| /third_party/node/test/fixtures/ |
| D | pss-vectors.json | 14 "salt": "dee959c7e06411361420ff80185ed57f3e6776af", string 19 "salt": "ef2869fa40c346cb183dab3d7bffc98fd56df42d", string 24 "salt": "710b9c4747d800d4de87f12afdce6df18107cc77", string 29 "salt": "056f00985de14d8ef5cea9e82f8c27bef720335e", string 34 "salt": "80e70ff86a08de3ec60972b39b4fbfdcea67ae8e", string 39 "salt": "a8ab69dd801f0074c2a1fc60649836c616d99681", string 59 "salt": "04e215ee6ff934b9da70d7730c8734abfcecde89", string 64 "salt": "8b2bdd4b40faf545c778ddf9bc1a49cb57f9b71b", string 69 "salt": "4e96fc1b398f92b44671010c0dc3efd6e20c2d73", string 74 "salt": "c7cd698d84b65128d8835e3a8b1eb0e01cb541ec", string [all …]
|
| /third_party/node/benchmark/crypto/ |
| D | hkdf.js | 14 salt: ['', 'salt'], property 20 function measureSync(n, size, salt, info, hash, key) { argument 27 function measureAsync(n, size, salt, info, hash, key) { argument 39 function main({ n, sync, size, salt, info, hash, key }) { property
|
| /third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
| D | pbkdf2.js | 37 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse… property 56 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseI… property 76 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseIn… property 86 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseI… property 96 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseI… property 109 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse… property 119 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse… property 129 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse… property 140 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseI… property 150 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse… property [all …]
|
| /third_party/openssl/crypto/asn1/ |
| D | p5_pbev2.c | 149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() 157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() 164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() 241 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set()
|
| D | p5_pbe.c | 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set()
|
| D | p5_scrypt.c | 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen_ex() local
|
| /third_party/node/deps/openssl/openssl/crypto/asn1/ |
| D | p5_pbev2.c | 149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() 157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() 164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() 241 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set()
|
| D | p5_pbe.c | 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set()
|
| D | p5_scrypt.c | 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() 147 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() 216 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen_ex() local
|
| /third_party/openssl/crypto/pkcs12/ |
| D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() 133 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni()
|
| D | p12_mutl.c | 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 205 unsigned char *salt, int saltlen, int iter, in PKCS12_set_mac() 237 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, in PKCS12_setup_mac()
|
| /third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
| D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() 133 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni()
|
| D | p12_mutl.c | 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 210 unsigned char *salt, int saltlen, int iter, in PKCS12_set_mac() 242 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, in PKCS12_setup_mac()
|
| /third_party/node/lib/internal/crypto/ |
| D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { argument 69 function scryptSync(password, salt, keylen, options = defaults) { argument 85 function check(password, salt, keylen, options) { argument
|
| D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { argument 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { argument 86 function check(password, salt, iterations, keylen, digest) { argument
|
| /third_party/typescript/tests/baselines/reference/ |
| D | recur1.js | 2 var salt:any = new salt.pepper(); variable 11 var salt = new salt.pepper(); variable
|
| D | assign1.js | 8 var x:I={salt:2,pepper:0}; property 15 var x = { salt: 2, pepper: 0 }; property
|
| D | structural1.js | 11 f({salt:2,pepper:0}); property 21 f({ salt: 2, pepper: 0 }); property
|
| /third_party/f2fs-tools/tools/ |
| D | f2fscrypt.c | 236 struct salt { struct 237 unsigned char *salt; argument 241 size_t salt_len; argument 243 struct salt *salt_list; argument 248 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() 260 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() 409 struct salt *salt; in set_policy() local 464 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() 601 static void generate_key_ref_str(struct salt *salt) in generate_key_ref_str() 617 static void insert_key_into_keyring(const char *keyring, struct salt *salt) in insert_key_into_keyring() [all …]
|
| /third_party/mbedtls/tests/src/drivers/ |
| D | test_driver_asymmetric_encryption.c | 31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 150 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_decrypt()
|
| /third_party/mbedtls/library/ |
| D | pkcs5.c | 41 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() 138 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2_ext() local 270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() 360 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() 371 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
|
| /third_party/node/test/parallel/ |
| D | test-webcrypto-derivebits-hkdf.js | 230 salt: Buffer.from(kSalts[saltSize], 'hex'), property 254 salt: Buffer.from(kSalts[saltSize], 'hex'), property 290 const algorithm = { name: 'HKDF', salt, info }; property 323 salt: Buffer.from(kSalts[saltSize], 'hex'), property 360 salt: Buffer.from(kSalts[infoSize], 'hex'), property 377 salt: Buffer.from(kSalts[saltSize], 'hex'), property 398 salt: Buffer.from(kSalts[saltSize], 'hex'), property 427 const algorithm = { name: 'HKDF', salt, info }; property 471 salt: Buffer.from(kSalts[saltSize], 'hex'), property 492 salt: Buffer.from(kSalts[saltSize], 'hex'), property
|
| /third_party/node/deps/openssl/openssl/crypto/des/ |
| D | fcrypt.c | 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt()
|
| /third_party/openssl/crypto/des/ |
| D | fcrypt.c | 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt()
|
| /third_party/node/deps/openssl/openssl/crypto/evp/ |
| D | p5_crpt2.c | 23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() 83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() 93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() 185 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen_ex() local
|