/third_party/musl/src/crypt/ |
H A D | crypt_r.c | 3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument 10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r() 11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r() 12 return __crypt_md5(key, salt, output); in __crypt_r() 13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r() 14 return __crypt_blowfish(key, salt, outpu in __crypt_r() [all...] |
/third_party/musl/libc-test/src/functionalext/crypt/ |
H A D | crypt.c | 22 char *salt; in test_crypt() local 24 salt = "$1$"; in test_crypt() 25 char *md5_result = crypt(key, salt); in test_crypt() 29 salt = "$2$"; in test_crypt() 30 char *blowfish_result_first = crypt(key, salt); in test_crypt() 31 char *blowfish_result_second = crypt(key, salt); in test_crypt() 34 salt = "$5$"; in test_crypt() 35 char *sha256_result = crypt(key, salt); in test_crypt() 40 salt = "$6$"; in test_crypt() 41 char *sha512_result = crypt(key, salt); in test_crypt() [all...] |
/third_party/f2fs-tools/tools/ |
H A D | f2fscrypt.c | 236 struct salt { struct 237 unsigned char *salt; member 243 struct salt *salt_list; 248 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 251 struct salt *p; in find_by_salt() 255 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 260 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 262 if (find_by_salt(salt, salt_le in add_salt() 409 struct salt *salt; set_policy() local 464 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[F2FS_MAX_KEY_SIZE]) pbkdf2_sha512() argument 601 generate_key_ref_str(struct salt *salt) generate_key_ref_str() argument 617 insert_key_into_keyring(const char *keyring, struct salt *salt) insert_key_into_keyring() argument 704 struct salt *salt; do_add_key() local [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_hkdf.cc | 25 salt(std::move(other.salt)), 69 ArrayBufferOrViewContents<char> salt(args[offset + 2]); in AdditionalConfig() 72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig() 73 THROW_ERR_OUT_OF_RANGE(env, "salt is too big"); in AdditionalConfig() 81 params->salt = mode == kCryptoJobAsync in AdditionalConfig() 82 ? salt.ToCopy() in AdditionalConfig() 83 : salt.ToByteSource(); in AdditionalConfig() 120 std::string_view salt; in DeriveBits() local 121 if (params.salt in DeriveBits() [all...] |
H A D | crypto_pbkdf2.cc | 23 salt(std::move(other.salt)), 38 tracker->TrackFieldWithSize("salt", salt.size()); in MemoryInfo() 54 // 3. The salt 68 ArrayBufferOrViewContents<char> salt(args[offset + 1]); in AdditionalConfig() 75 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig() 76 THROW_ERR_OUT_OF_RANGE(env, "salt is too large"); in AdditionalConfig() 84 params->salt = mode == kCryptoJobAsync in AdditionalConfig() 85 ? salt in AdditionalConfig() [all...] |
H A D | crypto_scrypt.cc | 26 salt(std::move(other.salt)), 42 tracker->TrackFieldWithSize("salt", salt.size()); in MemoryInfo() 65 ArrayBufferOrViewContents<char> salt(args[offset + 1]); in AdditionalConfig() 72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig() 73 THROW_ERR_OUT_OF_RANGE(env, "salt is too large"); in AdditionalConfig() 81 params->salt = mode == kCryptoJobAsync in AdditionalConfig() 82 ? salt.ToCopy() in AdditionalConfig() 83 : salt in AdditionalConfig() [all...] |
/third_party/node/lib/internal/crypto/ |
H A D | hkdf.js | 51 const validateParameters = hideStackFrames((hash, key, salt, info, length) => { 54 salt = validateByteSource(salt, 'salt'); 69 salt, 101 function hkdf(hash, key, salt, info, length, callback) { 105 salt, 108 } = validateParameters(hash, key, salt, info, length)); 112 const job = new HKDFJob(kCryptoJobAsync, hash, key, salt, info, length); 122 function hkdfSync(hash, key, salt, inf [all...] |
H A D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { 39 ({ password, salt, iterations, keylen, digest } = 40 check(password, salt, iterations, keylen, digest)); 47 salt, 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { 66 ({ password, salt, iterations, keylen, digest } = 67 check(password, salt, iterations, keylen, digest)); 72 salt, 86 function check(password, salt, iterations, keylen, digest) { 90 salt [all...] |
