/third_party/typescript/tests/baselines/reference/ |
H A D | innerFunc.js | 2 function salt() { function 16 function salt() {
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 37 const unsigned char *salt, size_t saltlen, 47 unsigned char *salt; member 90 OPENSSL_free(ctx->salt); in kdf_scrypt_reset() 165 if (ctx->salt == NULL) { in kdf_scrypt_derive() 173 return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt, in kdf_scrypt_derive() 198 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params() 411 const unsigned char *salt, size_t saltlen, in scrypt_alg() 498 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256, in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 37 const unsigned char *salt, size_t saltlen, 47 unsigned char *salt; member 90 OPENSSL_free(ctx->salt); in kdf_scrypt_reset() 165 if (ctx->salt == NULL) { in kdf_scrypt_derive() 173 return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt, in kdf_scrypt_derive() 198 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params() 411 const unsigned char *salt, size_t saltlen, in scrypt_alg() 498 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256, in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
|
/third_party/libcoap/include/oscore/ |
H A D | oscore_crypto.h | 87 * @param salt The optional salt value to use. 95 coap_bin_const_t *salt, 124 * @param salt The optional salt value to use. 134 coap_bin_const_t *salt,
|
/third_party/mbedtls/include/mbedtls/ |
H A D | hkdf.h | 50 * \param salt An optional salt value (a non-secret random value); 51 * if the salt is not provided, a string of all zeros of 52 * md.size length is used as the salt. 53 * \param salt_len The length in bytes of the optional \p salt. 68 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, 84 * \param salt An optional salt value (a non-secret random value); 85 * if the salt is not provided, a string of all zeros 86 * of md.size length is used as the salt [all...] |
H A D | pkcs5.h | 141 * \param salt Salt to use when generating key 142 * \param slen Length of salt 151 size_t plen, const unsigned char *salt, size_t slen, 165 * \param salt Salt to use when generating key 166 * \param slen Length of salt 176 const unsigned char *salt,
|
/test/xts/device_attest/services/core/security/ |
H A D | attest_security.c | 152 void GetSalt(uint8_t* salt, uint32_t saltLen) in GetSalt() argument 154 if ((salt == NULL) || (saltLen != SALT_LEN)) { in GetSalt() 167 salt[i] = (uint8_t)((temp >> ((i % randomNumBytes) * offsetBits)) & 0xff); in GetSalt() 168 if (salt[i] == 0) { in GetSalt() 169 salt[i]++; in GetSalt() 339 int32_t GetAesKey(const SecurityParam* salt, const VersionData* versionData, const SecurityParam* aesKey) in GetAesKey() argument 341 if ((salt == NULL) || (versionData == NULL) || (aesKey == NULL) || (versionData->versionLen == 0)) { in GetAesKey() 362 ret = mbedtls_hkdf(mdInfo, salt->param, salt->paramLen, in GetAesKey()
|
/kernel/linux/linux-5.10/fs/verity/ |
H A D | fsverity_private.h | 94 __u8 salt_size; /* size of salt in bytes; 0 if none */ 98 __u8 salt[32]; /* salt prepended to each hashed block */ member 135 const u8 *salt, size_t salt_size); 160 const u8 *salt, size_t salt_size,
|
H A D | open.c | 20 * @salt: pointer to salt (optional) 21 * @salt_size: size of salt, possibly 0 33 const u8 *salt, size_t salt_size, in fsverity_init_merkle_tree_params() 50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 82 pr_debug("Merkle tree uses %s with %u-byte blocks (%u hashes/block), salt=%*phN\n", in fsverity_init_merkle_tree_params() 84 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 183 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info() 208 desc->salt, desc->salt_size, in fsverity_create_info() 29 fsverity_init_merkle_tree_params(struct merkle_tree_params *params, const struct inode *inode, unsigned int hash_algorithm, unsigned int log_blocksize, const u8 *salt, size_t salt_size, u64 data_size) fsverity_init_merkle_tree_params() argument
|
/test/xts/device_attest/services/core/adapter/ |
H A D | attest_adapter_hal.c | 69 if (memcpy_s(token + offset, sizeof(token), tokenInfo->salt, sizeof(tokenInfo->salt)) != 0) {
in AttestWriteToken() 118 if (memcpy_s(tokenInfo->salt, SALT_ENCRYPT_LEN, token + offset, SALT_ENCRYPT_LEN) != 0) {
in AttestReadToken()
|
/test/xts/device_attest_lite/services/core/adapter/ |
H A D | attest_adapter_hal.c | 69 if (memcpy_s(token + offset, sizeof(token), tokenInfo->salt, sizeof(tokenInfo->salt)) != 0) {
in AttestWriteToken() 130 if (memcpy_s(tokenInfo->salt, SALT_ENCRYPT_LEN, token + offset, SALT_ENCRYPT_LEN) != 0) {
