/external/openssl/crypto/pkcs12/ |
p12_crpt.c | 91 int saltlen, iter, ret; local 112 saltlen = pbe->salt->length; 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_mutl.c | 73 int saltlen, iter; local 82 saltlen = p12->mac->salt->length; 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 162 if (!saltlen) saltlen = PKCS12_SALT_LEN; 163 p12->mac->salt->length = saltlen; 164 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
/external/openssl/crypto/evp/ |
p5_crpt.c | 112 int saltlen, iter; local 132 saltlen = pbe->salt->length; 140 EVP_DigestUpdate(&ctx, salt, saltlen);
|
p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 104 HMAC_Update(&hctx, salt, saltlen); 122 h__dump (salt, saltlen); 153 int saltlen, iter, plen; local 242 saltlen = kdf->salt->value.octet_string->length; 244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
|
/external/dropbear/libtomcrypt/testprof/ |
pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local 33 /* pick a random saltlen 0..16 */ 34 saltlen = abs(rand()) % 17; 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); 73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
|
/external/grub/stage2/ |
md5.c | 212 int saltlen; local 224 saltlen = strstr (salt, "$") - salt; 230 saltlen = end - salt; 232 saltlen = 8; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */ 268 md5_update (salt, saltlen); 280 p = salt + saltlen + 1;
|
/external/openssl/apps/ |
dgst.c | 176 int saltlen; local 178 saltlen=atoi(*(++argv)); 179 if (saltlen == -1) 181 else if (saltlen == -2) 183 else if (saltlen < -2 || saltlen >= 0xFFFE) 185 BIO_printf(bio_err, "Invalid PSS salt length %d\n", saltlen); 189 sig_flags = saltlen;
|