Home
last modified time | relevance | path

Searched refs:salt (Results 176 - 200 of 596) sorted by relevance

12345678910>>...24

/third_party/typescript/tests/baselines/reference/
H A DinnerFunc.js2 function salt() { function
16 function salt() {
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dscrypt.c37 const unsigned char *salt, size_t saltlen,
47 unsigned char *salt; member
90 OPENSSL_free(ctx->salt); in kdf_scrypt_reset()
165 if (ctx->salt == NULL) { in kdf_scrypt_derive()
173 return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt, in kdf_scrypt_derive()
198 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params()
411 const unsigned char *salt, size_t saltlen, in scrypt_alg()
498 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256, in scrypt_alg()
410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
/third_party/openssl/providers/implementations/kdfs/
H A Dscrypt.c37 const unsigned char *salt, size_t saltlen,
47 unsigned char *salt; member
90 OPENSSL_free(ctx->salt); in kdf_scrypt_reset()
165 if (ctx->salt == NULL) { in kdf_scrypt_derive()
173 return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt, in kdf_scrypt_derive()
198 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params()
411 const unsigned char *salt, size_t saltlen, in scrypt_alg()
498 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256, in scrypt_alg()
410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
/third_party/libcoap/include/oscore/
H A Doscore_crypto.h87 * @param salt The optional salt value to use.
95 coap_bin_const_t *salt,
124 * @param salt The optional salt value to use.
134 coap_bin_const_t *salt,
/third_party/mbedtls/include/mbedtls/
H A Dhkdf.h50 * \param salt An optional salt value (a non-secret random value);
51 * if the salt is not provided, a string of all zeros of
52 * md.size length is used as the salt.
53 * \param salt_len The length in bytes of the optional \p salt.
68 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt,
84 * \param salt An optional salt value (a non-secret random value);
85 * if the salt is not provided, a string of all zeros
86 * of md.size length is used as the salt
[all...]
H A Dpkcs5.h141 * \param salt Salt to use when generating key
142 * \param slen Length of salt
151 size_t plen, const unsigned char *salt, size_t slen,
165 * \param salt Salt to use when generating key
166 * \param slen Length of salt
176 const unsigned char *salt,
/test/xts/device_attest/services/core/security/
H A Dattest_security.c152 void GetSalt(uint8_t* salt, uint32_t saltLen) in GetSalt() argument
154 if ((salt == NULL) || (saltLen != SALT_LEN)) { in GetSalt()
167 salt[i] = (uint8_t)((temp >> ((i % randomNumBytes) * offsetBits)) & 0xff); in GetSalt()
168 if (salt[i] == 0) { in GetSalt()
169 salt[i]++; in GetSalt()
339 int32_t GetAesKey(const SecurityParam* salt, const VersionData* versionData, const SecurityParam* aesKey) in GetAesKey() argument
341 if ((salt == NULL) || (versionData == NULL) || (aesKey == NULL) || (versionData->versionLen == 0)) { in GetAesKey()
362 ret = mbedtls_hkdf(mdInfo, salt->param, salt->paramLen, in GetAesKey()
/kernel/linux/linux-5.10/fs/verity/
H A Dfsverity_private.h94 __u8 salt_size; /* size of salt in bytes; 0 if none */
98 __u8 salt[32]; /* salt prepended to each hashed block */ member
135 const u8 *salt, size_t salt_size);
160 const u8 *salt, size_t salt_size,
H A Dopen.c20 * @salt: pointer to salt (optional)
21 * @salt_size: size of salt, possibly 0
33 const u8 *salt, size_t salt_size, in fsverity_init_merkle_tree_params()
50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
82 pr_debug("Merkle tree uses %s with %u-byte blocks (%u hashes/block), salt=%*phN\n", in fsverity_init_merkle_tree_params()
84 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
183 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info()
208 desc->salt, desc->salt_size, in fsverity_create_info()
29 fsverity_init_merkle_tree_params(struct merkle_tree_params *params, const struct inode *inode, unsigned int hash_algorithm, unsigned int log_blocksize, const u8 *salt, size_t salt_size, u64 data_size) fsverity_init_merkle_tree_params() argument
/test/xts/device_attest/services/core/adapter/
H A Dattest_adapter_hal.c69 if (memcpy_s(token + offset, sizeof(token), tokenInfo->salt, sizeof(tokenInfo->salt)) != 0) { in AttestWriteToken()
118 if (memcpy_s(tokenInfo->salt, SALT_ENCRYPT_LEN, token + offset, SALT_ENCRYPT_LEN) != 0) { in AttestReadToken()
/test/xts/device_attest_lite/services/core/adapter/
H A Dattest_adapter_hal.c69 if (memcpy_s(token + offset, sizeof(token), tokenInfo->salt, sizeof(tokenInfo->salt)) != 0) { in AttestWriteToken()
130 if (memcpy_s(tokenInfo->salt, SALT_ENCRYPT_LEN, token + offset, SALT_ENCRYPT_LEN) != 0) { in AttestReadToken()
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Devp_key.c79 const unsigned char *salt, const unsigned char *data, in EVP_BytesToKey()
107 if (salt != NULL) in EVP_BytesToKey()
108 if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN)) in EVP_BytesToKey()
