Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 253) sorted by relevance

1234567891011

/third_party/musl/src/crypt/
Dcrypt_r.c3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument
10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r()
11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r()
12 return __crypt_md5(key, salt, output); in __crypt_r()
13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r()
14 return __crypt_blowfish(key, salt, output); in __crypt_r()
15 if (salt[1] == '5' && salt[2] == '$') in __crypt_r()
16 return __crypt_sha256(key, salt, output); in __crypt_r()
17 if (salt[1] == '6' && salt[2] == '$') in __crypt_r()
18 return __crypt_sha512(key, salt, output); in __crypt_r()
[all …]
/third_party/openssl/test/recipes/
D20-test_passwd.t22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=77777$short',
42 salt => 'rounds=123456$asaltof16chars..',
46 salt => 'rounds=10$roundstoolow',
50 salt => 'saltstring',
54 salt => 'rounds=10000$saltstringsaltstring',
58 salt => 'rounds=5000$toolongsaltstring',
[all …]
/third_party/e2fsprogs/misc/
De4crypt.c181 struct salt { struct
182 unsigned char *salt; member
188 struct salt *salt_list; argument
193 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
196 struct salt *p; in find_by_salt()
200 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
205 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
207 if (find_by_salt(salt, salt_len)) in add_salt()
211 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt()
217 salt_list[num_salt].salt = salt; in add_salt()
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpkdf.txt77 Ctrl.salt = hexsalt:000102030405060708090a0b0c
85 Ctrl.salt = hexsalt:000102030405060708090a0b0c
98 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
106 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
119 Ctrl.salt = salt:
127 Ctrl.salt = salt:
141 Ctrl.salt = hexsalt:000102030405060708090a0b0c
149 Ctrl.salt = hexsalt:000102030405060708090a0b0c
162 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
170 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
[all …]
Devppbe.txt109 Salt = "salt"
116 Salt = "salt"
123 Salt = "salt"
130 Salt = "salt"
137 Salt = "salt"
144 Salt = "salt"
151 Salt = "salt"
158 Salt = "salt"
165 Salt = "salt"
216 Salt = "salt"
[all …]
/third_party/f2fs-tools/tools/
Df2fscrypt.c227 struct salt { struct
228 unsigned char *salt; member
234 struct salt *salt_list; argument
239 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
242 struct salt *p; in find_by_salt()
246 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
251 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
253 if (find_by_salt(salt, salt_len)) in add_salt()
257 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt()
263 salt_list[num_salt].salt = salt; in add_salt()
[all …]
/third_party/typescript/tests/baselines/reference/
Drecur1.types2 var salt:any = new salt.pepper();
3 >salt : any
4 >new salt.pepper() : any
5 >salt.pepper : any
6 >salt : any
9 salt.pepper = function() {}
10 >salt.pepper = function() {} : () => void
11 >salt.pepper : any
12 >salt : any
Drecur1.symbols2 var salt:any = new salt.pepper();
3 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
4 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
6 salt.pepper = function() {}
7 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
Dstructural1.types6 salt:number;
7 >salt : number
18 f({salt:2,pepper:0});
19 >f({salt:2,pepper:0}) : void
21 >{salt:2,pepper:0} : { salt: number; pepper: number; }
22 >salt : number
DfunctionType.symbols2 function salt() {}
3 >salt : Symbol(salt, Decl(functionType.ts, 0, 0))
5 salt.apply("hello", []);
6 >salt.apply : Symbol(Function.apply, Decl(lib.es5.d.ts, --, --))
7 >salt : Symbol(salt, Decl(functionType.ts, 0, 0))
Drecur1.js2 var salt:any = new salt.pepper(); variable
3 salt.pepper = function() {}
11 var salt = new salt.pepper(); variable
12 salt.pepper = function () { };
DundeclaredMethod.symbols8 public salt() {}
9 >salt : Symbol(C.salt, Decl(undeclaredMethod.ts, 1, 20))
21 c.salt(); // cool
22 >c.salt : Symbol(M.C.salt, Decl(undeclaredMethod.ts, 1, 20))
24 >salt : Symbol(M.C.salt, Decl(undeclaredMethod.ts, 1, 20))
Dassign1.types6 salt:number;
7 >salt : number
13 var x:I={salt:2,pepper:0};
15 >{salt:2,pepper:0} : { salt: number; pepper: number; }
16 >salt : number
DfunctionType.types2 function salt() {}
3 >salt : () => void
5 salt.apply("hello", []);
6 >salt.apply("hello", []) : any
7 >salt.apply : (this: Function, thisArg: any, argArray?: any) => any
8 >salt : () => void
/third_party/node/lib/internal/crypto/
Dpbkdf2.js18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument
24 ({ password, salt, iterations, keylen, digest } =
25 check(password, salt, iterations, keylen, digest));
40 handleError(_pbkdf2(keybuf, password, salt, iterations, digest, wrap),
44 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument
45 ({ password, salt, iterations, keylen, digest } =
46 check(password, salt, iterations, keylen, digest));
48 handleError(_pbkdf2(keybuf, password, salt, iterations, digest), digest);
54 function check(password, salt, iterations, keylen, digest) { argument
59 salt = getArrayBufferView(salt, 'salt');
[all …]
Dscrypt.js24 function scrypt(password, salt, keylen, options, callback = defaults) { argument
