/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | tls.h | 129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member 153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member 161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member 169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member 177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member 185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set() 161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set() 164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set() 41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local [all...] |
/third_party/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set() 161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set() 164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set() 41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 46 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local 52 * salt contains a randomly generated value used in computing the key in OSSL_CRMF_pbmp_new() 53 * of the MAC process. The salt SHOULD be at least 8 octets (64 in OSSL_CRMF_pbmp_new() 56 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new() 58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new() 62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new() 109 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 112 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 119 * |pbmp| identifies the algorithms, salt t [all...] |
/third_party/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 46 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local 52 * salt contains a randomly generated value used in computing the key in OSSL_CRMF_pbmp_new() 53 * of the MAC process. The salt SHOULD be at least 8 octets (64 in OSSL_CRMF_pbmp_new() 56 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new() 58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new() 62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new() 109 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 112 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 119 * |pbmp| identifies the algorithms, salt t [all...] |
/third_party/typescript/tests/baselines/reference/ |
H A D | functionType.js | 2 function salt() {} function 3 salt.apply("hello", []); 10 function salt() { }
11 salt.apply("hello", []);
|
H A D | undeclaredMethod.js | 4 public salt() {} 10 c.salt(); // cool 21 C.prototype.salt = function () { };
27 c.salt(); // cool
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex() 59 if (salt == NULL) { in EVP_PBE_scrypt_ex() 60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex() 77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex() 91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt() 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt() 37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument 90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local 49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex() 50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex() 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local 49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex() 50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex() 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
|
/third_party/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex() 59 if (salt == NULL) { in EVP_PBE_scrypt_ex() 60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex() 77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex() 91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt() 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt() 37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument 90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
|
/third_party/node/test/parallel/ |
H A D | test-crypto-scrypt.js | 18 salt: '', 30 salt: '', 41 salt: 'NaCl', 52 salt: 'SodiumChloride', 63 salt: '', 74 salt: 'NaCl', 85 salt: 'SodiumChloride', 124 expected: { code: 'ERR_INVALID_ARG_TYPE', message: /"salt"/ }, 128 expected: { code: 'ERR_INVALID_ARG_TYPE', message: /"salt"/ }, 161 const { pass, salt, keyle [all...] |
/third_party/toybox/toys/other/ |
H A D | mkpasswd.c | 1 /* mkpasswd.c - encrypt the given passwd using salt 34 char salt[MAX_SALT_LEN] = {0,}; in mkpasswd_main() local 39 if (TT.S) error_exit("duplicate salt"); in mkpasswd_main() 43 if (-1 == (i = get_salt(salt, TT.m))) error_exit("bad -m"); in mkpasswd_main() 49 if (*s) error_exit("salt not in [./A-Za-z0-9]"); in mkpasswd_main() 51 snprintf(salt+i, sizeof(salt)-i, "%s", TT.S); in mkpasswd_main() 76 xprintf("%s\n",crypt(*toys.optargs ? *toys.optargs : toybuf, salt)); in mkpasswd_main()
|
/third_party/node/deps/openssl/openssl/crypto/des/ |
