/third_party/f2fs-tools/tools/ |
D | f2fscrypt.c | 240 size_t salt_len; member 247 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 253 if ((p->salt_len == salt_len) && in find_by_salt() 254 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 259 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 261 if (find_by_salt(salt, salt_len)) in add_salt() 272 salt_list[num_salt].salt_len = salt_len; in add_salt() 332 int fd, ret, salt_len = 0; in parse_salt() local 338 salt_len = strlen(cp); in parse_salt() 339 if (salt_len >= F2FS_MAX_SALT_SIZE) in parse_salt() [all …]
|
/third_party/mbedtls/library/ |
D | hkdf.c | 29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 49 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 58 if (salt_len != 0) { in mbedtls_hkdf_extract() 69 salt_len = hash_len; in mbedtls_hkdf_extract() 72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len = strlen(ascii_salt); in shacrypt() [all …]
|
/third_party/openssl/apps/ |
D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len = strlen(ascii_salt); in shacrypt() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 327 params->salt_len = hdr.length; in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 425 if (salt_len) { in pkcs12_key_gen() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
D | hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 240 &ctx->salt_len)) in hkdf_common_set_ctx_params() 396 const unsigned char *salt, size_t salt_len, in HKDF() argument 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument 462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() [all …]
|
D | sskdf.c | 63 size_t salt_len; member 215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 400 ctx->salt_len = default_salt_len; in sskdf_derive() 404 ctx->salt, ctx->salt_len, in sskdf_derive() 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
|
/third_party/openssl/providers/implementations/kdfs/ |
D | hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 240 &ctx->salt_len)) in hkdf_common_set_ctx_params() 396 const unsigned char *salt, size_t salt_len, in HKDF() argument 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument 462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() [all …]
|
D | sskdf.c | 63 size_t salt_len; member 215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 400 ctx->salt_len = default_salt_len; in sskdf_derive() 404 ctx->salt, ctx->salt_len, in sskdf_derive() 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
|
D | pbkdf1.c | 41 size_t salt_len; member 172 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive() 190 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkcs12.function | 32 size_t salt_len = 0; 45 salt_len = salt_arg->len; 54 salt_len,
|
D | test_suite_hkdf.function | 95 size_t salt_len, ikm_len; 103 salt_len = 0; 106 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
/third_party/mbedtls/include/mbedtls/ |
D | hkdf.h | 69 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 98 const unsigned char *salt, size_t salt_len,
|
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/ |
D | gstmikey.c | 633 guint16 salt_len, const guint8 * salt_data) in gst_mikey_payload_key_data_set_salt() argument 639 g_return_val_if_fail ((salt_len == 0 && salt_data == NULL) || in gst_mikey_payload_key_data_set_salt() 640 (salt_len > 0 && salt_data != NULL), FALSE); in gst_mikey_payload_key_data_set_salt() 642 p->salt_len = salt_len; in gst_mikey_payload_key_data_set_salt() 643 INIT_MEMDUP (p->salt_data, salt_data, salt_len); in gst_mikey_payload_key_data_set_salt() 736 gst_mikey_payload_key_data_set_salt (©->pt, payload->salt_len, in gst_mikey_payload_key_data_copy() 1607 ((p->key_type | (p->salt_len ? 1 : 0)) << 4) | (p->kv_type & 0xf); in payloads_to_bytes() 1612 if (p->salt_len > 0) { in payloads_to_bytes() 1613 ENSURE_SIZE (2 + p->salt_len); in payloads_to_bytes() 1614 GST_WRITE_UINT16_BE (&data[0], p->salt_len); in payloads_to_bytes() [all …]
|
/third_party/node/src/crypto/ |
D | crypto_sig.cc | 60 const Maybe<int>& salt_len) { in ValidateDSAParameters() argument 66 if (padding == RSA_PKCS1_PSS_PADDING && salt_len.IsJust()) { in ValidateDSAParameters() 67 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, salt_len.FromJust()) <= 0) in ValidateDSAParameters() 391 const Maybe<int>& salt_len, in SignFinal() argument 402 Node_SignFinal(env(), std::move(mdctx), pkey, padding, salt_len); in SignFinal() 429 Maybe<int> salt_len = Nothing<int>(); in SignFinal() local 432 salt_len = Just<int>(args[offset + 1].As<Int32>()->Value()); in SignFinal() 442 salt_len, in SignFinal() 560 Maybe<int> salt_len = Nothing<int>(); in VerifyFinal() local 563 salt_len = Just<int>(args[offset + 2].As<Int32>()->Value()); in VerifyFinal() [all …]
|
/third_party/openssl/crypto/rand/ |
D | prov_seed.c | 49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
|
/third_party/node/deps/openssl/openssl/crypto/rand/ |
D | prov_seed.c | 49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
|
/third_party/openssl/providers/common/ |
D | provider_seeding.c | 65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() argument 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/third_party/node/deps/openssl/openssl/providers/common/ |
D | provider_seeding.c | 65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() argument 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | authsrv.c | 80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user() 82 eap_user->salt_len); in hostapd_radius_get_eap_user() 85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()
|