/third_party/musl/src/crypt/ |
D | crypt_r.c | 3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument 10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r() 11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r() 12 return __crypt_md5(key, salt, output); in __crypt_r() 13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r() 14 return __crypt_blowfish(key, salt, output); in __crypt_r() 15 if (salt[1] == '5' && salt[2] == '$') in __crypt_r() 16 return __crypt_sha256(key, salt, output); in __crypt_r() 17 if (salt[1] == '6' && salt[2] == '$') in __crypt_r() 18 return __crypt_sha512(key, salt, output); in __crypt_r() [all …]
|
/third_party/openssl/test/recipes/ |
D | 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=77777$short', 42 salt => 'rounds=123456$asaltof16chars..', 46 salt => 'rounds=10$roundstoolow', 50 salt => 'saltstring', 54 salt => 'rounds=10000$saltstringsaltstring', 58 salt => 'rounds=5000$toolongsaltstring', [all …]
|
/third_party/e2fsprogs/misc/ |
D | e4crypt.c | 181 struct salt { struct 182 unsigned char *salt; member 188 struct salt *salt_list; argument 193 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 196 struct salt *p; in find_by_salt() 200 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 205 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 207 if (find_by_salt(salt, salt_len)) in add_salt() 211 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt() 217 salt_list[num_salt].salt = salt; in add_salt() [all …]
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpkdf.txt | 77 Ctrl.salt = hexsalt:000102030405060708090a0b0c 85 Ctrl.salt = hexsalt:000102030405060708090a0b0c 98 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 106 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 119 Ctrl.salt = salt: 127 Ctrl.salt = salt: 141 Ctrl.salt = hexsalt:000102030405060708090a0b0c 149 Ctrl.salt = hexsalt:000102030405060708090a0b0c 162 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 170 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… [all …]
|
D | evppbe.txt | 109 Salt = "salt" 116 Salt = "salt" 123 Salt = "salt" 130 Salt = "salt" 137 Salt = "salt" 144 Salt = "salt" 151 Salt = "salt" 158 Salt = "salt" 165 Salt = "salt" 216 Salt = "salt" [all …]
|
/third_party/f2fs-tools/tools/ |
D | f2fscrypt.c | 227 struct salt { struct 228 unsigned char *salt; member 234 struct salt *salt_list; argument 239 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 242 struct salt *p; in find_by_salt() 246 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 251 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 253 if (find_by_salt(salt, salt_len)) in add_salt() 257 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt() 263 salt_list[num_salt].salt = salt; in add_salt() [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | recur1.types | 2 var salt:any = new salt.pepper(); 3 >salt : any 4 >new salt.pepper() : any 5 >salt.pepper : any 6 >salt : any 9 salt.pepper = function() {} 10 >salt.pepper = function() {} : () => void 11 >salt.pepper : any 12 >salt : any
|
D | recur1.symbols | 2 var salt:any = new salt.pepper(); 3 >salt : Symbol(salt, Decl(recur1.ts, 0, 3)) 4 >salt : Symbol(salt, Decl(recur1.ts, 0, 3)) 6 salt.pepper = function() {} 7 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
|
D | structural1.types | 6 salt:number; 7 >salt : number 18 f({salt:2,pepper:0}); 19 >f({salt:2,pepper:0}) : void 21 >{salt:2,pepper:0} : { salt: number; pepper: number; } 22 >salt : number
|
D | functionType.symbols | 2 function salt() {} 3 >salt : Symbol(salt, Decl(functionType.ts, 0, 0)) 5 salt.apply("hello", []); 6 >salt.apply : Symbol(Function.apply, Decl(lib.es5.d.ts, --, --)) 7 >salt : Symbol(salt, Decl(functionType.ts, 0, 0))
|
D | recur1.js | 2 var salt:any = new salt.pepper(); variable 3 salt.pepper = function() {} 11 var salt = new salt.pepper(); variable 12 salt.pepper = function () { };
|
D | undeclaredMethod.symbols | 8 public salt() {} 9 >salt : Symbol(C.salt, Decl(undeclaredMethod.ts, 1, 20)) 21 c.salt(); // cool 22 >c.salt : Symbol(M.C.salt, Decl(undeclaredMethod.ts, 1, 20)) 24 >salt : Symbol(M.C.salt, Decl(undeclaredMethod.ts, 1, 20))
|
D | assign1.types | 6 salt:number; 7 >salt : number 13 var x:I={salt:2,pepper:0}; 15 >{salt:2,pepper:0} : { salt: number; pepper: number; } 16 >salt : number
|
D | functionType.types | 2 function salt() {} 3 >salt : () => void 5 salt.apply("hello", []); 6 >salt.apply("hello", []) : any 7 >salt.apply : (this: Function, thisArg: any, argArray?: any) => any 8 >salt : () => void
|
/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 24 ({ password, salt, iterations, keylen, digest } = 25 check(password, salt, iterations, keylen, digest)); 40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap), 44 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 45 ({ password, salt, iterations, keylen, digest } = 46 check(password, salt, iterations, keylen, digest)); 48 handleError(_pbkdf2(keybuf, password, salt, iterations, digest), digest); 54 function check(password, salt, iterations, keylen, digest) { argument 59 salt = getArrayBufferView(salt, 'salt'); [all …]
|