H A D | fcrypt.c | 31 * Added more values to handle illegal salt values the way normal crypt() 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt() 78 /* Copy salt, convert to ASCII. */ in DES_crypt() 79 e_salt[0] = salt[0]; in DES_crypt() 80 e_salt[1] = salt[1]; in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 108 x = ret[0] = salt[ in DES_fcrypt() [all...] |
/third_party/openssl/crypto/des/ |
H A D | fcrypt.c | 31 * Added more values to handle illegal salt values the way normal crypt() 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt() 78 /* Copy salt, convert to ASCII. */ in DES_crypt() 79 e_salt[0] = salt[0]; in DES_crypt() 80 e_salt[1] = salt[1]; in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 108 x = ret[0] = salt[ in DES_fcrypt() [all...] |
/drivers/peripheral/pin_auth/test/unittest/pin_auth/database/src/ |
H A D | pin_db_test.cpp | 59 (void)memset_s(pinEnrollParam->salt, CONST_SALT_LEN, 1, CONST_SALT_LEN); in HWTEST_F() 120 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F() 122 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[0], CONST_SALT_LEN); in HWTEST_F() 169 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F() 171 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[0], CONST_SALT_LEN); in HWTEST_F() 212 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F() 214 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[ in HWTEST_F() [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
/third_party/fsverity-utils/programs/ |
H A D | test_compute_digest.c | 51 const char *salt; member 95 }, { /* salt */ 99 .salt = "abcd", 104 }, { /* max length salt (32 bytes) */ 108 .salt = "0123456789:;<=>?@ABCDEFGHIJKLMNO", 141 .salt = "abcd", 175 if (t->salt != NULL) in fix_digest_and_print() 176 printf("\t\t.salt = \"%s\",\n", t->salt); in fix_digest_and_print() 237 params.salt in test_invalid_params() [all...] |
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/third_party/python/Modules/_blake2/clinic/ |
H A D | blake2s_impl.c.h | 7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n" 16 Py_buffer *key, Py_buffer *salt, Py_buffer *person, 25 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", "usedforsecurity", NULL}; in py_blake2s_new() 34 Py_buffer salt = {NULL, NULL}; in py_blake2s_new() local 80 if (PyObject_GetBuffer(fastargs[3], &salt, PyBUF_SIMPLE) != 0) { in py_blake2s_new() 83 if (!PyBuffer_IsContiguous(&salt, 'C')) { in py_blake2s_new() 84 _PyArg_BadArgument("blake2s", "argument 'salt'", "contiguous buffer", fastargs[3]); in py_blake2s_new() 169 return_value = py_blake2s_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size, node_offset, node_depth, inner_size, last_node, usedforsecurity); in py_blake2s_new() 176 /* Cleanup for salt */ in py_blake2s_new() 177 if (salt in py_blake2s_new() [all...] |
H A D | blake2b_impl.c.h | 7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n" 16 Py_buffer *key, Py_buffer *salt, Py_buffer *person, 25 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", "usedforsecurity", NULL}; in py_blake2b_new() 34 Py_buffer salt = {NULL, NULL}; in py_blake2b_new() local 80 if (PyObject_GetBuffer(fastargs[3], &salt, PyBUF_SIMPLE) != 0) { in py_blake2b_new() 83 if (!PyBuffer_IsContiguous(&salt, 'C')) { in py_blake2b_new() 84 _PyArg_BadArgument("blake2b", "argument 'salt'", "contiguous buffer", fastargs[3]); in py_blake2b_new() 169 return_value = py_blake2b_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size, node_offset, node_depth, inner_size, last_node, usedforsecurity); in py_blake2b_new() 176 /* Cleanup for salt */ in py_blake2b_new() 177 if (salt in py_blake2b_new() [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
H A D | pbkdf2.js | 26 // Test each combination of password size, salt size, hash function, 33 var testName = passwordSize + " password, " + saltSize + " salt, " + hashName + ", with " + iterations + " iterations"; 37 return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], 256) 52 testName += " using " + passwordSize + " password, " + saltSize + " salt, " + hashName + ", with " + iterations + " iterations"; 56 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 76 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 86 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 96 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages) 109 return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], null) 119 return subtle.deriveBits({name: "PBKDF2", salt [all...] |
/third_party/musl/src/crypt/ |
H A D | crypt_sha512.c | 7 * in the salt and rounds= setting must contain a valid iteration count, 214 const char *salt; in sha512crypt() local 223 /* setting: $6$rounds=n$salt$ (rounds=n$ and closing $ are optional) */ in sha512crypt() 226 salt = setting + 3; in sha512crypt() 229 if (strncmp(salt, "rounds=", sizeof "rounds=" - 1) == 0) { in sha512crypt() 240 * rounds as part of the salt or parse them with in sha512crypt() 245 salt += sizeof "rounds=" - 1; in sha512crypt() 246 if (!isdigit(*salt)) in sha512crypt() 248 u = strtoul(salt, &end, 10); in sha512crypt() 251 salt in sha512crypt() [all...] |