Lines Matching refs:salt
13 * PKCS5.pbkdf2_hmac(pass, salt, iter, keylen, digest) => string
17 * * +salt+ - string - should be at least 8 bytes long.
27 ossl_pkcs5_pbkdf2_hmac(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen, VALUE digest)
34 StringValue(salt);
40 (unsigned char *)RSTRING_PTR(salt), RSTRING_LENINT(salt),
55 * PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, keylen) => string
59 * * +salt+ - string - should be at least 8 bytes long.
68 ossl_pkcs5_pbkdf2_hmac_sha1(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen)
74 StringValue(salt);
79 (const unsigned char *)RSTRING_PTR(salt), RSTRING_LENINT(salt), NUM2INT(iter),
122 * random salt should be generated for each stored password. According
123 * to PKCS#5, a salt should be at least 8 bytes long.
141 * salt = OpenSSL::Random.random_bytes(16)
144 * key = OpenSSL::PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, key_len)
148 * salt = OpenSSL::Random.random_bytes(16) #store this with the generated value
153 * value = OpenSSL::PKCS5.pbkdf2_hmac(pass, salt, iter, len, digest)