/third_party/mbedtls/library/ |
H A D | hkdf.c | 29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() 36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 49 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() 58 if (salt_len != 0) { in mbedtls_hkdf_extract() 69 salt_len = hash_len; in mbedtls_hkdf_extract() 72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract() 28 mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) mbedtls_hkdf() argument 48 mbedtls_hkdf_extract(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk) mbedtls_hkdf_extract() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs5.c | 27 size_t salt_len; member 179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 327 params->salt_len = hdr.length; in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() 419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 425 if (salt_len) { in pkcs12_key_gen() 400 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) pkcs12_key_gen() argument [all...] |
/third_party/f2fs-tools/tools/ |
H A D | f2fscrypt.c | 241 size_t salt_len; member 248 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 254 if ((p->salt_len == salt_len) && in find_by_salt() 255 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 260 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 262 if (find_by_salt(salt, salt_len)) in add_salt() 273 salt_list[num_salt].salt_len = salt_len; in add_salt() 333 int fd, ret, salt_len in parse_salt() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() 422 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) pkcs12_key_gen() argument [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len in shacrypt() [all...] |
/third_party/openssl/apps/ |
H A D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len in shacrypt() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 240 &ctx->salt_len)) in hkdf_common_set_ctx_params() 396 const unsigned char *salt, size_t salt_len, in HKDF() 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() 462 salt_len, ik in HKDF_Extract() 395 HKDF(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF() argument 446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument [all...] |
H A D | sskdf.c | 63 size_t salt_len; member 215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 400 ctx->salt_len = default_salt_len; in sskdf_derive() 404 ctx->salt, ctx->salt_len, in sskdf_derive() 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params() 212 SSKDF_mac_kdm(EVP_MAC_CTX *ctx_init, const unsigned char *kmac_custom, size_t kmac_custom_len, size_t kmac_out_len, const unsigned char *salt, size_t salt_len, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned char *derived_key, size_t derived_key_len) SSKDF_mac_kdm() argument
|
H A D | pbkdf1.c | 41 size_t salt_len; member 178 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive() 196 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
|
H A D | pbkdf2.c | 58 size_t salt_len; member 165 ctx->salt, ctx->salt_len, ctx->iter, in kdf_pbkdf2_derive() 199 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf2_set_ctx_params()
|
H A D | pkcs12kdf.c | 41 size_t salt_len; member 220 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pkcs12_derive() 241 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pkcs12_set_ctx_params()
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 240 &ctx->salt_len)) in hkdf_common_set_ctx_params() 396 const unsigned char *salt, size_t salt_len, in HKDF() 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() 462 salt_len, ik in HKDF_Extract() 395 HKDF(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF() argument 446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument [all...] |
H A D | sskdf.c | 63 size_t salt_len; member 215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 400 ctx->salt_len = default_salt_len; in sskdf_derive() 404 ctx->salt, ctx->salt_len, in sskdf_derive() 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params() 212 SSKDF_mac_kdm(EVP_MAC_CTX *ctx_init, const unsigned char *kmac_custom, size_t kmac_custom_len, size_t kmac_out_len, const unsigned char *salt, size_t salt_len, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned char *derived_key, size_t derived_key_len) SSKDF_mac_kdm() argument
|
H A D | pbkdf1.c | 41 size_t salt_len; member 172 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive() 190 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len in eap_pwd_build_commit_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len in eap_pwd_build_commit_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | hkdf.h | 53 * \param salt_len The length in bytes of the optional \p salt. 69 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 87 * \param salt_len The length in bytes of the optional \p salt. 98 const unsigned char *salt, size_t salt_len,
|
/third_party/node/src/crypto/ |
H A D | crypto_sig.cc | 60 const Maybe<int>& salt_len) { in ValidateDSAParameters() 66 if (padding == RSA_PKCS1_PSS_PADDING && salt_len.IsJust()) { in ValidateDSAParameters() 67 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, salt_len.FromJust()) <= 0) in ValidateDSAParameters() 391 const Maybe<int>& salt_len, in SignFinal() 402 Node_SignFinal(env(), std::move(mdctx), pkey, padding, salt_len); in SignFinal() 429 Maybe<int> salt_len = Nothing<int>(); in SignFinal() local 432 salt_len = Just<int>(args[offset + 1].As<Int32>()->Value()); in SignFinal() 442 salt_len, in SignFinal() 560 Maybe<int> salt_len = Nothing<int>(); in VerifyFinal() local 563 salt_len in VerifyFinal() 57 ApplyRSAOptions(const ManagedEVPPKey& pkey, EVP_PKEY_CTX* pkctx, int padding, const Maybe<int>& salt_len) ValidateDSAParameters() argument 388 SignFinal( const ManagedEVPPKey& pkey, int padding, const Maybe<int>& salt_len, DSASigEnc dsa_sig_enc) SignFinal() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/rand/ |
H A D | prov_seed.c | 49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce() 47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
|
/third_party/openssl/crypto/rand/ |
H A D | prov_seed.c | 49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce() 47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
|
/third_party/node/deps/openssl/openssl/providers/common/ |
H A D | provider_seeding.c | 65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
|
/third_party/openssl/providers/common/ |
H A D | provider_seeding.c | 65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | authsrv.c | 80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user() 82 eap_user->salt_len); in hostapd_radius_get_eap_user() 85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()
|