H A D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { 47 options = check(password, salt, keylen, options); 49 ({ password, salt, keylen } = options); 54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); 69 function scryptSync(password, salt, keylen, options = defaults) { 70 options = check(password, salt, keylen, options); 72 ({ password, salt, keylen } = options); 74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen); 85 function check(password, salt, keylen, options) { 90 salt [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 106 salt = p12->mac->salt->data; in pkcs12_gen_mac() 107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltle in pkcs12_gen_mac() 55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument 76 pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen, int (*pkcs12_key_gen)(const char *pass, int passlen, unsigned char *salt, int slen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type)) pkcs12_gen_mac() argument 209 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) PKCS12_set_mac() argument 242 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) PKCS12_setup_mac() argument [all...] |
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 106 salt, saltle in PKCS12_key_gen_uni_ex() 133 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) PKCS12_key_gen_uni() argument [all...] |
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 106 salt = p12->mac->salt->data; in pkcs12_gen_mac() 107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltle in pkcs12_gen_mac() 55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument 76 pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen, int (*pkcs12_key_gen)(const char *pass, int passlen, unsigned char *salt, int slen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type)) pkcs12_gen_mac() argument 204 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) PKCS12_set_mac() argument 237 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) PKCS12_setup_mac() argument [all...] |
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 106 salt, saltle in PKCS12_key_gen_uni_ex() 133 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) PKCS12_key_gen_uni() argument [all...] |
/third_party/node/benchmark/crypto/ |
H A D | hkdf.js | 14 salt: ['', 'salt'], 20 function measureSync(n, size, salt, info, hash, key) { 23 hkdfSync(hash, key, salt, info, size); 27 function measureAsync(n, size, salt, info, hash, key) { 36 hkdf(hash, key, salt, info, size, done); 39 function main({ n, sync, size, salt, info, hash, key }) { 41 measureSync(n, size, salt, info, hash, key); 43 measureAsync(n, size, salt, info, hash, key);
|
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_asymmetric_encryption.c | 31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 150 size_t input_length, const uint8_t *salt, size_ in mbedtls_test_opaque_asymmetric_decrypt() 28 mbedtls_test_transparent_asymmetric_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_transparent_asymmetric_encrypt() argument 69 mbedtls_test_transparent_asymmetric_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_transparent_asymmetric_decrypt() argument 113 mbedtls_test_opaque_asymmetric_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_opaque_asymmetric_encrypt() argument 147 mbedtls_test_opaque_asymmetric_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_opaque_asymmetric_decrypt() argument [all...] |
/third_party/python/Lib/test/ |
H A D | test_crypt.py | 41 salt = crypt.mksalt(method) 42 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7}) 44 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars]) 72 salt = crypt.mksalt(method, rounds=rounds) 73 self.assertIn('$rounds=%d$' % rounds, salt) 74 self.assertEqual(len(salt) - method.salt_chars, 76 cr = crypt.crypt('mypassword', salt) 86 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds) 87 self.assertIn('$%02d$' % log_rounds, salt) [all...] |
/third_party/typescript/tests/baselines/reference/ |
H A D | recur1.js | 2 var salt:any = new salt.pepper(); 3 salt.pepper = function() {} 11 var salt = new salt.pepper();
12 salt.pepper = function () { };
|
/third_party/python/Lib/ |
H A D | crypt.py | 29 """Class representing a salt method per the Modular Crypt Format or the 37 """Generate a salt for the specified method. 74 def crypt(word, salt=None): 75 """Return a string representing the one-way hash of a password, with a salt 78 If ``salt`` is not specified or is ``None``, the strongest 79 available method will be selected and a salt generated. Otherwise, 80 ``salt`` may be one of the ``crypt.METHOD_*`` values, or a string as 84 if salt is None or isinstance(salt, _Method): 85 salt [all...] |
