Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 - 25 of 58) sorted by relevance

123

/third_party/mbedtls/library/
H A Dhkdf.c29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf()
36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
49 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract()
58 if (salt_len != 0) { in mbedtls_hkdf_extract()
69 salt_len = hash_len; in mbedtls_hkdf_extract()
72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
28 mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) mbedtls_hkdf() argument
48 mbedtls_hkdf_extract(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk) mbedtls_hkdf_extract() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dpkcs5.c27 size_t salt_len; member
179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
327 params->salt_len = hdr.length; in pkcs5_get_params()
329 params->salt, params->salt_len); in pkcs5_get_params()
373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen()
419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
425 if (salt_len) { in pkcs12_key_gen()
400 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) pkcs12_key_gen() argument
[all...]
/third_party/f2fs-tools/tools/
H A Df2fscrypt.c241 size_t salt_len; member
248 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
254 if ((p->salt_len == salt_len) && in find_by_salt()
255 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
260 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
262 if (find_by_salt(salt, salt_len)) in add_salt()
273 salt_list[num_salt].salt_len = salt_len; in add_salt()
333 int fd, ret, salt_len in parse_salt() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c27 size_t salt_len; member
187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
348 params->salt_len = hdr.length; in pkcs5_get_params()
350 params->salt, params->salt_len); in pkcs5_get_params()
395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen()
441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
447 if (salt_len) { in pkcs12_key_gen()
422 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) pkcs12_key_gen() argument
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dpasswd.c326 size_t passwd_len, salt_len, magic_len; in md5crypt() local
340 salt_len = strlen(ascii_salt); in md5crypt()
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt()
372 if (salt_len > 8) in md5crypt()
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt()
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt()
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt()
459 output = salt_out + salt_len; in md5crypt()
520 size_t passwd_len, salt_len, magic_len; in shacrypt() local
573 salt_len in shacrypt()
[all...]
/third_party/openssl/apps/
H A Dpasswd.c326 size_t passwd_len, salt_len, magic_len; in md5crypt() local
340 salt_len = strlen(ascii_salt); in md5crypt()
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt()
372 if (salt_len > 8) in md5crypt()
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt()
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt()
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt()
459 output = salt_out + salt_len; in md5crypt()
520 size_t passwd_len, salt_len, magic_len; in shacrypt() local
573 salt_len in shacrypt()
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dhkdf.c50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
240 &ctx->salt_len)) in hkdf_common_set_ctx_params()
396 const unsigned char *salt, size_t salt_len, in HKDF()
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
447 const unsigned char *salt, size_t salt_len, in HKDF_Extract()
462 salt_len, ik in HKDF_Extract()
395 HKDF(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF() argument
446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument
[all...]
H A Dsskdf.c63 size_t salt_len; member
215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm()
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm()
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset()
394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive()
400 ctx->salt_len = default_salt_len; in sskdf_derive()
404 ctx->salt, ctx->salt_len, in sskdf_derive()
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
212 SSKDF_mac_kdm(EVP_MAC_CTX *ctx_init, const unsigned char *kmac_custom, size_t kmac_custom_len, size_t kmac_out_len, const unsigned char *salt, size_t salt_len, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned char *derived_key, size_t derived_key_len) SSKDF_mac_kdm() argument
H A Dpbkdf1.c41 size_t salt_len; member
178 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive()
196 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
H A Dpbkdf2.c58 size_t salt_len; member
165 ctx->salt, ctx->salt_len, ctx->iter, in kdf_pbkdf2_derive()
199 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf2_set_ctx_params()
H A Dpkcs12kdf.c41 size_t salt_len; member
220 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pkcs12_derive()
241 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pkcs12_set_ctx_params()
/third_party/openssl/providers/implementations/kdfs/
