/fuchsia/zircon/third_party/ulib/musl/src/crypt/ |
H A D | crypt_r.c | 12 char* __crypt_r(const char* key, const char* salt, struct crypt_data* data) { argument 18 if (salt[0] == '$' && salt[1] && salt[2]) { 19 if (salt[1] == '1' && salt[2] == '$') 20 return __crypt_md5(key, salt, output); 21 if (salt[1] == '2' && salt[3] == '$') 22 return __crypt_blowfish(key, salt, outpu [all...] |
H A D | crypt.c | 6 char* crypt(const char* key, const char* salt) { argument 14 return __crypt_r(key, salt, (struct crypt_data*)buf);
|
/fuchsia/zircon/system/utest/crypto/ |
H A D | hkdf.cpp | 27 Bytes salt; local 29 ASSERT_OK(salt.Randomize(GUID_LEN)); 33 EXPECT_ZX(hkdf.Init(digest::kUninitialized, ikm, salt), ZX_ERR_INVALID_ARGS); 37 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt), ZX_ERR_INVALID_ARGS); 41 ASSERT_OK(salt.Resize(0)); 42 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt)); 43 ASSERT_OK(salt.Randomize(GUID_LEN)); 46 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt, 0x8000), ZX_ERR_INVALID_ARGS); 49 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt)); 60 Bytes salt; local 90 Bytes salt; local 115 Bytes salt; local 149 Bytes salt; local [all...] |
/fuchsia/zircon/third_party/ulib/uboringssl/include/openssl/ |
H A D | hkdf.h | 29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes 37 const uint8_t *salt, size_t salt_len, 41 // keying material |secret| and salt |salt| using |digest|, and outputs 46 size_t secret_len, const uint8_t *salt,
|
H A D | evp.h | 417 // and |salt|, using |digest|, and outputs |key_len| bytes to |out_key|. It 420 const uint8_t *salt, size_t salt_len, 428 const uint8_t *salt, size_t salt_len, 441 const uint8_t *salt, size_t salt_len, 646 // EVP_PKEY_CTX_set_rsa_pss_saltlen sets the length of the salt in a PSS-padded 647 // signature. A value of -1 cause the salt to be the same length as the digest 648 // in the signature. A value of -2 causes the salt to be the maximum length 650 // Otherwise the value gives the size of the salt in bytes. 658 // EVP_PKEY_CTX_get_rsa_pss_saltlen sets |*out_salt_len| to the salt length of
|
H A D | cipher.h | 329 // |md| |count| times using |data| and |salt|. On entry, the |key| and |iv| 333 const uint8_t *salt, const uint8_t *data,
|
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/hkdf/ |
H A D | hkdf.c | 27 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, 43 const uint8_t *secret, size_t secret_len, const uint8_t *salt, 47 // If salt is not given, HashLength zeros are used. However, HMAC does that 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { 26 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument 42 HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len) argument
|
/fuchsia/zircon/system/ulib/crypto/ |
H A D | hkdf.cpp | 33 zx_status_t HKDF::Init(digest::Algorithm digest, const Secret& key, const Bytes& salt, argument 63 if (HKDF_extract(prk, &prk_len, md, key.get(), key.len(), salt.get(), salt.len()) < 0) {
|
/fuchsia/zircon/system/ulib/crypto/include/crypto/ |
H A D | hkdf.h | 34 // and the given |salt|. Callers must omit |flags| unless the security implications are clearly 36 zx_status_t Init(digest::Algorithm digest, const Secret& ikm, const Bytes& salt, 40 // |ikm| and |salt| given in |Init|, as well as the |label| provided here. |out_key| will be
|
/fuchsia/zircon/third_party/tools/android/avb/ |
H A D | avbtool | 1204 salt: Salt used. 1224 'L' # salt length (bytes) 1261 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)] 1280 self.salt = bytearray() 1304 o.write(' Salt: {}\n'.format(str(self.salt).encode( 1317 num_bytes_following = (self.SIZE + len(encoded_name) + len(self.salt) + 1326 len(encoded_name), len(self.salt), len(self.root_digest), 1329 ret = desc + encoded_name + self.salt + self.root_digest + padding 1358 self.hash_algorithm, self.salt, 1393 salt [all...] |