Home
last modified time | relevance | path

Searched refs:salt (Results 1 - 25 of 415) sorted by relevance

12345678910>>...17

/third_party/musl/src/crypt/
H A Dcrypt_r.c3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument
10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r()
11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r()
12 return __crypt_md5(key, salt, output); in __crypt_r()
13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r()
14 return __crypt_blowfish(key, salt, outpu in __crypt_r()
[all...]
/third_party/musl/libc-test/src/functionalext/crypt/
H A Dcrypt.c22 char *salt; in test_crypt() local
24 salt = "$1$"; in test_crypt()
25 char *md5_result = crypt(key, salt); in test_crypt()
29 salt = "$2$"; in test_crypt()
30 char *blowfish_result_first = crypt(key, salt); in test_crypt()
31 char *blowfish_result_second = crypt(key, salt); in test_crypt()
34 salt = "$5$"; in test_crypt()
35 char *sha256_result = crypt(key, salt); in test_crypt()
40 salt = "$6$"; in test_crypt()
41 char *sha512_result = crypt(key, salt); in test_crypt()
[all...]
/third_party/f2fs-tools/tools/
H A Df2fscrypt.c236 struct salt { struct
237 unsigned char *salt; member
243 struct salt *salt_list;
248 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
251 struct salt *p; in find_by_salt()
255 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
260 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
262 if (find_by_salt(salt, salt_le in add_salt()
409 struct salt *salt; set_policy() local
464 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[F2FS_MAX_KEY_SIZE]) pbkdf2_sha512() argument
601 generate_key_ref_str(struct salt *salt) generate_key_ref_str() argument
617 insert_key_into_keyring(const char *keyring, struct salt *salt) insert_key_into_keyring() argument
704 struct salt *salt; do_add_key() local
[all...]
/third_party/node/src/crypto/
H A Dcrypto_hkdf.cc25 salt(std::move(other.salt)),
69 ArrayBufferOrViewContents<char> salt(args[offset + 2]); in AdditionalConfig()
72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig()
73 THROW_ERR_OUT_OF_RANGE(env, "salt is too big"); in AdditionalConfig()
81 params->salt = mode == kCryptoJobAsync in AdditionalConfig()
82 ? salt.ToCopy() in AdditionalConfig()
83 : salt.ToByteSource(); in AdditionalConfig()
120 std::string_view salt; in DeriveBits() local
121 if (params.salt in DeriveBits()
[all...]
H A Dcrypto_pbkdf2.cc23 salt(std::move(other.salt)),
38 tracker->TrackFieldWithSize("salt", salt.size()); in MemoryInfo()
54 // 3. The salt
68 ArrayBufferOrViewContents<char> salt(args[offset + 1]); in AdditionalConfig()
75 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig()
76 THROW_ERR_OUT_OF_RANGE(env, "salt is too large"); in AdditionalConfig()
84 params->salt = mode == kCryptoJobAsync in AdditionalConfig()
85 ? salt in AdditionalConfig()
[all...]
H A Dcrypto_scrypt.cc26 salt(std::move(other.salt)),
42 tracker->TrackFieldWithSize("salt", salt.size()); in MemoryInfo()
65 ArrayBufferOrViewContents<char> salt(args[offset + 1]); in AdditionalConfig()
72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig()
73 THROW_ERR_OUT_OF_RANGE(env, "salt is too large"); in AdditionalConfig()
81 params->salt = mode == kCryptoJobAsync in AdditionalConfig()
82 ? salt.ToCopy() in AdditionalConfig()
83 : salt in AdditionalConfig()
[all...]
/third_party/node/lib/internal/crypto/
H A Dhkdf.js51 const validateParameters = hideStackFrames((hash, key, salt, info, length) => {
54 salt = validateByteSource(salt, 'salt');
69 salt,
101 function hkdf(hash, key, salt, info, length, callback) {
105 salt,
108 } = validateParameters(hash, key, salt, info, length));
112 const job = new HKDFJob(kCryptoJobAsync, hash, key, salt, info, length);
122 function hkdfSync(hash, key, salt, inf
[all...]
H A Dpbkdf2.js33 function pbkdf2(password, salt, iterations, keylen, digest, callback) {
39 ({ password, salt, iterations, keylen, digest } =
40 check(password, salt, iterations, keylen, digest));
47 salt,
65 function pbkdf2Sync(password, salt, iterations, keylen, digest) {
66 ({ password, salt, iterations, keylen, digest } =
67 check(password, salt, iterations, keylen, digest));
72 salt,
86 function check(password, salt, iterations, keylen, digest) {
90 salt
[all...]
H A Dscrypt.js41 function scrypt(password, salt, keylen, options, callback = defaults) {
47 options = check(password, salt, keylen, options);
49 ({ password, salt, keylen } = options);
54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen);
69 function scryptSync(password, salt, keylen, options = defaults) {
70 options = check(password, salt, keylen, options);
72 ({ password, salt, keylen } = options);
74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen);
85 function check(password, salt, keylen, options) {
90 salt
[all...]
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_mutl.c38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key()
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
79 unsigned char *salt, int slen, in pkcs12_gen_mac()