H A Dhkdf.c50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
240 &ctx->salt_len)) in hkdf_common_set_ctx_params()
396 const unsigned char *salt, size_t salt_len, in HKDF()
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
447 const unsigned char *salt, size_t salt_len, in HKDF_Extract()
462 salt_len, ik in HKDF_Extract()
395 HKDF(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF() argument
446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument
[all...]
H A Dsskdf.c63 size_t salt_len; member
215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm()
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm()
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset()
394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive()
400 ctx->salt_len = default_salt_len; in sskdf_derive()
404 ctx->salt, ctx->salt_len, in sskdf_derive()
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
212 SSKDF_mac_kdm(EVP_MAC_CTX *ctx_init, const unsigned char *kmac_custom, size_t kmac_custom_len, size_t kmac_out_len, const unsigned char *salt, size_t salt_len, const unsigned char *z, size_t z_len, const unsigned char *info, size_t info_len, unsigned char *derived_key, size_t derived_key_len) SSKDF_mac_kdm() argument
H A Dpbkdf1.c41 size_t salt_len; member
172 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive()
190 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_pwd.c31 size_t salt_len; member
121 data->salt_len = sm->user->salt_len; in eap_pwd_init()
122 if (data->salt_len) { in eap_pwd_init()
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset()
194 if (data->salt_len) in eap_pwd_build_id_req()
196 data->salt, data->salt_len); in eap_pwd_build_id_req()
202 if (data->salt_len) { in eap_pwd_build_id_req()
283 (data->salt ? 1 + data->salt_len in eap_pwd_build_commit_req()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_pwd.c31 size_t salt_len; member
121 data->salt_len = sm->user->salt_len; in eap_pwd_init()
122 if (data->salt_len) { in eap_pwd_init()
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset()
194 if (data->salt_len) in eap_pwd_build_id_req()
196 data->salt, data->salt_len); in eap_pwd_build_id_req()
202 if (data->salt_len) { in eap_pwd_build_id_req()
283 (data->salt ? 1 + data->salt_len in eap_pwd_build_commit_req()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_pwd.c368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local
431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
454 (int) salt_len); in eap_pwd_perform_commit_exchange()
455 ptr += salt_len; in eap_pwd_perform_commit_exchange()
468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_pwd.c368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local
431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
454 (int) salt_len); in eap_pwd_perform_commit_exchange()
455 ptr += salt_len; in eap_pwd_perform_commit_exchange()
468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dhkdf.h53 * \param salt_len The length in bytes of the optional \p salt.
69 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
87 * \param salt_len The length in bytes of the optional \p salt.
98 const unsigned char *salt, size_t salt_len,
/third_party/node/src/crypto/
H A Dcrypto_sig.cc60 const Maybe<int>& salt_len) { in ValidateDSAParameters()
66 if (padding == RSA_PKCS1_PSS_PADDING && salt_len.IsJust()) { in ValidateDSAParameters()
67 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, salt_len.FromJust()) <= 0) in ValidateDSAParameters()
391 const Maybe<int>& salt_len, in SignFinal()
402 Node_SignFinal(env(), std::move(mdctx), pkey, padding, salt_len); in SignFinal()
429 Maybe<int> salt_len = Nothing<int>(); in SignFinal() local
432 salt_len = Just<int>(args[offset + 1].As<Int32>()->Value()); in SignFinal()
442 salt_len, in SignFinal()
560 Maybe<int> salt_len = Nothing<int>(); in VerifyFinal() local
563 salt_len in VerifyFinal()
57 ApplyRSAOptions(const ManagedEVPPKey& pkey, EVP_PKEY_CTX* pkctx, int padding, const Maybe<int>& salt_len) ValidateDSAParameters() argument
388 SignFinal( const ManagedEVPPKey& pkey, int padding, const Maybe<int>& salt_len, DSASigEnc dsa_sig_enc) SignFinal() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/rand/
H A Dprov_seed.c49 const void *salt, size_t salt_len) in ossl_rand_get_nonce()
63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
/third_party/openssl/crypto/rand/
H A Dprov_seed.c49 const void *salt, size_t salt_len) in ossl_rand_get_nonce()
63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
/third_party/node/deps/openssl/openssl/providers/common/
H A Dprovider_seeding.c65 const void *salt,size_t salt_len) in ossl_prov_get_nonce()
70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
/third_party/openssl/providers/common/
H A Dprovider_seeding.c65 const void *salt,size_t salt_len) in ossl_prov_get_nonce()
70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dauthsrv.c80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user()
82 eap_user->salt_len); in hostapd_radius_get_eap_user()
85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()

Completed in 21 milliseconds

123