Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 25 of 73) sorted by relevance

123

/third_party/f2fs-tools/tools/
Df2fscrypt.c240 size_t salt_len; member
247 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument
253 if ((p->salt_len == salt_len) && in find_by_salt()
254 !memcmp(p->salt, salt, salt_len)) in find_by_salt()
259 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument
261 if (find_by_salt(salt, salt_len)) in add_salt()
272 salt_list[num_salt].salt_len = salt_len; in add_salt()
332 int fd, ret, salt_len = 0; in parse_salt() local
338 salt_len = strlen(cp); in parse_salt()
339 if (salt_len >= F2FS_MAX_SALT_SIZE) in parse_salt()
[all …]
/third_party/mbedtls/library/
Dhkdf.c29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument
36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
49 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
58 if (salt_len != 0) { in mbedtls_hkdf_extract()
69 salt_len = hash_len; in mbedtls_hkdf_extract()
72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
/third_party/node/deps/openssl/openssl/apps/
Dpasswd.c326 size_t passwd_len, salt_len, magic_len; in md5crypt() local
340 salt_len = strlen(ascii_salt); in md5crypt()
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt()
372 if (salt_len > 8) in md5crypt()
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt()
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt()
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt()
459 output = salt_out + salt_len; in md5crypt()
520 size_t passwd_len, salt_len, magic_len; in shacrypt() local
573 salt_len = strlen(ascii_salt); in shacrypt()
[all …]
/third_party/openssl/apps/
Dpasswd.c326 size_t passwd_len, salt_len, magic_len; in md5crypt() local
340 salt_len = strlen(ascii_salt); in md5crypt()
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt()
372 if (salt_len > 8) in md5crypt()
387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt()
394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt()
423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt()
459 output = salt_out + salt_len; in md5crypt()
520 size_t passwd_len, salt_len, magic_len; in shacrypt() local
573 salt_len = strlen(ascii_salt); in shacrypt()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dpkcs5.c27 size_t salt_len; member
179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
327 params->salt_len = hdr.length; in pkcs5_get_params()
329 params->salt, params->salt_len); in pkcs5_get_params()
373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument
419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
425 if (salt_len) { in pkcs12_key_gen()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dpkcs5.c27 size_t salt_len; member
187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
348 params->salt_len = hdr.length; in pkcs5_get_params()
350 params->salt, params->salt_len); in pkcs5_get_params()
395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument
441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
447 if (salt_len) { in pkcs12_key_gen()
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
Dhkdf.c50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
240 &ctx->salt_len)) in hkdf_common_set_ctx_params()
396 const unsigned char *salt, size_t salt_len, in HKDF() argument
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument
462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract()
[all …]
Dsskdf.c63 size_t salt_len; member
215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm()
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset()
394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive()
400 ctx->salt_len = default_salt_len; in sskdf_derive()
404 ctx->salt, ctx->salt_len, in sskdf_derive()
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
/third_party/openssl/providers/implementations/kdfs/
Dhkdf.c50 const unsigned char *salt, size_t salt_len,
55 const unsigned char *salt, size_t salt_len,
77 size_t salt_len; member
176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
240 &ctx->salt_len)) in hkdf_common_set_ctx_params()
396 const unsigned char *salt, size_t salt_len, in HKDF() argument
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
447 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument
462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract()
[all …]
Dsskdf.c63 size_t salt_len; member
215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument
239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm()
308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset()
394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive()
400 ctx->salt_len = default_salt_len; in sskdf_derive()
404 ctx->salt, ctx->salt_len, in sskdf_derive()
484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
Dpbkdf1.c41 size_t salt_len; member
