Searched refs:salt_len (Results 1 - 18 of 18) sorted by relevance

/external/boringssl/include/openssl/
H A Dhkdf.h34 const uint8_t *salt, size_t salt_len,
H A Dpkcs8.h77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If
78 * |salt_len| is zero, a default salt length is used instead.
88 uint8_t *salt, size_t salt_len,
113 uint8_t *salt, size_t salt_len,
H A Devp.h401 const uint8_t *salt, size_t salt_len,
409 size_t salt_len, unsigned iterations,
591 int salt_len);
/external/boringssl/src/include/openssl/
H A Dhkdf.h34 const uint8_t *salt, size_t salt_len,
H A Dpkcs8.h77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If
78 * |salt_len| is zero, a default salt length is used instead.
88 uint8_t *salt, size_t salt_len,
113 uint8_t *salt, size_t salt_len,
H A Devp.h401 const uint8_t *salt, size_t salt_len,
409 size_t salt_len, unsigned iterations,
591 int salt_len);
/external/boringssl/src/crypto/evp/
H A Dpbkdf.c64 const uint8_t *salt, size_t salt_len, unsigned iterations,
96 if (!HMAC_Update(&hctx, salt, salt_len) ||
130 const uint8_t *salt, size_t salt_len,
133 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
63 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument
129 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument
H A Dpbkdf_test.cc35 const void *salt, size_t salt_len, unsigned iterations,
46 (const uint8_t *)salt, salt_len, iterations, digest,
34 TestPBKDF2(const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, const uint8_t *expected_key) argument
H A Dp_rsa.c532 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) { argument
535 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
/external/srtp/test/
H A Ddtls_srtp_driver.c127 unsigned int key_len, salt_len; local
174 salt_len = srtp_profile_get_master_salt_length(profile);
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c27 const uint8_t *salt, size_t salt_len,
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
24 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
H A Dhkdf_test.c29 const size_t salt_len; member in struct:__anon443
224 test->salt, test->salt_len, test->info, test->info_len)) {
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs5.c24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
/external/wpa_supplicant_8/src/tls/
H A Dpkcs5.c24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs5.c24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
/external/boringssl/src/crypto/pkcs8/
H A Dpkcs8.c107 const uint8_t *salt, size_t salt_len,
125 Slen = v * ((salt_len + v - 1) / v);
143 *p++ = salt[i % salt_len];
222 int salt_len, iterations, ret; local
247 salt_len = pbe->salt->length;
248 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID,
254 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID,
490 int pass_len, uint8_t *salt, size_t salt_len,
507 salt, salt_len, iterations, p8inf);
518 uint8_t *salt, size_t salt_len,
106 pkcs12_key_gen_raw(const uint8_t *pass_raw, size_t pass_raw_len, const uint8_t *salt, size_t salt_len, int id, int iterations, size_t out_len, uint8_t *out, const EVP_MD *md_type) argument
489 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int pass_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument
516 PKCS8_encrypt_pbe(int pbe_nid, const uint8_t *pass_raw, size_t pass_raw_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument
[all...]
/external/srtp/srtp/
H A Dsrtp.c379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local
385 tmp_key + base_key_len, salt_len);
428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local
434 tmp_key + base_key_len, salt_len);
/external/openssh/
H A Dhostfile.c73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument
104 ret = __b64_pton(b64salt, salt, salt_len);

Completed in 261 milliseconds