/external/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 35 const void *salt, size_t salt_len, unsigned iterations, in TestPBKDF2() argument 46 (const uint8_t *)salt, salt_len, iterations, digest, in TestPBKDF2() 161 const size_t salt_len = sizeof(kSalt); in TestZeroIterations() local 168 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations() 179 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TestZeroIterations()
|
D | pbkdf.c | 64 const uint8_t *salt, size_t salt_len, unsigned iterations, in PKCS5_PBKDF2_HMAC() argument 96 if (!HMAC_Update(&hctx, salt, salt_len) || in PKCS5_PBKDF2_HMAC() 146 const uint8_t *salt, size_t salt_len, in PKCS5_PBKDF2_HMAC_SHA1() argument 149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, in PKCS5_PBKDF2_HMAC_SHA1()
|
D | p_rsa.c | 525 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) { in EVP_PKEY_CTX_set_rsa_pss_saltlen() argument 528 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL); in EVP_PKEY_CTX_set_rsa_pss_saltlen()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() [all …]
|
/external/srtp/test/ |
D | dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; in test_dtls_srtp() local 174 salt_len = srtp_profile_get_master_salt_length(profile); in test_dtls_srtp() 176 memset(salt, 0xee, salt_len); in test_dtls_srtp() 177 append_salt_to_key(key, key_len, salt, salt_len); in test_dtls_srtp()
|
/external/libchrome/crypto/ |
D | signature_verifier_nss.cc | 36 unsigned int salt_len, in VerifyRSAPSS_End() argument 58 salt_len); in VerifyRSAPSS_End() 141 int salt_len, in VerifyInitRSAPSS() argument 159 salt_len_ = salt_len; in VerifyInitRSAPSS()
|
D | signature_verifier_openssl.cc | 77 int salt_len, in VerifyInitRSAPSS() argument 106 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len); in VerifyInitRSAPSS()
|
D | signature_verifier.h | 87 int salt_len,
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf_test.c | 29 const size_t salt_len; member 224 test->salt, test->salt_len, test->info, test->info_len)) { in main()
|
D | hkdf.c | 27 const uint8_t *salt, size_t salt_len, in HKDF() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { in HKDF()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 108 const uint8_t *salt, size_t salt_len, in pkcs12_key_gen_raw() argument 126 Slen = v * ((salt_len + v - 1) / v); in pkcs12_key_gen_raw() 144 *p++ = salt[i % salt_len]; in pkcs12_key_gen_raw() 223 int salt_len, iterations, ret; in pkcs12_pbe_keyivgen() local 248 salt_len = pbe->salt->length; in pkcs12_pbe_keyivgen() 249 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID, in pkcs12_pbe_keyivgen() 255 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID, in pkcs12_pbe_keyivgen() 535 int pass_len, uint8_t *salt, size_t salt_len, in PKCS8_encrypt() argument 544 salt, salt_len, iterations, p8inf); in PKCS8_encrypt() 555 uint8_t *salt, size_t salt_len, in PKCS8_encrypt_pbe() argument [all …]
|
/external/boringssl/src/include/openssl/ |
D | pkcs8.h | 91 uint8_t *salt, size_t salt_len, 126 uint8_t *salt, size_t salt_len,
|
D | hkdf.h | 34 const uint8_t *salt, size_t salt_len,
|
D | evp.h | 393 const uint8_t *salt, size_t salt_len, 401 size_t salt_len, unsigned iterations, 583 int salt_len);
|
/external/srtp/srtp/ |
D | srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; in srtp_stream_init_keys() local 385 tmp_key + base_key_len, salt_len); in srtp_stream_init_keys() 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; in srtp_stream_init_keys() local 434 tmp_key + base_key_len, salt_len); in srtp_stream_init_keys()
|