Searched refs:salt (Results 1 - 10 of 10) sorted by relevance

/fuchsia/zircon/third_party/ulib/musl/src/crypt/
H A Dcrypt_r.c12 char* __crypt_r(const char* key, const char* salt, struct crypt_data* data) { argument
18 if (salt[0] == '$' && salt[1] && salt[2]) {
19 if (salt[1] == '1' && salt[2] == '$')
20 return __crypt_md5(key, salt, output);
21 if (salt[1] == '2' && salt[3] == '$')
22 return __crypt_blowfish(key, salt, outpu
[all...]
H A Dcrypt.c6 char* crypt(const char* key, const char* salt) { argument
14 return __crypt_r(key, salt, (struct crypt_data*)buf);
/fuchsia/zircon/system/utest/crypto/
H A Dhkdf.cpp27 Bytes salt; local
29 ASSERT_OK(salt.Randomize(GUID_LEN));
33 EXPECT_ZX(hkdf.Init(digest::kUninitialized, ikm, salt), ZX_ERR_INVALID_ARGS);
37 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt), ZX_ERR_INVALID_ARGS);
41 ASSERT_OK(salt.Resize(0));
42 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
43 ASSERT_OK(salt.Randomize(GUID_LEN));
46 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt, 0x8000), ZX_ERR_INVALID_ARGS);
49 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
60 Bytes salt; local
90 Bytes salt; local
115 Bytes salt; local
149 Bytes salt; local
[all...]
/fuchsia/zircon/third_party/ulib/uboringssl/include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
37 const uint8_t *salt, size_t salt_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
46 size_t secret_len, const uint8_t *salt,
H A Devp.h417 // and |salt|, using |digest|, and outputs |key_len| bytes to |out_key|. It
420 const uint8_t *salt, size_t salt_len,
428 const uint8_t *salt, size_t salt_len,
441 const uint8_t *salt, size_t salt_len,
646 // EVP_PKEY_CTX_set_rsa_pss_saltlen sets the length of the salt in a PSS-padded
647 // signature. A value of -1 cause the salt to be the same length as the digest
648 // in the signature. A value of -2 causes the salt to be the maximum length
650 // Otherwise the value gives the size of the salt in bytes.
658 // EVP_PKEY_CTX_get_rsa_pss_saltlen sets |*out_salt_len| to the salt length of
H A Dcipher.h329 // |md| |count| times using |data| and |salt|. On entry, the |key| and |iv|
333 const uint8_t *salt, const uint8_t *data,
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/hkdf/
H A Dhkdf.c27 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt,
43 const uint8_t *secret, size_t secret_len, const uint8_t *salt,
47 // If salt is not given, HashLength zeros are used. However, HMAC does that
50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) {
26 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
42 HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len) argument
/fuchsia/zircon/system/ulib/crypto/
H A Dhkdf.cpp33 zx_status_t HKDF::Init(digest::Algorithm digest, const Secret& key, const Bytes& salt, argument
63 if (HKDF_extract(prk, &prk_len, md, key.get(), key.len(), salt.get(), salt.len()) < 0) {
/fuchsia/zircon/system/ulib/crypto/include/crypto/
H A Dhkdf.h34 // and the given |salt|. Callers must omit |flags| unless the security implications are clearly
36 zx_status_t Init(digest::Algorithm digest, const Secret& ikm, const Bytes& salt,
40 // |ikm| and |salt| given in |Init|, as well as the |label| provided here. |out_key| will be
/fuchsia/zircon/third_party/tools/android/avb/
H A Davbtool1204 salt: Salt used.
1224 'L' # salt length (bytes)
1261 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)]
1280 self.salt = bytearray()
1304 o.write(' Salt: {}\n'.format(str(self.salt).encode(
1317 num_bytes_following = (self.SIZE + len(encoded_name) + len(self.salt) +
1326 len(encoded_name), len(self.salt), len(self.root_digest),
1329 ret = desc + encoded_name + self.salt + self.root_digest + padding
1358 self.hash_algorithm, self.salt,
1393 salt
[all...]

Completed in 166 milliseconds