D | scrypt.js | 24 function scrypt(password, salt, keylen, options, callback = defaults) { argument 30 options = check(password, salt, keylen, options); 32 ({ password, salt, keylen } = options); 47 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem, wrap)); 50 function scryptSync(password, salt, keylen, options = defaults) { argument 51 options = check(password, salt, keylen, options); 53 ({ password, salt, keylen } = options); 55 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem)); 71 function check(password, salt, keylen, options) { argument 76 salt = getArrayBufferView(salt, 'salt'); [all …]
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 32 *psalt = p12->mac->salt; in PKCS12_get0_mac() 50 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument 60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 73 unsigned char *salt, int slen, in pkcs12_gen_mac() argument 81 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 96 salt = p12->mac->salt->data; in pkcs12_gen_mac() 97 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 176 unsigned char *salt, int saltlen, int iter, in PKCS12_set_mac() argument [all …]
|
D | p12_crpt.c | 26 unsigned char *salt; in PKCS12_PBE_keyivgen() local 29 unsigned char *salt, int slen, in PKCS12_PBE_keyivgen() 51 salt = pbe->salt->data; in PKCS12_PBE_keyivgen() 52 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen() 53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen() 59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
|
/third_party/openssl/crypto/des/ |
D | fcrypt.c | 58 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 63 return DES_fcrypt(buf, salt, buff); in DES_crypt() 69 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt() 73 e_salt[0] = salt[0]; in DES_crypt() 74 e_salt[1] = salt[1]; in DES_crypt() 91 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 102 x = ret[0] = salt[0]; in DES_fcrypt() 106 x = ret[1] = salt[1]; in DES_fcrypt()
|
/third_party/python/Lib/test/ |
D | test_crypt.py | 38 salt = crypt.mksalt(method) 39 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7}) 41 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars]) 69 salt = crypt.mksalt(method, rounds=rounds) 70 self.assertIn('$rounds=%d$' % rounds, salt) 71 self.assertEqual(len(salt) - method.salt_chars, 73 cr = crypt.crypt('mypassword', salt) 83 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds) 84 self.assertIn('$%02d$' % log_rounds, salt) 85 self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7}) [all …]
|
/third_party/openssl/crypto/asn1/ |
D | p5_scrypt.c | 22 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 31 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 40 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() argument 113 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 148 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 162 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set() 165 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set() 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen() local 262 salt = sparam->salt->data; in PKCS5_v2_scrypt_keyivgen() 263 saltlen = sparam->salt->length; in PKCS5_v2_scrypt_keyivgen() [all …]
|
/third_party/mbedtls/library/ |
D | pkcs12.c | 45 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument 62 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params() 65 salt->p = *p; in pkcs12_parse_pbe_params() 66 *p += salt->len; in pkcs12_parse_pbe_params() 86 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 93 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv() 96 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 104 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 114 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 214 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument [all …]
|
/third_party/python/Lib/ |
D | crypt.py | 70 def crypt(word, salt=None): argument 80 if salt is None or isinstance(salt, _Method): 81 salt = mksalt(salt) 82 return _crypt.crypt(word, salt) 91 salt = mksalt(method, rounds=rounds) 94 result = crypt('', salt)
|
/third_party/openssl/crypto/kdf/ |
D | hkdf.c | 21 const unsigned char *salt, size_t salt_len, 27 const unsigned char *salt, size_t salt_len, 39 unsigned char *salt; member 64 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup() 93 if (kctx->salt != NULL) in pkey_hkdf_ctrl() 94 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl() 96 kctx->salt = OPENSSL_memdup(p2, p1); in pkey_hkdf_ctrl() 97 if (kctx->salt == NULL) in pkey_hkdf_ctrl() 183 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init() 206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key, in pkey_hkdf_derive() [all …]
|
/third_party/skia/third_party/externals/abseil-cpp/absl/hash/internal/ |
D | low_level_hash.cc | 43 const uint64_t salt[]) { in LowLevelHash() argument 46 uint64_t current_state = seed ^ salt[0]; in LowLevelHash() 64 uint64_t cs0 = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 65 uint64_t cs1 = Mix(c ^ salt[2], d ^ current_state); in LowLevelHash() 68 uint64_t ds0 = Mix(e ^ salt[3], f ^ duplicated_state); in LowLevelHash() 69 uint64_t ds1 = Mix(g ^ salt[4], h ^ duplicated_state); in LowLevelHash() 85 current_state = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 116 uint64_t w = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash() 117 uint64_t z = salt[1] ^ starting_length; in LowLevelHash()
|