Home
last modified time | relevance | path

Searched refs:salt (Results 26 - 50 of 618) sorted by relevance

12345678910>>...25

/kernel/linux/linux-6.6/include/uapi/linux/
H A Dtls.h129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member
161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member
169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member
177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member
185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dp5_scrypt.c24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt()
112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set()
161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set()
164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set()
41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument
216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local
[all...]
/third_party/openssl/crypto/asn1/
H A Dp5_scrypt.c24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt()
112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set()
161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set()
164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set()
41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument
216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/crmf/
H A Dcrmf_pbm.c46 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local
52 * salt contains a randomly generated value used in computing the key in OSSL_CRMF_pbmp_new()
53 * of the MAC process. The salt SHOULD be at least 8 octets (64 in OSSL_CRMF_pbmp_new()
56 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new()
58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new()
62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new()
109 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
112 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
119 * |pbmp| identifies the algorithms, salt t
[all...]
/third_party/openssl/crypto/crmf/
H A Dcrmf_pbm.c46 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local
52 * salt contains a randomly generated value used in computing the key in OSSL_CRMF_pbmp_new()
53 * of the MAC process. The salt SHOULD be at least 8 octets (64 in OSSL_CRMF_pbmp_new()
56 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new()
58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new()
62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new()
109 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
112 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
119 * |pbmp| identifies the algorithms, salt t
[all...]
/third_party/typescript/tests/baselines/reference/
H A DfunctionType.js2 function salt() {} function
3 salt.apply("hello", []);
10 function salt() { }
11 salt.apply("hello", []);
H A DundeclaredMethod.js4 public salt() {}
10 c.salt(); // cool
21 C.prototype.salt = function () { };
27 c.salt(); // cool
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dpbe_scrypt.c38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex()
59 if (salt == NULL) { in EVP_PBE_scrypt_ex()
60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex()
77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex()
91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt()
95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument
90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_crpt.c30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local
49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex()
50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex()
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex()
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
/third_party/openssl/crypto/pkcs12/
H A Dp12_crpt.c30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local
49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex()
50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex()
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex()
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
/third_party/openssl/crypto/evp/
H A Dpbe_scrypt.c38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex()
59 if (salt == NULL) { in EVP_PBE_scrypt_ex()
60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex()
77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex()
91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt()
95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument
90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
/third_party/node/test/parallel/
H A Dtest-crypto-scrypt.js18 salt: '',
30 salt: '',
41 salt: 'NaCl',
52 salt: 'SodiumChloride',
63 salt: '',
74 salt: 'NaCl',
85 salt: 'SodiumChloride',
124 expected: { code: 'ERR_INVALID_ARG_TYPE', message: /"salt"/ },
128 expected: { code: 'ERR_INVALID_ARG_TYPE', message: /"salt"/ },
161 const { pass, salt, keyle
[all...]
/third_party/toybox/toys/other/
H A Dmkpasswd.c1 /* mkpasswd.c - encrypt the given passwd using salt
34 char salt[MAX_SALT_LEN] = {0,}; in mkpasswd_main() local
39 if (TT.S) error_exit("duplicate salt"); in mkpasswd_main()
43 if (-1 == (i = get_salt(salt, TT.m))) error_exit("bad -m"); in mkpasswd_main()
49 if (*s) error_exit("salt not in [./A-Za-z0-9]"); in mkpasswd_main()
51 snprintf(salt+i, sizeof(salt)-i, "%s", TT.S); in mkpasswd_main()
76 xprintf("%s\n",crypt(*toys.optargs ? *toys.optargs : toybuf, salt)); in mkpasswd_main()
/third_party/node/deps/openssl/openssl/crypto/des/
H A Dfcrypt.c31 * Added more values to handle illegal salt values the way normal crypt()
64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
69 return DES_fcrypt(buf, salt, buff); in DES_crypt()
