Searched defs:saltlen (Results 1 - 25 of 29) sorted by relevance

12

/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_mutl.c73 int saltlen, iter; local
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
170 if (!saltlen) saltlen = PKCS12_SALT_LEN;
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) {
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_crpt.c73 int saltlen, iter, ret; local
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_add.c105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
168 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
H A Dp12_key.c78 int saltlen, int id, int iter, int n, unsigned char *out,
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
104 int saltlen, int id, int iter, int n, unsigned char *out,
131 fprintf(stderr, "Salt (length %d):\n", saltlen);
132 h__dump(salt, saltlen);
141 Slen = v * ((saltlen+v-1)/v);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
77 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
103 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
/external/openssl/crypto/pkcs12/
H A Dp12_mutl.c73 int saltlen, iter; local
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
170 if (!saltlen) saltlen = PKCS12_SALT_LEN;
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) {
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_crpt.c73 int saltlen, iter, ret; local
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_add.c105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
168 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
H A Dp12_key.c78 int saltlen, int id, int iter, int n, unsigned char *out,
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
104 int saltlen, int id, int iter, int n, unsigned char *out,
131 fprintf(stderr, "Salt (length %d):\n", saltlen);
132 h__dump(salt, saltlen);
141 Slen = v * ((saltlen+v-1)/v);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
77 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
103 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
/external/dropbear/libtomcrypt/src/pk/pkcs1/
H A Dpkcs_1_pss_decode.c26 @param saltlen The length of the salt used (octets)
34 unsigned long saltlen, int hash_idx,
57 if ((saltlen > modulus_len) ||
58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) {
117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
120 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) {
144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
32 pkcs_1_pss_decode(const unsigned char *msghash, unsigned long msghashlen, const unsigned char *sig, unsigned long siglen, unsigned long saltlen, int hash_idx, unsigned long modulus_bitlen, int *res) argument
H A Dpkcs_1_pss_encode.c24 @param saltlen The length of the salt desired (octets)
34 unsigned long saltlen, prng_state *prng,
60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) {
87 if (saltlen > 0) {
88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) {
112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
114 XMEMSET(DB + x, 0, modulus_len - saltlen
33 pkcs_1_pss_encode(const unsigned char *msghash, unsigned long msghashlen, unsigned long saltlen, prng_state *prng, int prng_idx, int hash_idx, unsigned long modulus_bitlen, unsigned char *out, unsigned long *outlen) argument
[all...]
/external/dropbear/libtomcrypt/src/pk/rsa/
H A Drsa_sign_hash.c30 @param saltlen The length of the salt desired (octets)
38 int hash_idx, unsigned long saltlen,
77 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx,
34 rsa_sign_hash_ex(const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen, int padding, prng_state *prng, int prng_idx, int hash_idx, unsigned long saltlen, rsa_key *key) argument
H A Drsa_verify_hash.c28 @param saltlen The length of the salt used during signature
36 int hash_idx, unsigned long saltlen,
95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat);
33 rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int padding, int hash_idx, unsigned long saltlen, int *stat, rsa_key *key) argument
/external/dropbear/libtomcrypt/testprof/
H A Dpkcs_1_test.c9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local
33 /* pick a random saltlen 0..16 */
34 saltlen = abs(rand()) % 17;
63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1));
64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1));
67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2));
71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3);
73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
/external/chromium_org/third_party/openssl/openssl/crypto/evp/
H A Dp5_crpt.c81 int saltlen, iter; local
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
H A Dp5_crpt2.c81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
236 int saltlen, iter, plen; local
303 saltlen = kdf->salt->value.octet_string->length;
305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
147 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
/external/openssl/crypto/evp/
H A Dp5_crpt.c81 int saltlen, iter; local
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
H A Dp5_crpt2.c81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
236 int saltlen, iter, plen; local
303 saltlen = kdf->salt->value.octet_string->length;
305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
147 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
/external/scrypt/lib/crypto/
H A Dcrypto_scrypt-neon.c184 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
185 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
194 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
193 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, uint8_t * buf, size_t buflen) argument
H A Dcrypto_scrypt-ref.c211 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
212 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
221 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
220 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, uint8_t * buf, size_t buflen) argument
H A Dcrypto_scrypt-sse.c257 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
258 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
267 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
342 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
266 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, uint8_t * buf, size_t buflen) argument
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/
H A Drsa_pmeth.c91 int saltlen; member in struct:__anon14036
109 rctx->saltlen = -2;
215 rctx->saltlen,
264 rctx->saltlen))
364 rctx->saltlen,
390 rctx->tbuf, rctx->saltlen);
515 *(int *)p2 = rctx->saltlen;
520 rctx->saltlen = p1;
629 int saltlen; local
630 saltlen
[all...]
/external/grub/stage2/
H A Dmd5.c212 int saltlen; local
224 saltlen = strstr (salt, "$") - salt;
230 saltlen = end - salt;
232 saltlen = 8;
234 salt[saltlen] = '$';
239 md5_update (salt, saltlen);
247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */
268 md5_update (salt, saltlen);
280 p = salt + saltlen + 1;
/external/openssl/crypto/rsa/
H A Drsa_pmeth.c91 int saltlen; member in struct:__anon24626
109 rctx->saltlen = -2;
215 rctx->saltlen,
264 rctx->saltlen))
364 rctx->saltlen,
390 rctx->tbuf, rctx->saltlen);
515 *(int *)p2 = rctx->saltlen;
520 rctx->saltlen = p1;
629 int saltlen; local
630 saltlen
[all...]

Completed in 438 milliseconds

12