/external/boringssl/include/openssl/ |
H A D | hkdf.h | 34 const uint8_t *salt, size_t salt_len,
|
H A D | pkcs8.h | 77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If 78 * |salt_len| is zero, a default salt length is used instead. 88 uint8_t *salt, size_t salt_len, 113 uint8_t *salt, size_t salt_len,
|
H A D | evp.h | 401 const uint8_t *salt, size_t salt_len, 409 size_t salt_len, unsigned iterations, 591 int salt_len);
|
/external/boringssl/src/include/openssl/ |
H A D | hkdf.h | 34 const uint8_t *salt, size_t salt_len,
|
H A D | pkcs8.h | 77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If 78 * |salt_len| is zero, a default salt length is used instead. 88 uint8_t *salt, size_t salt_len, 113 uint8_t *salt, size_t salt_len,
|
H A D | evp.h | 401 const uint8_t *salt, size_t salt_len, 409 size_t salt_len, unsigned iterations, 591 int salt_len);
|
/external/boringssl/src/crypto/evp/ |
H A D | pbkdf.c | 64 const uint8_t *salt, size_t salt_len, unsigned iterations, 96 if (!HMAC_Update(&hctx, salt, salt_len) || 130 const uint8_t *salt, size_t salt_len, 133 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, 63 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument 129 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument
|
H A D | pbkdf_test.cc | 35 const void *salt, size_t salt_len, unsigned iterations, 46 (const uint8_t *)salt, salt_len, iterations, digest, 34 TestPBKDF2(const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, const uint8_t *expected_key) argument
|
H A D | p_rsa.c | 532 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) { argument 535 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
|
/external/srtp/test/ |
H A D | dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 174 salt_len = srtp_profile_get_master_salt_length(profile); 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 27 const uint8_t *salt, size_t salt_len, 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { 24 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
|
H A D | hkdf_test.c | 29 const size_t salt_len; member in struct:__anon443 224 test->salt, test->salt_len, test->info, test->info_len)) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 107 const uint8_t *salt, size_t salt_len, 125 Slen = v * ((salt_len + v - 1) / v); 143 *p++ = salt[i % salt_len]; 222 int salt_len, iterations, ret; local 247 salt_len = pbe->salt->length; 248 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID, 254 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID, 490 int pass_len, uint8_t *salt, size_t salt_len, 507 salt, salt_len, iterations, p8inf); 518 uint8_t *salt, size_t salt_len, 106 pkcs12_key_gen_raw(const uint8_t *pass_raw, size_t pass_raw_len, const uint8_t *salt, size_t salt_len, int id, int iterations, size_t out_len, uint8_t *out, const EVP_MD *md_type) argument 489 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int pass_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument 516 PKCS8_encrypt_pbe(int pbe_nid, const uint8_t *pass_raw, size_t pass_raw_len, uint8_t *salt, size_t salt_len, int iterations, PKCS8_PRIV_KEY_INFO *p8inf) argument [all...] |
/external/srtp/srtp/ |
H A D | srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local 385 tmp_key + base_key_len, salt_len); 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local 434 tmp_key + base_key_len, salt_len);
|
/external/openssh/ |
H A D | hostfile.c | 73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument 104 ret = __b64_pton(b64salt, salt, salt_len);
|