Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 576) sorted by relevance

12345678910>>...24

/third_party/openssl/test/recipes/30-test_evp_data/
Devpkdf_pbkdf2.txt19 Ctrl.salt = salt:salt
27 Ctrl.salt = salt:salt
35 Ctrl.salt = salt:salt
43 Ctrl.salt = salt:salt
51 Ctrl.salt = salt:salt
59 Ctrl.salt = salt:salt
67 Ctrl.salt = salt:salt
75 Ctrl.salt = salt:salt
83 Ctrl.salt = salt:salt
90 Ctrl.salt = salt:saltSALTsaltSALTsaltSALTsaltSALTsalt
[all …]
Devpkdf_pbkdf1.txt19 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:saltsalt
35 Ctrl.salt = salt:saltsalt
43 Ctrl.salt = salt:saltsalt
51 Ctrl.salt = salt:saltsalt
59 Ctrl.salt = salt:saltsalt
67 Ctrl.salt = salt:saltsalt
75 Ctrl.salt = salt:saltsalt
83 Ctrl.salt = salt:saltsalt
91 Ctrl.salt = salt:saltSALT
[all …]
Devppkey_kdf_hkdf.txt19 Ctrl.salt = hexsalt:000102030405060708090a0b0c
27 Ctrl.salt = hexsalt:000102030405060708090a0b0c
40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
83 Ctrl.salt = hexsalt:000102030405060708090a0b0c
91 Ctrl.salt = hexsalt:000102030405060708090a0b0c
104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
[all …]
Devpkdf_hkdf.txt19 Ctrl.salt = hexsalt:000102030405060708090a0b0c
27 Ctrl.salt = hexsalt:000102030405060708090a0b0c
40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
83 Ctrl.salt = hexsalt:000102030405060708090a0b0c
91 Ctrl.salt = hexsalt:000102030405060708090a0b0c
104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
[all …]
Devppbe_pbkdf2.txt18 Salt = "salt"
25 Salt = "salt"
32 Salt = "salt"
39 Salt = "salt"
46 Salt = "salt"
53 Salt = "salt"
60 Salt = "salt"
67 Salt = "salt"
74 Salt = "salt"
125 Salt = "salt"
[all …]
/third_party/musl/src/crypt/
Dcrypt_r.c3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument
10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r()
11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r()
12 return __crypt_md5(key, salt, output); in __crypt_r()
13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r()
14 return __crypt_blowfish(key, salt, output); in __crypt_r()
15 if (salt[1] == '5' && salt[2] == '$') in __crypt_r()
16 return __crypt_sha256(key, salt, output); in __crypt_r()
17 if (salt[1] == '6' && salt[2] == '$') in __crypt_r()
18 return __crypt_sha512(key, salt, output); in __crypt_r()
[all …]
/third_party/openssl/test/recipes/
D20-test_passwd.t22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=10$roundstoolow',
42 salt => 'saltstring',
46 salt => 'rounds=10000$saltstringsaltstring',
50 salt => 'rounds=5000$toolongsaltstring',
54 salt => 'rounds=1400$anotherlongsaltstring',
58 salt => 'rounds=10$roundstoolow',
[all …]
/third_party/musl/libc-test/src/functionalext/crypt/
Dcrypt.c22 char *salt; in test_crypt() local
24 salt = "$1$"; in test_crypt()
25 char *md5_result = crypt(key, salt); in test_crypt()
29 salt = "$2$"; in test_crypt()
30 char *blowfish_result_first = crypt(key, salt); in test_crypt()
31 char *blowfish_result_second = crypt(key, salt); in test_crypt()
34 salt = "$5$"; in test_crypt()
35 char *sha256_result = crypt(key, salt); in test_crypt()
40 salt = "$6$"; in test_crypt()
41 char *sha512_result = crypt(key, salt); in test_crypt()
[all …]
/third_party/f2fs-tools/tools/
Df2fscrypt.c235 struct salt { struct
236 unsigned char *salt; argument
242 struct salt *salt_list; argument
247 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
250 struct salt *p; in find_by_salt()
254 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
259 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
261 if (find_by_salt(salt, salt_len)) in add_salt()
265 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt()
271 salt_list[num_salt].salt = salt; in add_salt()
[all …]
/third_party/node/lib/internal/crypto/
Dhkdf.js51 const validateParameters = hideStackFrames((hash, key, salt, info, length) => {
54 salt = validateByteSource(salt, 'salt');
69 salt,
101 function hkdf(hash, key, salt, info, length, callback) { argument
105 salt,
108 } = validateParameters(hash, key, salt, info, length));
112 const job = new HKDFJob(kCryptoJobAsync, hash, key, salt, info, length);
122 function hkdfSync(hash, key, salt, info, length) { argument
126 salt,
129 } = validateParameters(hash, key, salt, info, length));
[all …]
Dpbkdf2.js33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument
39 ({ password, salt, iterations, keylen, digest } =
40 check(password, salt, iterations, keylen, digest));
47 salt,
65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument
66 ({ password, salt, iterations, keylen, digest } =
67 check(password, salt, iterations, keylen, digest));
72 salt,
86 function check(password, salt, iterations, keylen, digest) { argument
90 salt = getArrayBufferOrView(salt, 'salt');
[all …]
Dscrypt.js41 function scrypt(password, salt, keylen, options, callback = defaults) { argument
47 options = check(password, salt, keylen, options);
49 ({ password, salt, keylen } = options);
54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen);
69 function scryptSync(password, salt, keylen, options = defaults) { argument
70 options = check(password, salt, keylen, options);
72 ({ password, salt, keylen } = options);
74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen);
85 function check(password, salt, keylen, options) { argument
90 salt = getArrayBufferOrView(salt, 'salt');
