/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
p5_pbe.c | 78 const unsigned char *salt, int saltlen) 97 if (!saltlen) 98 saltlen = PKCS5_SALT_LEN; 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 memcpy(sstr, salt, saltlen); 107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0) 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
p5_pbev2.c | 90 unsigned char *salt, int saltlen, 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 215 if (!saltlen) 216 saltlen = PKCS5_SALT_LEN; 217 if (!(osalt->data = OPENSSL_malloc (saltlen))) 220 osalt->length = saltlen; 223 memcpy (osalt->data, salt, saltlen); [all...] |
/external/openssl/crypto/asn1/ |
p5_pbe.c | 78 const unsigned char *salt, int saltlen) 97 if (!saltlen) 98 saltlen = PKCS5_SALT_LEN; 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 memcpy(sstr, salt, saltlen); 107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0) 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
p5_pbev2.c | 90 unsigned char *salt, int saltlen, 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 215 if (!saltlen) 216 saltlen = PKCS5_SALT_LEN; 217 if (!(osalt->data = OPENSSL_malloc (saltlen))) 220 osalt->length = saltlen; 223 memcpy (osalt->data, salt, saltlen); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_mutl.c | 73 int saltlen, iter; local 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 170 if (!saltlen) saltlen = PKCS12_SALT_LEN; 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
p12_crpt.c | 73 int saltlen, iter, ret; local 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_key.c | 78 int saltlen, int id, int iter, int n, unsigned char *out, 92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 104 int saltlen, int id, int iter, int n, unsigned char *out, 131 fprintf(stderr, "Salt (length %d):\n", saltlen); 132 h__dump(salt, saltlen); 141 Slen = v * ((saltlen+v-1)/v); 152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
pkcs12.h | 183 unsigned char *salt, int saltlen, int iter, 187 int saltlen, int iter, 192 unsigned char *salt, int saltlen, int iter, 219 int saltlen, int id, int iter, int n, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 232 int saltlen, const EVP_MD *md_type);
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 73 int saltlen, iter; local 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 170 if (!saltlen) saltlen = PKCS12_SALT_LEN; 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
p12_crpt.c | 73 int saltlen, iter, ret; local 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_key.c | 78 int saltlen, int id, int iter, int n, unsigned char *out, 92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 104 int saltlen, int id, int iter, int n, unsigned char *out, 131 fprintf(stderr, "Salt (length %d):\n", saltlen); 132 h__dump(salt, saltlen); 141 Slen = v * ((saltlen+v-1)/v); 152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_pss_encode.c | 24 @param saltlen The length of the salt desired (octets) 34 unsigned long saltlen, prng_state *prng, 60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { 87 if (saltlen > 0) { 88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */ 114 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2) [all...] |
pkcs_1_pss_decode.c | 26 @param saltlen The length of the salt used (octets) 34 unsigned long saltlen, int hash_idx, 57 if ((saltlen > modulus_len) || 58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) { 117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */ 120 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/testprof/ |
pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local 33 /* pick a random saltlen 0..16 */ 34 saltlen = abs(rand()) % 17; 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); 73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 115 || !HMAC_Update(&hctx, salt, saltlen) 139 h__dump (salt, saltlen); 148 const unsigned char *salt, int saltlen, int iter, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 236 int saltlen, iter, plen; local 303 saltlen = kdf->salt->value.octet_string->length; 305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
|
p5_crpt.c | 81 int saltlen, iter; local 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 58 unsigned long saltlen, prng_state *prng, 65 unsigned long saltlen, int hash_idx,
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 115 || !HMAC_Update(&hctx, salt, saltlen) 139 h__dump (salt, saltlen); 148 const unsigned char *salt, int saltlen, int iter, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 236 int saltlen, iter, plen; local 303 saltlen = kdf->salt->value.octet_string->length; 305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
|
p5_crpt.c | 81 int saltlen, iter; local 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
/external/grub/stage2/ |
md5.c | 212 int saltlen; local 224 saltlen = strstr (salt, "$") - salt; 230 saltlen = end - salt; 232 saltlen = 8; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */ 268 md5_update (salt, saltlen); 280 p = salt + saltlen + 1;
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_sign_hash.c | 30 @param saltlen The length of the salt desired (octets) 38 int hash_idx, unsigned long saltlen, 77 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx,
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_ameth.c | 465 int saltlen; local 521 saltlen = ASN1_INTEGER_get(pss->saltLength); 526 if (saltlen < 0) 533 saltlen = 20; 552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0) 584 int saltlen, rv = 0; local 588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 590 if (saltlen == -1) 591 saltlen = EVP_MD_size(sigmd); 592 else if (saltlen == -2 [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 465 int saltlen; local 521 saltlen = ASN1_INTEGER_get(pss->saltLength); 526 if (saltlen < 0) 533 saltlen = 20; 552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0) 584 int saltlen, rv = 0; local 588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 590 if (saltlen == -1) 591 saltlen = EVP_MD_size(sigmd); 592 else if (saltlen == -2 [all...] |