88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
106 salt = p12->mac->salt->data; in pkcs12_gen_mac()
107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltle in pkcs12_gen_mac()
55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
76 pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen, int (*pkcs12_key_gen)(const char *pass, int passlen, unsigned char *salt, int slen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type)) pkcs12_gen_mac() argument
209 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) PKCS12_set_mac() argument
242 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) PKCS12_setup_mac() argument
[all...]
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument
106 salt, saltle in PKCS12_key_gen_uni_ex()
133 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) PKCS12_key_gen_uni() argument
[all...]
/third_party/openssl/crypto/pkcs12/
H A Dp12_mutl.c38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key()
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
79 unsigned char *salt, int slen, in pkcs12_gen_mac()
88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
106 salt = p12->mac->salt->data; in pkcs12_gen_mac()
107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltle in pkcs12_gen_mac()
55 pkcs12_gen_gost_mac_key(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *key, const EVP_MD *digest) pkcs12_gen_gost_mac_key() argument
76 pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen, int (*pkcs12_key_gen)(const char *pass, int passlen, unsigned char *salt, int slen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type)) pkcs12_gen_mac() argument
204 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) PKCS12_set_mac() argument
237 PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, const EVP_MD *md_type) PKCS12_setup_mac() argument
[all...]
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument
106 salt, saltle in PKCS12_key_gen_uni_ex()
133 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) PKCS12_key_gen_uni() argument
[all...]
/third_party/node/benchmark/crypto/
H A Dhkdf.js14 salt: ['', 'salt'],
20 function measureSync(n, size, salt, info, hash, key) {
23 hkdfSync(hash, key, salt, info, size);
27 function measureAsync(n, size, salt, info, hash, key) {
36 hkdf(hash, key, salt, info, size, done);
39 function main({ n, sync, size, salt, info, hash, key }) {
41 measureSync(n, size, salt, info, hash, key);
43 measureAsync(n, size, salt, info, hash, key);
/third_party/mbedtls/tests/src/drivers/
H A Dtest_driver_asymmetric_encryption.c31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt()
57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt()
62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt()
72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt()
98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt()
103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt()
116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt()
135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt()
140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt()
150 size_t input_length, const uint8_t *salt, size_ in mbedtls_test_opaque_asymmetric_decrypt()
28 mbedtls_test_transparent_asymmetric_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_transparent_asymmetric_encrypt() argument
69 mbedtls_test_transparent_asymmetric_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_transparent_asymmetric_decrypt() argument
113 mbedtls_test_opaque_asymmetric_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_opaque_asymmetric_encrypt() argument
147 mbedtls_test_opaque_asymmetric_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *salt, size_t salt_length, uint8_t *output, size_t output_size, size_t *output_length) mbedtls_test_opaque_asymmetric_decrypt() argument
[all...]
/third_party/python/Lib/test/
H A Dtest_crypt.py41 salt = crypt.mksalt(method)
42 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
44 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
72 salt = crypt.mksalt(method, rounds=rounds)
73 self.assertIn('$rounds=%d$' % rounds, salt)
74 self.assertEqual(len(salt) - method.salt_chars,
76 cr = crypt.crypt('mypassword', salt)
86 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
87 self.assertIn('$%02d$' % log_rounds, salt)
[all...]
/third_party/typescript/tests/baselines/reference/
H A Drecur1.js2 var salt:any = new salt.pepper();
3 salt.pepper = function() {}
11 var salt = new salt.pepper();
12 salt.pepper = function () { };
/third_party/python/Lib/
H A Dcrypt.py29 """Class representing a salt method per the Modular Crypt Format or the
37 """Generate a salt for the specified method.
74 def crypt(word, salt=None):
75 """Return a string representing the one-way hash of a password, with a salt
78 If ``salt`` is not specified or is ``None``, the strongest
79 available method will be selected and a salt generated. Otherwise,
80 ``salt`` may be one of the ``crypt.METHOD_*`` values, or a string as
84 if salt is None or isinstance(salt, _Method):
85 salt
[all...]
