/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpkdf_pbkdf2.txt | 19 Ctrl.salt = salt:salt 27 Ctrl.salt = salt:salt 35 Ctrl.salt = salt:salt 43 Ctrl.salt = salt:salt 51 Ctrl.salt = salt:salt 59 Ctrl.salt = salt:salt 67 Ctrl.salt = salt:salt 75 Ctrl.salt = salt:salt 83 Ctrl.salt = salt:salt 90 Ctrl.salt = salt:saltSALTsaltSALTsaltSALTsaltSALTsalt [all …]
|
D | evpkdf_pbkdf1.txt | 19 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:saltsalt 35 Ctrl.salt = salt:saltsalt 43 Ctrl.salt = salt:saltsalt 51 Ctrl.salt = salt:saltsalt 59 Ctrl.salt = salt:saltsalt 67 Ctrl.salt = salt:saltsalt 75 Ctrl.salt = salt:saltsalt 83 Ctrl.salt = salt:saltsalt 91 Ctrl.salt = salt:saltSALT [all …]
|
D | evppkey_kdf_hkdf.txt | 19 Ctrl.salt = hexsalt:000102030405060708090a0b0c 27 Ctrl.salt = hexsalt:000102030405060708090a0b0c 40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 83 Ctrl.salt = hexsalt:000102030405060708090a0b0c 91 Ctrl.salt = hexsalt:000102030405060708090a0b0c 104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… [all …]
|
D | evpkdf_hkdf.txt | 19 Ctrl.salt = hexsalt:000102030405060708090a0b0c 27 Ctrl.salt = hexsalt:000102030405060708090a0b0c 40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 83 Ctrl.salt = hexsalt:000102030405060708090a0b0c 91 Ctrl.salt = hexsalt:000102030405060708090a0b0c 104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… [all …]
|
D | evppbe_pbkdf2.txt | 18 Salt = "salt" 25 Salt = "salt" 32 Salt = "salt" 39 Salt = "salt" 46 Salt = "salt" 53 Salt = "salt" 60 Salt = "salt" 67 Salt = "salt" 74 Salt = "salt" 125 Salt = "salt" [all …]
|
/third_party/musl/src/crypt/ |
D | crypt_r.c | 3 char *__crypt_r(const char *key, const char *salt, struct crypt_data *data) in __crypt_r() argument 10 if (salt[0] == '$' && salt[1] && salt[2]) { in __crypt_r() 11 if (salt[1] == '1' && salt[2] == '$') in __crypt_r() 12 return __crypt_md5(key, salt, output); in __crypt_r() 13 if (salt[1] == '2' && salt[3] == '$') in __crypt_r() 14 return __crypt_blowfish(key, salt, output); in __crypt_r() 15 if (salt[1] == '5' && salt[2] == '$') in __crypt_r() 16 return __crypt_sha256(key, salt, output); in __crypt_r() 17 if (salt[1] == '6' && salt[2] == '$') in __crypt_r() 18 return __crypt_sha512(key, salt, output); in __crypt_r() [all …]
|
/third_party/openssl/test/recipes/ |
D | 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=10$roundstoolow', 42 salt => 'saltstring', 46 salt => 'rounds=10000$saltstringsaltstring', 50 salt => 'rounds=5000$toolongsaltstring', 54 salt => 'rounds=1400$anotherlongsaltstring', 58 salt => 'rounds=10$roundstoolow', [all …]
|
/third_party/musl/libc-test/src/functionalext/crypt/ |
D | crypt.c | 22 char *salt; in test_crypt() local 24 salt = "$1$"; in test_crypt() 25 char *md5_result = crypt(key, salt); in test_crypt() 29 salt = "$2$"; in test_crypt() 30 char *blowfish_result_first = crypt(key, salt); in test_crypt() 31 char *blowfish_result_second = crypt(key, salt); in test_crypt() 34 salt = "$5$"; in test_crypt() 35 char *sha256_result = crypt(key, salt); in test_crypt() 40 salt = "$6$"; in test_crypt() 41 char *sha512_result = crypt(key, salt); in test_crypt() [all …]
|
/third_party/f2fs-tools/tools/ |
D | f2fscrypt.c | 235 struct salt { struct 236 unsigned char *salt; argument 242 struct salt *salt_list; argument 247 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 250 struct salt *p; in find_by_salt() 254 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 259 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 261 if (find_by_salt(salt, salt_len)) in add_salt() 265 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt() 271 salt_list[num_salt].salt = salt; in add_salt() [all …]
|
/third_party/node/lib/internal/crypto/ |
D | hkdf.js | 51 const validateParameters = hideStackFrames((hash, key, salt, info, length) => { 54 salt = validateByteSource(salt, 'salt'); 69 salt, 101 function hkdf(hash, key, salt, info, length, callback) { argument 105 salt, 108 } = validateParameters(hash, key, salt, info, length)); 112 const job = new HKDFJob(kCryptoJobAsync, hash, key, salt, info, length); 122 function hkdfSync(hash, key, salt, info, length) { argument 126 salt, 129 } = validateParameters(hash, key, salt, info, length)); [all …]
|
D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 39 ({ password, salt, iterations, keylen, digest } = 40 check(password, salt, iterations, keylen, digest)); 47 salt, 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 66 ({ password, salt, iterations, keylen, digest } = 67 check(password, salt, iterations, keylen, digest)); 72 salt, 86 function check(password, salt, iterations, keylen, digest) { argument 90 salt = getArrayBufferOrView(salt, 'salt'); [all …]
|