30 options = check(password, salt, keylen, options);
32 ({ password, salt, keylen } = options);
47 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem, wrap));
50 function scryptSync(password, salt, keylen, options = defaults) { argument
51 options = check(password, salt, keylen, options);
53 ({ password, salt, keylen } = options);
55 handleError(_scrypt(keybuf, password, salt, N, r, p, maxmem));
71 function check(password, salt, keylen, options) { argument
76 salt = getArrayBufferView(salt, 'salt');
[all …]
/third_party/openssl/crypto/pkcs12/
Dp12_mutl.c32 *psalt = p12->mac->salt; in PKCS12_get0_mac()
50 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument
60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
73 unsigned char *salt, int slen, in pkcs12_gen_mac() argument
81 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
96 salt = p12->mac->salt->data; in pkcs12_gen_mac()
97 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
176 unsigned char *salt, int saltlen, int iter, in PKCS12_set_mac() argument
[all …]
Dp12_crpt.c26 unsigned char *salt; in PKCS12_PBE_keyivgen() local
29 unsigned char *salt, int slen, in PKCS12_PBE_keyivgen()
51 salt = pbe->salt->data; in PKCS12_PBE_keyivgen()
52 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen()
53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen()
59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
/third_party/openssl/crypto/des/
Dfcrypt.c58 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
63 return DES_fcrypt(buf, salt, buff); in DES_crypt()
69 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt()
73 e_salt[0] = salt[0]; in DES_crypt()
74 e_salt[1] = salt[1]; in DES_crypt()
91 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
102 x = ret[0] = salt[0]; in DES_fcrypt()
106 x = ret[1] = salt[1]; in DES_fcrypt()
/third_party/python/Lib/test/
Dtest_crypt.py38 salt = crypt.mksalt(method)
39 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
41 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
69 salt = crypt.mksalt(method, rounds=rounds)
70 self.assertIn('$rounds=%d$' % rounds, salt)
71 self.assertEqual(len(salt) - method.salt_chars,
73 cr = crypt.crypt('mypassword', salt)
83 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
84 self.assertIn('$%02d$' % log_rounds, salt)
85 self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7})
[all …]
/third_party/openssl/crypto/asn1/
Dp5_scrypt.c22 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
31 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
40 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() argument
113 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
148 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
162 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) in pkcs5_scrypt_set()
165 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set()
216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen() local
262 salt = sparam->salt->data; in PKCS5_v2_scrypt_keyivgen()
263 saltlen = sparam->salt->length; in PKCS5_v2_scrypt_keyivgen()
[all …]
/third_party/mbedtls/library/
Dpkcs12.c45 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument
62 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params()
65 salt->p = *p; in pkcs12_parse_pbe_params()
66 *p += salt->len; in pkcs12_parse_pbe_params()
86 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local
93 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv()
96 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv()
104 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
114 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
214 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
[all …]
/third_party/python/Lib/
Dcrypt.py70 def crypt(word, salt=None): argument
80 if salt is None or isinstance(salt, _Method):
81 salt = mksalt(salt)
82 return _crypt.crypt(word, salt)
91 salt = mksalt(method, rounds=rounds)
94 result = crypt('', salt)
/third_party/openssl/crypto/kdf/
Dhkdf.c21 const unsigned char *salt, size_t salt_len,
27 const unsigned char *salt, size_t salt_len,
39 unsigned char *salt; member
64 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup()
93 if (kctx->salt != NULL) in pkey_hkdf_ctrl()
94 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl()
96 kctx->salt = OPENSSL_memdup(p2, p1); in pkey_hkdf_ctrl()
97 if (kctx->salt == NULL) in pkey_hkdf_ctrl()
183 OPENSSL_clear_free(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init()
206 return HKDF(kctx->md, kctx->salt, kctx->salt_len, kctx->key, in pkey_hkdf_derive()
[all …]
/third_party/skia/third_party/externals/abseil-cpp/absl/hash/internal/
Dlow_level_hash.cc43 const uint64_t salt[]) { in LowLevelHash() argument
46 uint64_t current_state = seed ^ salt[0]; in LowLevelHash()
64 uint64_t cs0 = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
65 uint64_t cs1 = Mix(c ^ salt[2], d ^ current_state); in LowLevelHash()
68 uint64_t ds0 = Mix(e ^ salt[3], f ^ duplicated_state); in LowLevelHash()
69 uint64_t ds1 = Mix(g ^ salt[4], h ^ duplicated_state); in LowLevelHash()
85 current_state = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
116 uint64_t w = Mix(a ^ salt[1], b ^ current_state); in LowLevelHash()
117 uint64_t z = salt[1] ^ starting_length; in LowLevelHash()

1234567891011