/third_party/openssl/crypto/kdf/ |
D | hkdf.c | 21 const unsigned char *salt, size_t salt_len, 27 const unsigned char *salt, size_t salt_len, 40 size_t salt_len; member 64 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup() 94 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl() 100 kctx->salt_len = p1; in pkey_hkdf_ctrl() 183 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init() 206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key, in pkey_hkdf_derive() 215 return HKDF_Extract(kctx->md, kctx->salt, kctx->salt_len, kctx->key, in pkey_hkdf_derive() 258 const unsigned char *salt, size_t salt_len, in HKDF() argument [all …]
|
D | scrypt.c | 26 size_t salt_len; member 84 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_scrypt_cleanup() 131 return pkey_scrypt_set_membuf(&kctx->salt, &kctx->salt_len, p2, p1); in pkey_scrypt_ctrl() 232 kctx->salt_len, kctx->N, kctx->r, kctx->p, in pkey_scrypt_derive()
|
/third_party/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 110 size_t salt_len, uint8_t id, unsigned iterations, in pkcs12_key_gen() argument 150 if (salt_len + block_size - 1 < salt_len || in pkcs12_key_gen() 155 size_t S_len = block_size * ((salt_len + block_size - 1) / block_size); in pkcs12_key_gen() 170 I[i] = salt[i % salt_len]; in pkcs12_key_gen() 236 const uint8_t *salt, size_t salt_len, in pkcs12_pbe_cipher_init() argument 243 if (!pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_KEY_ID, iterations, in pkcs12_pbe_cipher_init() 245 !pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_IV_ID, iterations, in pkcs12_pbe_cipher_init() 336 size_t salt_len) { in pkcs12_pbe_encrypt_init() argument 350 !CBB_add_bytes(&salt_cbb, salt, salt_len) || in pkcs12_pbe_encrypt_init() 357 salt_len, 1 /* encrypt */); in pkcs12_pbe_encrypt_init() [all …]
|
D | internal.h | 83 size_t salt_len, uint8_t id, unsigned iterations, 91 size_t salt_len); 120 const uint8_t *salt, size_t salt_len);
|
D | p5_pbev2.c | 149 const uint8_t *salt, size_t salt_len, in pkcs5_pbe2_cipher_init() argument 157 int ret = PKCS5_PBKDF2_HMAC(pass, pass_len, salt, salt_len, iterations, in pkcs5_pbe2_cipher_init() 167 const uint8_t *salt, size_t salt_len) { in PKCS5_pbe2_encrypt_init() argument 192 !CBB_add_bytes(&salt_cbb, salt, salt_len) || in PKCS5_pbe2_encrypt_init() 209 pass_len, salt, salt_len, iv, in PKCS5_pbe2_encrypt_init()
|
/third_party/e2fsprogs/misc/ |
D | e4crypt.c | 185 size_t salt_len; member 192 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 198 if ((p->salt_len == salt_len) && in find_by_salt() 199 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 204 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 206 if (find_by_salt(salt, salt_len)) in add_salt() 217 salt_list[num_salt].salt_len = salt_len; in add_salt() 278 int fd, ret, salt_len = 0; in parse_salt() local 284 salt_len = strlen(cp); in parse_salt() 285 if (salt_len >= EXT4_MAX_SALT_SIZE) in parse_salt() [all …]
|
/third_party/mbedtls/library/ |
D | hkdf.c | 59 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 66 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf() 80 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 90 if( salt_len != 0 ) in mbedtls_hkdf_extract() 103 salt_len = hash_len; in mbedtls_hkdf_extract() 106 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
|
/third_party/f2fs-tools/tools/ |
D | f2fscrypt.c | 232 size_t salt_len; member 239 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 245 if ((p->salt_len == salt_len) && in find_by_salt() 246 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 251 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 253 if (find_by_salt(salt, salt_len)) in add_salt() 264 salt_list[num_salt].salt_len = salt_len; in add_salt() 324 int fd, ret, salt_len = 0; in parse_salt() local 330 salt_len = strlen(cp); in parse_salt() 331 if (salt_len >= F2FS_MAX_SALT_SIZE) in parse_salt() [all …]
|
/third_party/openssl/apps/ |
D | passwd.c | 323 size_t passwd_len, salt_len, magic_len; in md5crypt() local 337 salt_len = strlen(ascii_salt); in md5crypt() 339 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 369 if (salt_len > 8) in md5crypt() 384 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 391 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 420 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 456 output = salt_out + salt_len; in md5crypt() 517 size_t passwd_len, salt_len, magic_len; in shacrypt() local 570 salt_len = strlen(ascii_salt); in shacrypt() [all …]
|
/third_party/boringssl/src/crypto/evp/ |
D | pbkdf.c | 66 const uint8_t *salt, size_t salt_len, unsigned iterations, in PKCS5_PBKDF2_HMAC() argument 94 !HMAC_Update(&hctx, salt, salt_len) || in PKCS5_PBKDF2_HMAC() 141 const uint8_t *salt, size_t salt_len, in PKCS5_PBKDF2_HMAC_SHA1() argument 144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, in PKCS5_PBKDF2_HMAC_SHA1()
|
D | pbkdf_test.cc | 129 const size_t salt_len = sizeof(kSalt); in TEST() local 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
/third_party/uboot/u-boot-2020.01/lib/libavb/ |
D | avb_hash_descriptor.c | 26 dest->salt_len = avb_be32toh(dest->salt_len); in avb_hash_descriptor_validate_and_byteswap() 33 !avb_safe_add_to(&expected_size, dest->salt_len) || in avb_hash_descriptor_validate_and_byteswap()
|
D | avb_hashtree_descriptor.c | 34 dest->salt_len = avb_be32toh(dest->salt_len); in avb_hashtree_descriptor_validate_and_byteswap() 41 !avb_safe_add_to(&expected_size, dest->salt_len) || in avb_hashtree_descriptor_validate_and_byteswap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() [all …]
|
/third_party/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 28 size_t salt_len, const uint8_t *info, size_t info_len) { in HKDF() argument 34 salt_len) || in HKDF() 44 size_t salt_len) { in HKDF_extract() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract()
|
D | hkdf_test.cc | 29 const size_t salt_len; member 255 test->ikm_len, test->salt, test->salt_len)); in TEST() 264 test->ikm_len, test->salt, test->salt_len, test->info, in TEST()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_hkdf.function | 41 size_t ikm_len, salt_len, prk_len, output_prk_len; 50 salt = unhexify_alloc( hex_salt_string, &salt_len ); 53 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk ); 109 size_t salt_len, ikm_len; 117 salt_len = 0; 120 output_ret = mbedtls_hkdf_extract( &fake_md_info, salt, salt_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/third_party/mbedtls/include/mbedtls/ |
D | hkdf.h | 99 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 128 const unsigned char *salt, size_t salt_len,
|
/third_party/boringssl/src/include/openssl/ |
D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 47 size_t salt_len);
|
/third_party/uboot/u-boot-2020.01/lib/rsa/ |
D | rsa-verify.c | 159 uint8_t *salt, int salt_len, in compute_hash_prime() argument 170 region[2].size = salt_len; in compute_hash_prime() 193 int db_len = masked_db_len, salt_len = msg_len - hash_len - 2; in padding_pss_verify() local 204 salt = malloc(salt_len); in padding_pss_verify() 251 memcpy(salt, &db[1], salt_len); in padding_pss_verify() 256 salt, salt_len, hprime); in padding_pss_verify()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|