/external/openssl/crypto/pkcs12/ |
p12_crpt.c | 73 int saltlen, iter, ret; local 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_mutl.c | 73 int saltlen, iter; local 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 170 if (!saltlen) saltlen = PKCS12_SALT_LEN; 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
/external/openssl/crypto/evp/ |
p5_crpt.c | 81 int saltlen, iter; local 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 115 || !HMAC_Update(&hctx, salt, saltlen) 139 h__dump (salt, saltlen); 148 const unsigned char *salt, int saltlen, int iter, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 236 int saltlen, iter, plen; local 303 saltlen = kdf->salt->value.octet_string->length; 305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
|
/external/dropbear/libtomcrypt/testprof/ |
pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local 33 /* pick a random saltlen 0..16 */ 34 saltlen = abs(rand()) % 17; 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); 73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
|
/external/openssl/crypto/rsa/ |
rsa_pmeth.c | 91 int saltlen; member in struct:__anon10094 109 rctx->saltlen = -2; 215 rctx->saltlen, 264 rctx->saltlen)) 364 rctx->saltlen, 390 rctx->tbuf, rctx->saltlen); 515 *(int *)p2 = rctx->saltlen; 520 rctx->saltlen = p1; 629 int saltlen; local 630 saltlen = atoi(value) [all...] |
rsa_ameth.c | 465 int saltlen; local 521 saltlen = ASN1_INTEGER_get(pss->saltLength); 526 if (saltlen < 0) 533 saltlen = 20; 552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0) 584 int saltlen, rv = 0; local 588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 590 if (saltlen == -1) 591 saltlen = EVP_MD_size(sigmd); 592 else if (saltlen == -2 [all...] |
/external/grub/stage2/ |
md5.c | 212 int saltlen; local 224 saltlen = strstr (salt, "$") - salt; 230 saltlen = end - salt; 232 saltlen = 8; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */ 268 md5_update (salt, saltlen); 280 p = salt + saltlen + 1;
|