt/ |
| bcrypt.c | 215 u_int8_t key_len, salt_len, logr, minor; local 265 salt_len = BCRYPT_MAXSALT; 275 Blowfish_expandstate(&state, csalt, salt_len, 279 Blowfish_expand0state(&state, csalt, salt_len);
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| rand.h | 118 const void *salt, size_t salt_len);
|