/third_party/skia/third_party/externals/abseil-cpp/absl/hash/internal/
H A Dlow_level_hash.cc43 const uint64_t salt[]) { in LowLevelHash()
46 uint64_t current_state = seed ^ salt[0]; in LowLevelHash()
64 uint64_t cs0 = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
65 uint64_t cs1 = Mix(c ^ salt[2], d ^ current_state); in LowLevelHash()
68 uint64_t ds0 = Mix(e ^ salt[3], f ^ duplicated_state); in LowLevelHash()
69 uint64_t ds1 = Mix(g ^ salt[4], h ^ duplicated_state); in LowLevelHash()
85 current_state = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
116 uint64_t w = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
117 uint64_t z = salt[1] ^ starting_length; in LowLevelHash()
42 LowLevelHash(const void* data, size_t len, uint64_t seed, const uint64_t salt[]) LowLevelHash() argument
/third_party/mbedtls/library/
H A Dpkcs12.c37 mbedtls_asn1_buf *salt, int *iterations) in pkcs12_parse_pbe_params()
45 * salt OCTET STRING, in pkcs12_parse_pbe_params()
55 if ((ret = mbedtls_asn1_get_tag(p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pkcs12_parse_pbe_params()
59 salt->p = *p; in pkcs12_parse_pbe_params()
60 *p += salt->len; in pkcs12_parse_pbe_params()
82 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local
90 memset(&salt, 0, sizeof(mbedtls_asn1_buf)); in pkcs12_pbe_derive_key_iv()
93 if ((ret = pkcs12_parse_pbe_params(pbe_params, &salt, in pkcs12_pbe_derive_key_iv()
103 salt.p, salt in pkcs12_pbe_derive_key_iv()
36 pkcs12_parse_pbe_params(mbedtls_asn1_buf *params, mbedtls_asn1_buf *salt, int *iterations) pkcs12_parse_pbe_params() argument
326 mbedtls_pkcs12_derivation(unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mbedtls_md_type_t md_type, int id, int iterations) mbedtls_pkcs12_derivation() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dp5_crpt2.c23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex()
41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex()
42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex()
55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument
87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC()
93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1()
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
185 unsigned char *salt, ke in PKCS5_v2_PBKDF2_keyivgen_ex() local
22 ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out, OSSL_LIB_CTX *libctx, const char *propq) ossl_pkcs5_pbkdf2_hmac_ex() argument
92 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) PKCS5_PBKDF2_HMAC_SHA1() argument
[all...]
/third_party/openssl/crypto/evp/
H A Dp5_crpt2.c23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex()
41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex()
42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex()
55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument
87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC()
93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1()
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
185 unsigned char *salt, ke in PKCS5_v2_PBKDF2_keyivgen_ex() local
22 ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out, OSSL_LIB_CTX *libctx, const char *propq) ossl_pkcs5_pbkdf2_hmac_ex() argument
92 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) PKCS5_PBKDF2_HMAC_SHA1() argument
[all...]
/third_party/python/Modules/clinic/
H A D_cryptmodule.c.h6 "crypt($module, word, salt, /)\n"
9 "Hash a *word* with the given *salt* and return the hashed password.\n"
11 "*word* will usually be a user\'s password. *salt* (either a random 2 or 16\n"
20 crypt_crypt_impl(PyObject *module, const char *word, const char *salt);
27 const char *salt; in crypt_crypt() local
50 salt = PyUnicode_AsUTF8AndSize(args[1], &salt_length); in crypt_crypt()
51 if (salt == NULL) { in crypt_crypt()
54 if (strlen(salt) != (size_t)salt_length) { in crypt_crypt()
58 return_value = crypt_crypt_impl(module, word, salt); in crypt_crypt()
/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dp5_scrypt.c24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt()
112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set()
161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set()
164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set()
41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument
216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local
[all...]
/third_party/openssl/crypto/asn1/
H A Dp5_scrypt.c24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt()
112 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
160 /* This will either copy salt or grow the buffer */ in pkcs5_scrypt_set()
161 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set()
164 if (salt == NULL && RAND_bytes(sparam->salt in pkcs5_scrypt_set()
41 PKCS5_pbe2_set_scrypt(const EVP_CIPHER *cipher, const unsigned char *salt, int saltlen, unsigned char *aiv, uint64_t N, uint64_t r, uint64_t p) PKCS5_pbe2_set_scrypt() argument
216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; PKCS5_v2_scrypt_keyivgen_ex() local
[all...]

Completed in 9 milliseconds

12345678910>>...17