[all …]
/third_party/typescript/tests/baselines/reference/
Drecur1.types2 var salt:any = new salt.pepper();
3 >salt : any
4 >new salt.pepper() : any
5 >salt.pepper : any
6 >salt : any
9 salt.pepper = function() {}
10 >salt.pepper = function() {} : () => void
11 >salt.pepper : any
12 >salt : any
Drecur1.symbols2 var salt:any = new salt.pepper();
3 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
4 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
6 salt.pepper = function() {}
7 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
/third_party/node/src/crypto/
Dcrypto_hkdf.cc25 salt(std::move(other.salt)), in HKDFConfig()
69 ArrayBufferOrViewContents<char> salt(args[offset + 2]); in AdditionalConfig() local
72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig()
81 params->salt = mode == kCryptoJobAsync in AdditionalConfig()
82 ? salt.ToCopy() in AdditionalConfig()
83 : salt.ToByteSource(); in AdditionalConfig()
120 std::string_view salt; in DeriveBits() local
121 if (params.salt.size() != 0) { in DeriveBits()
122 salt = {params.salt.data<char>(), params.salt.size()}; in DeriveBits()
125 salt = {default_salt, static_cast<unsigned>(EVP_MD_size(params.digest))}; in DeriveBits()
[all …]
/third_party/openssl/crypto/pkcs12/
Dp12_mutl.c38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument
88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
106 salt = p12->mac->salt->data; in pkcs12_gen_mac()
107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
148 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
[all …]
Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument
106 salt, saltlen); in PKCS12_key_gen_uni_ex()
[all …]
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
Dp12_mutl.c38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument
88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
101 salt = p12->mac->salt->data; in pkcs12_gen_mac()
102 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
148 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
[all …]
Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument
106 salt, saltlen); in PKCS12_key_gen_uni_ex()
[all …]
/third_party/openssl/crypto/asn1/
Dp5_pbe.c19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
28 const unsigned char *salt, int saltlen,
56 if (salt)
57 memcpy(sstr, salt, saltlen);
61 ASN1_STRING_set0(pbe->salt, sstr, saltlen);
83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument
85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor()
91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument
101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex()
109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
[all …]
Dp5_pbev2.c28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
43 unsigned char *salt, int saltlen,
112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen,
149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument
152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv()
157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set()
164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument
177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex()
178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex()
[all …]
/third_party/node/deps/openssl/openssl/crypto/asn1/
Dp5_pbe.c19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
28 const unsigned char *salt, int saltlen,
56 if (salt)
57 memcpy(sstr, salt, saltlen);
61 ASN1_STRING_set0(pbe->salt, sstr, saltlen);
83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument
85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor()
91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument
101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex()
109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
[all …]
Dp5_pbev2.c28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
43 unsigned char *salt, int saltlen,
112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen,
149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument
152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv()
157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set()
164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument
177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex()
178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex()
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/
Dpkcs5.rs37 salt: Option<&[u8]>, in bytes_to_key()
42 let salt_ptr = match salt { in bytes_to_key()
43 Some(salt) => { in bytes_to_key()
44 assert_eq!(salt.len(), ffi::PKCS5_SALT_LEN as usize); in bytes_to_key()
45 salt.as_ptr() in bytes_to_key()
93 salt: &[u8], in pbkdf2_hmac()
103 salt.as_ptr(), in pbkdf2_hmac()
104 salt.len().try_into().unwrap(), in pbkdf2_hmac()
122 salt: &[u8], in scrypt()
134 salt.as_ptr() as *const _, in scrypt()
[all …]
/third_party/node/benchmark/crypto/
Dhkdf.js14 salt: ['', 'salt'], property
20 function measureSync(n, size, salt, info, hash, key) { argument
23 hkdfSync(hash, key, salt, info, size);
27 function measureAsync(n, size, salt, info, hash, key) { argument
36 hkdf(hash, key, salt, info, size, done);
39 function main({ n, sync, size, salt, info, hash, key }) { property
41 measureSync(n, size, salt, info, hash, key);
43 measureAsync(n, size, salt, info, hash, key);

12345678910>>...24