172 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive()
190 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len,p)) in kdf_pbkdf1_set_ctx_params()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_pwd.c368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local
431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
454 (int) salt_len); in eap_pwd_perform_commit_exchange()
455 ptr += salt_len; in eap_pwd_perform_commit_exchange()
468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_pwd.c368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local
431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
454 (int) salt_len); in eap_pwd_perform_commit_exchange()
455 ptr += salt_len; in eap_pwd_perform_commit_exchange()
468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_pkcs12.function32 size_t salt_len = 0;
45 salt_len = salt_arg->len;
54 salt_len,
Dtest_suite_hkdf.function95 size_t salt_len, ikm_len;
103 salt_len = 0;
106 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_pwd.c31 size_t salt_len; member
121 data->salt_len = sm->user->salt_len; in eap_pwd_init()
122 if (data->salt_len) { in eap_pwd_init()
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset()
194 if (data->salt_len) in eap_pwd_build_id_req()
196 data->salt, data->salt_len); in eap_pwd_build_id_req()
202 if (data->salt_len) { in eap_pwd_build_id_req()
283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req()
288 if (data->salt_len) { in eap_pwd_build_commit_req()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_pwd.c31 size_t salt_len; member
121 data->salt_len = sm->user->salt_len; in eap_pwd_init()
122 if (data->salt_len) { in eap_pwd_init()
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset()
194 if (data->salt_len) in eap_pwd_build_id_req()
196 data->salt, data->salt_len); in eap_pwd_build_id_req()
202 if (data->salt_len) { in eap_pwd_build_id_req()
283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req()
288 if (data->salt_len) { in eap_pwd_build_commit_req()
[all …]
/third_party/mbedtls/include/mbedtls/
Dhkdf.h69 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
98 const unsigned char *salt, size_t salt_len,
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/
Dgstmikey.c633 guint16 salt_len, const guint8 * salt_data) in gst_mikey_payload_key_data_set_salt() argument
639 g_return_val_if_fail ((salt_len == 0 && salt_data == NULL) || in gst_mikey_payload_key_data_set_salt()
640 (salt_len > 0 && salt_data != NULL), FALSE); in gst_mikey_payload_key_data_set_salt()
642 p->salt_len = salt_len; in gst_mikey_payload_key_data_set_salt()
643 INIT_MEMDUP (p->salt_data, salt_data, salt_len); in gst_mikey_payload_key_data_set_salt()
736 gst_mikey_payload_key_data_set_salt (&copy->pt, payload->salt_len, in gst_mikey_payload_key_data_copy()
1607 ((p->key_type | (p->salt_len ? 1 : 0)) << 4) | (p->kv_type & 0xf); in payloads_to_bytes()
1612 if (p->salt_len > 0) { in payloads_to_bytes()
1613 ENSURE_SIZE (2 + p->salt_len); in payloads_to_bytes()
1614 GST_WRITE_UINT16_BE (&data[0], p->salt_len); in payloads_to_bytes()
[all …]
/third_party/node/src/crypto/
Dcrypto_sig.cc60 const Maybe<int>& salt_len) { in ValidateDSAParameters() argument
66 if (padding == RSA_PKCS1_PSS_PADDING && salt_len.IsJust()) { in ValidateDSAParameters()
67 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, salt_len.FromJust()) <= 0) in ValidateDSAParameters()
391 const Maybe<int>& salt_len, in SignFinal() argument
402 Node_SignFinal(env(), std::move(mdctx), pkey, padding, salt_len); in SignFinal()
429 Maybe<int> salt_len = Nothing<int>(); in SignFinal() local
432 salt_len = Just<int>(args[offset + 1].As<Int32>()->Value()); in SignFinal()
442 salt_len, in SignFinal()
560 Maybe<int> salt_len = Nothing<int>(); in VerifyFinal() local
563 salt_len = Just<int>(args[offset + 2].As<Int32>()->Value()); in VerifyFinal()
[all …]
/third_party/openssl/crypto/rand/
Dprov_seed.c49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument
63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
/third_party/node/deps/openssl/openssl/crypto/rand/
Dprov_seed.c49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument
63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
/third_party/openssl/providers/common/
Dprovider_seeding.c65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() argument
70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
/third_party/node/deps/openssl/openssl/providers/common/
Dprovider_seeding.c65 const void *salt,size_t salt_len) in ossl_prov_get_nonce() argument
70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dauthsrv.c80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user()
82 eap_user->salt_len); in hostapd_radius_get_eap_user()
85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()

123