D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { argument 47 options = check(password, salt, keylen, options); 49 ({ password, salt, keylen } = options); 54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); 69 function scryptSync(password, salt, keylen, options = defaults) { argument 70 options = check(password, salt, keylen, options); 72 ({ password, salt, keylen } = options); 74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen); 85 function check(password, salt, keylen, options) { argument 90 salt = getArrayBufferOrView(salt, 'salt'); [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | recur1.types | 2 var salt:any = new salt.pepper(); 3 >salt : any 4 >new salt.pepper() : any 5 >salt.pepper : any 6 >salt : any 9 salt.pepper = function() {} 10 >salt.pepper = function() {} : () => void 11 >salt.pepper : any 12 >salt : any
|
D | recur1.symbols | 2 var salt:any = new salt.pepper(); 3 >salt : Symbol(salt, Decl(recur1.ts, 0, 3)) 4 >salt : Symbol(salt, Decl(recur1.ts, 0, 3)) 6 salt.pepper = function() {} 7 >salt : Symbol(salt, Decl(recur1.ts, 0, 3))
|
/third_party/node/src/crypto/ |
D | crypto_hkdf.cc | 25 salt(std::move(other.salt)), in HKDFConfig() 69 ArrayBufferOrViewContents<char> salt(args[offset + 2]); in AdditionalConfig() local 72 if (UNLIKELY(!salt.CheckSizeInt32())) { in AdditionalConfig() 81 params->salt = mode == kCryptoJobAsync in AdditionalConfig() 82 ? salt.ToCopy() in AdditionalConfig() 83 : salt.ToByteSource(); in AdditionalConfig() 120 std::string_view salt; in DeriveBits() local 121 if (params.salt.size() != 0) { in DeriveBits() 122 salt = {params.salt.data<char>(), params.salt.size()}; in DeriveBits() 125 salt = {default_salt, static_cast<unsigned>(EVP_MD_size(params.digest))}; in DeriveBits() [all …]
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 106 salt = p12->mac->salt->data; in pkcs12_gen_mac() 107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 148 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() [all …]
|
D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 106 salt, saltlen); in PKCS12_key_gen_uni_ex() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 101 salt = p12->mac->salt->data; in pkcs12_gen_mac() 102 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 134 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 141 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 148 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() [all …]
|
D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 106 salt, saltlen); in PKCS12_key_gen_uni_ex() [all …]
|
/third_party/openssl/crypto/asn1/ |
D | p5_pbe.c | 19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 28 const unsigned char *salt, int saltlen, 56 if (salt) 57 memcpy(sstr, salt, saltlen); 61 ASN1_STRING_set0(pbe->salt, sstr, saltlen); 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument 101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument [all …]
|
D | p5_pbev2.c | 28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 43 unsigned char *salt, int saltlen, 112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen, 149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument 152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv() 157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument 159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set() 164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument 177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex() 178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
D | p5_pbe.c | 19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 28 const unsigned char *salt, int saltlen, 56 if (salt) 57 memcpy(sstr, salt, saltlen); 61 ASN1_STRING_set0(pbe->salt, sstr, saltlen); 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument 101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument [all …]
|
D | p5_pbev2.c | 28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 43 unsigned char *salt, int saltlen, 112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen, 149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument 152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv() 157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument 159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set() 164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument 177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex() 178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex() [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | pkcs5.rs | 37 salt: Option<&[u8]>, in bytes_to_key() 42 let salt_ptr = match salt { in bytes_to_key() 43 Some(salt) => { in bytes_to_key() 44 assert_eq!(salt.len(), ffi::PKCS5_SALT_LEN as usize); in bytes_to_key() 45 salt.as_ptr() in bytes_to_key() 93 salt: &[u8], in pbkdf2_hmac() 103 salt.as_ptr(), in pbkdf2_hmac() 104 salt.len().try_into().unwrap(), in pbkdf2_hmac() 122 salt: &[u8], in scrypt() 134 salt.as_ptr() as *const _, in scrypt() [all …]
|
/third_party/node/benchmark/crypto/ |
D | hkdf.js | 14 salt: ['', 'salt'], property 20 function measureSync(n, size, salt, info, hash, key) { argument 23 hkdfSync(hash, key, salt, info, size); 27 function measureAsync(n, size, salt, info, hash, key) { argument 36 hkdf(hash, key, salt, info, size, done); 39 function main({ n, sync, size, salt, info, hash, key }) { property 41 measureSync(n, size, salt, info, hash, key); 43 measureAsync(n, size, salt, info, hash, key);
|