78 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) EVP_BytesToKey() argument
/third_party/openssl/crypto/evp/
H A Devp_key.c79 const unsigned char *salt, const unsigned char *data, in EVP_BytesToKey()
107 if (salt != NULL) in EVP_BytesToKey()
108 if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN)) in EVP_BytesToKey()
78 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) EVP_BytesToKey() argument
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_sbag.c204 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
224 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
241 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
246 salt, saltlen, iter, p8inf, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
201 PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument
238 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
/third_party/openssl/crypto/pkcs12/
H A Dp12_sbag.c204 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
224 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
241 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
246 salt, saltlen, iter, p8inf, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
201 PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument
238 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.h22 u32 salt; member
38 u32 salt; member
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.h22 u32 salt; member
38 u32 salt; member
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c256 unsigned char *key_p, *salt; in chtls_key_info() local
276 salt = gcm_ctx_128->salt; in chtls_key_info()
289 salt = gcm_ctx_256->salt; in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c256 unsigned char *key_p, *salt; in chtls_key_info() local
276 salt = gcm_ctx_128->salt; in chtls_key_info()
289 salt = gcm_ctx_256->salt; in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/third_party/python/Modules/_blake2/impl/
H A Dblake2b-ref.c127 static inline int blake2b_param_set_salt( blake2b_param *P, const uint8_t salt[BLAKE2B_SALTBYTES] ) in blake2b_param_set_salt()
129 memcpy( P->salt, salt, BLAKE2B_SALTBYTES ); in blake2b_param_set_salt()
192 memset( P->salt, 0, sizeof( P->salt ) ); in blake2b_init()
215 memset( P->salt, 0, sizeof( P->salt ) ); in blake2b_init_key()
H A Dblake2s-ref.c120 static inline int blake2s_param_set_salt( blake2s_param *P, const uint8_t salt[BLAKE2S_SALTBYTES] ) in blake2s_param_set_salt()
122 memcpy( P->salt, salt, BLAKE2S_SALTBYTES ); in blake2s_param_set_salt()
186 memset( P->salt, 0, sizeof( P->salt ) ); in blake2s_init()
208 memset( P->salt, 0, sizeof( P->salt ) ); in blake2s_init_key()
/kernel/linux/linux-5.10/fs/hmdfs/comm/
H A Dcrypto.c44 memcpy(cctx->iv, crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in tls_crypto_set_key()
78 memcpy(tcp->connect->send_crypto_info.salt, in tls_crypto_info_init()
101 memcpy(tcp->connect->recv_crypto_info.salt, in tls_crypto_info_init()
135 memcpy(tcp->connect->send_crypto_info.salt, in tls_set_tx()
166 memcpy(tcp->connect->recv_crypto_info.salt, in tls_set_rx()
245 "ktls key update", "ktls iv&salt" };
/kernel/linux/linux-6.6/fs/hmdfs/comm/
H A Dcrypto.c44 memcpy(cctx->iv, crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in tls_crypto_set_key()
78 memcpy(tcp->connect->send_crypto_info.salt, in tls_crypto_info_init()
101 memcpy(tcp->connect->recv_crypto_info.salt, in tls_crypto_info_init()
135 memcpy(tcp->connect->send_crypto_info.salt, in tls_set_tx()
166 memcpy(tcp->connect->recv_crypto_info.salt, in tls_set_rx()
245 "ktls key update", "ktls iv&salt" };
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
H A Dhkdf.js28 // Test each combination of derivedKey size, salt size, hash function,
35 var testName = derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", with " + infoSize + " info";
36 var algorithm = {name: "HKDF", salt: salts[saltSize], info: infos[infoSize], hash: hashName};
65 testName += " using " + derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", with " + infoSize + " info";
89 var badAlgorithm = {name: "HKDF", salt: salts[saltSize], hash: badHash, info: algorithm.info};
122 // missing salt (TypeError)
126 assert_equals(derivation.byteLength, 0, "Derived even with missing salt");
128 assert_equals(err.name, "TypeError", "deriveBits missing salt correctly threw OperationError: " + err.message);
130 }, testName + " with missing salt");
134 return subtle.deriveBits({name: "HKDF", salt
[all...]
/third_party/musl/src/crypt/
H A Dcrypt_blowfish.c612 BF_word salt[4]; in BF_crypt() member
631 if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) { in BF_crypt()
634 BF_swap(data.binary.salt, 4); in BF_crypt()
646 L ^ data.binary.salt[0], R ^ data.binary.salt[1], in BF_crypt()
655 L ^ data.binary.salt[2], R ^ data.binary.salt[3], in BF_crypt()
683 tmp1 = data.binary.salt[0]; in BF_crypt()
684 tmp2 = data.binary.salt[1]; in BF_crypt()
685 tmp3 = data.binary.salt[ in BF_crypt()
[all...]

Completed in 15 milliseconds

12345678910>>...24