/third_party/skia/third_party/externals/abseil-cpp/absl/hash/internal/ |
H A D | low_level_hash.cc | 43 const uint64_t salt[]) { in LowLevelHash() 46 uint64_t current_state = seed ^ salt[0]; in LowLevelHash() 64 uint64_t cs0 = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 65 uint64_t cs1 = Mix(c ^ salt[2], d ^ current_state); in LowLevelHash() 68 uint64_t ds0 = Mix(e ^ salt[3], f ^ duplicated_state); in LowLevelHash() 69 uint64_t ds1 = Mix(g ^ salt[4], h ^ duplicated_state); in LowLevelHash() 85 current_state = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 116 uint64_t w = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 117 uint64_t z = salt[1] ^ starting_length; in LowLevelHash() 42 LowLevelHash(const void* data, size_t len, uint64_t seed, const uint64_t salt[]) LowLevelHash() argument
|
/third_party/mbedtls/library/ |
H A D | pkcs12.c | 37 mbedtls_asn1_buf *salt, int *iterations) in pkcs12_parse_pbe_params() 45 * salt OCTET STRING, in pkcs12_parse_pbe_params() 55 if ((ret = mbedtls_asn1_get_tag(p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pkcs12_parse_pbe_params() 59 salt->p = *p; in pkcs12_parse_pbe_params() 60 *p += salt->len; in pkcs12_parse_pbe_params() 82 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 90 memset(&salt, 0, sizeof(mbedtls_asn1_buf)); in pkcs12_pbe_derive_key_iv() 93 if ((ret = pkcs12_parse_pbe_params(pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 103 salt.p, salt in pkcs12_pbe_derive_key_iv() 36 pkcs12_parse_pbe_params(mbedtls_asn1_buf *params, mbedtls_asn1_buf *salt, int *iterations) pkcs12_parse_pbe_params() argument 326 mbedtls_pkcs12_derivation(unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mbedtls_md_type_t md_type, int id, int iterations) mbedtls_pkcs12_derivation() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() 41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex() 42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex() 55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument 87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC() 93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 185 unsigned char *salt, ke in PKCS5_v2_PBKDF2_keyivgen_ex() local 22 ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out, OSSL_LIB_CTX *libctx, const char *propq) ossl_pkcs5_pbkdf2_hmac_ex() argument 92 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) PKCS5_PBKDF2_HMAC_SHA1() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() 41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex() 42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex() 55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument 87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC() 93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 185 unsigned char *salt, ke in PKCS5_v2_PBKDF2_keyivgen_ex() local 22 ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out, OSSL_LIB_CTX *libctx, const char *propq) ossl_pkcs5_pbkdf2_hmac_ex() argument 92 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) PKCS5_PBKDF2_HMAC_SHA1() argument [all...] |
/third_party/python/Modules/clinic/ |
H A D | _cryptmodule.c.h | 6 "crypt($module, word, salt, /)\n" 9 "Hash a *word* with the given *salt* and return the hashed password.\n" 11 "*word* will usually be a user\'s password. *salt* (either a random 2 or 16\n" 20 crypt_crypt_impl(PyObject *module, const char *word, const char *salt); 27 const char *salt; in crypt_crypt() local 50 salt = PyUnicode_AsUTF8AndSize(args[1], &salt_length); in crypt_crypt() 51 if (salt == NULL) { in crypt_crypt() 54 if (strlen(salt) != (size_t)salt_length) { in crypt_crypt() 58 return_value = crypt_crypt_impl(module, word, salt); in crypt_crypt()
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set() 161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set() 164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set() 41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local [all...] |
/third_party/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set() 161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set() 164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set() 41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local [all...] |