75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt()
78 /* Copy salt, convert to ASCII. */ in DES_crypt()
79 e_salt[0] = salt[0]; in DES_crypt()
80 e_salt[1] = salt[1]; in DES_crypt()
97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
108 x = ret[0] = salt[ in DES_fcrypt()
[all...]
/third_party/openssl/crypto/des/
H A Dfcrypt.c31 * Added more values to handle illegal salt values the way normal crypt()
64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
69 return DES_fcrypt(buf, salt, buff); in DES_crypt()
75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt()
78 /* Copy salt, convert to ASCII. */ in DES_crypt()
79 e_salt[0] = salt[0]; in DES_crypt()
80 e_salt[1] = salt[1]; in DES_crypt()
97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
108 x = ret[0] = salt[ in DES_fcrypt()
[all...]
/drivers/peripheral/pin_auth/test/unittest/pin_auth/database/src/
H A Dpin_db_test.cpp59 (void)memset_s(pinEnrollParam->salt, CONST_SALT_LEN, 1, CONST_SALT_LEN); in HWTEST_F()
120 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F()
122 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[0], CONST_SALT_LEN); in HWTEST_F()
169 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F()
171 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[0], CONST_SALT_LEN); in HWTEST_F()
212 std::vector<uint8_t> salt(CONST_SALT_LEN, 1); in HWTEST_F()
214 (void)memcpy_s(&(pinEnrollParam->salt[0]), CONST_SALT_LEN, &salt[ in HWTEST_F()
[all...]
/kernel/linux/linux-5.10/include/linux/
H A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt)
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/kernel/linux/linux-6.6/include/linux/
H A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt)
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/third_party/fsverity-utils/programs/
H A Dtest_compute_digest.c51 const char *salt; member
95 }, { /* salt */
99 .salt = "abcd",
104 }, { /* max length salt (32 bytes) */
108 .salt = "0123456789:;<=>?@ABCDEFGHIJKLMNO",
141 .salt = "abcd",
175 if (t->salt != NULL) in fix_digest_and_print()
176 printf("\t\t.salt = \"%s\",\n", t->salt); in fix_digest_and_print()
237 params.salt in test_invalid_params()
[all...]
/kernel/linux/linux-5.10/fs/ecryptfs/
H A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/kernel/linux/linux-6.6/fs/ecryptfs/
H A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/third_party/python/Modules/_blake2/clinic/
H A Dblake2s_impl.c.h7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n"
16 Py_buffer *key, Py_buffer *salt, Py_buffer *person,
25 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", "usedforsecurity", NULL}; in py_blake2s_new()
34 Py_buffer salt = {NULL, NULL}; in py_blake2s_new() local
80 if (PyObject_GetBuffer(fastargs[3], &salt, PyBUF_SIMPLE) != 0) { in py_blake2s_new()
83 if (!PyBuffer_IsContiguous(&salt, 'C')) { in py_blake2s_new()
84 _PyArg_BadArgument("blake2s", "argument 'salt'", "contiguous buffer", fastargs[3]); in py_blake2s_new()
169 return_value = py_blake2s_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size, node_offset, node_depth, inner_size, last_node, usedforsecurity); in py_blake2s_new()
176 /* Cleanup for salt */ in py_blake2s_new()
177 if (salt in py_blake2s_new()
[all...]
H A Dblake2b_impl.c.h7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n"
16 Py_buffer *key, Py_buffer *salt, Py_buffer *person,
25 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", "usedforsecurity", NULL}; in py_blake2b_new()
34 Py_buffer salt = {NULL, NULL}; in py_blake2b_new() local
80 if (PyObject_GetBuffer(fastargs[3], &salt, PyBUF_SIMPLE) != 0) { in py_blake2b_new()
83 if (!PyBuffer_IsContiguous(&salt, 'C')) { in py_blake2b_new()
84 _PyArg_BadArgument("blake2b", "argument 'salt'", "contiguous buffer", fastargs[3]); in py_blake2b_new()
169 return_value = py_blake2b_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size, node_offset, node_depth, inner_size, last_node, usedforsecurity); in py_blake2b_new()
176 /* Cleanup for salt */ in py_blake2b_new()
177 if (salt in py_blake2b_new()
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
H A Dpbkdf2.js26 // Test each combination of password size, salt size, hash function,
33 var testName = passwordSize + " password, " + saltSize + " salt, " + hashName + ", with " + iterations + " iterations";
37 return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], 256)
52 testName += " using " + passwordSize + " password, " + saltSize + " salt, " + hashName + ", with " + iterations + " iterations";
56 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
76 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
86 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
96 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages)
109 return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], null)
119 return subtle.deriveBits({name: "PBKDF2", salt
[all...]
/third_party/musl/src/crypt/
H A Dcrypt_sha512.c7 * in the salt and rounds= setting must contain a valid iteration count,
214 const char *salt; in sha512crypt() local
223 /* setting: $6$rounds=n$salt$ (rounds=n$ and closing $ are optional) */ in sha512crypt()
226 salt = setting + 3; in sha512crypt()
229 if (strncmp(salt, "rounds=", sizeof "rounds=" - 1) == 0) { in sha512crypt()
240 * rounds as part of the salt or parse them with in sha512crypt()
245 salt += sizeof "rounds=" - 1; in sha512crypt()
246 if (!isdigit(*salt)) in sha512crypt()
248 u = strtoul(salt, &end, 10); in sha512crypt()
251 salt in sha512crypt()
[all...]

Completed in 12 milliseconds

12345678910>>...25