in AttestReadToken()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | evp_key.c | 79 const unsigned char *salt, const unsigned char *data, in EVP_BytesToKey() 107 if (salt != NULL) in EVP_BytesToKey() 108 if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN)) in EVP_BytesToKey() 78 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) EVP_BytesToKey() argument
|
/third_party/openssl/crypto/evp/ |
H A D | evp_key.c | 79 const unsigned char *salt, const unsigned char *data, in EVP_BytesToKey() 107 if (salt != NULL) in EVP_BytesToKey() 108 if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN)) in EVP_BytesToKey() 78 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) EVP_BytesToKey() argument
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_sbag.c | 204 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() 224 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() 241 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt() 246 salt, saltlen, iter, p8inf, in PKCS12_SAFEBAG_create_pkcs8_encrypt() 201 PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument 238 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_sbag.c | 204 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() 224 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() 241 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt() 246 salt, saltlen, iter, p8inf, in PKCS12_SAFEBAG_create_pkcs8_encrypt() 201 PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument 238 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
/third_party/python/Modules/_blake2/impl/ |
H A D | blake2b-ref.c | 127 static inline int blake2b_param_set_salt( blake2b_param *P, const uint8_t salt[BLAKE2B_SALTBYTES] ) in blake2b_param_set_salt() 129 memcpy( P->salt, salt, BLAKE2B_SALTBYTES ); in blake2b_param_set_salt() 192 memset( P->salt, 0, sizeof( P->salt ) ); in blake2b_init() 215 memset( P->salt, 0, sizeof( P->salt ) ); in blake2b_init_key()
|
H A D | blake2s-ref.c | 120 static inline int blake2s_param_set_salt( blake2s_param *P, const uint8_t salt[BLAKE2S_SALTBYTES] ) in blake2s_param_set_salt() 122 memcpy( P->salt, salt, BLAKE2S_SALTBYTES ); in blake2s_param_set_salt() 186 memset( P->salt, 0, sizeof( P->salt ) ); in blake2s_init() 208 memset( P->salt, 0, sizeof( P->salt ) ); in blake2s_init_key()
|
/kernel/linux/linux-5.10/fs/hmdfs/comm/ |
H A D | crypto.c | 44 memcpy(cctx->iv, crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in tls_crypto_set_key() 78 memcpy(tcp->connect->send_crypto_info.salt, in tls_crypto_info_init() 101 memcpy(tcp->connect->recv_crypto_info.salt, in tls_crypto_info_init() 135 memcpy(tcp->connect->send_crypto_info.salt, in tls_set_tx() 166 memcpy(tcp->connect->recv_crypto_info.salt, in tls_set_rx() 245 "ktls key update", "ktls iv&salt" };
|
/kernel/linux/linux-6.6/fs/hmdfs/comm/ |
H A D | crypto.c | 44 memcpy(cctx->iv, crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in tls_crypto_set_key() 78 memcpy(tcp->connect->send_crypto_info.salt, in tls_crypto_info_init() 101 memcpy(tcp->connect->recv_crypto_info.salt, in tls_crypto_info_init() 135 memcpy(tcp->connect->send_crypto_info.salt, in tls_set_tx() 166 memcpy(tcp->connect->recv_crypto_info.salt, in tls_set_rx() 245 "ktls key update", "ktls iv&salt" };
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
H A D | hkdf.js | 28 // Test each combination of derivedKey size, salt size, hash function, 35 var testName = derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", with " + infoSize + " info"; 36 var algorithm = {name: "HKDF", salt: salts[saltSize], info: infos[infoSize], hash: hashName}; 65 testName += " using " + derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", with " + infoSize + " info"; 89 var badAlgorithm = {name: "HKDF", salt: salts[saltSize], hash: badHash, info: algorithm.info}; 122 // missing salt (TypeError) 126 assert_equals(derivation.byteLength, 0, "Derived even with missing salt"); 128 assert_equals(err.name, "TypeError", "deriveBits missing salt correctly threw OperationError: " + err.message); 130 }, testName + " with missing salt"); 134 return subtle.deriveBits({name: "HKDF", salt [all...] |
/third_party/musl/src/crypt/ |
H A D | crypt_blowfish.c | 612 BF_word salt[4]; in BF_crypt() member 631 if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) { in BF_crypt() 634 BF_swap(data.binary.salt, 4); in BF_crypt() 646 L ^ data.binary.salt[0], R ^ data.binary.salt[1], in BF_crypt() 655 L ^ data.binary.salt[2], R ^ data.binary.salt[3], in BF_crypt() 683 tmp1 = data.binary.salt[0]; in BF_crypt() 684 tmp2 = data.binary.salt[1]; in BF_crypt() 685 tmp3 = data.binary.salt[ in BF_crypt() [all...] |