/external/openssl/crypto/pkcs12/ |
p12_crpt.c | 73 int saltlen, iter, ret; local 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_mutl.c | 73 int saltlen, iter; local 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 170 if (!saltlen) saltlen = PKCS12_SALT_LEN; 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
/external/openssl/crypto/evp/ |
p5_crpt.c | 81 int saltlen, iter; local 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 124 if (!HMAC_Update(&hctx, salt, saltlen) 161 h__dump (salt, saltlen); 170 const unsigned char *salt, int saltlen, int iter, 173 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 258 int saltlen, iter, plen; local 325 saltlen = kdf->salt->value.octet_string->length; 327 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
|
/external/openssl/crypto/rsa/ |
rsa_pmeth.c | 91 int saltlen; member in struct:__anon7900 109 rctx->saltlen = -2; 215 rctx->saltlen, 264 rctx->saltlen)) 364 rctx->saltlen, 390 rctx->tbuf, rctx->saltlen); 515 *(int *)p2 = rctx->saltlen; 520 rctx->saltlen = p1; 631 int saltlen; local 632 saltlen = atoi(value) [all...] |
rsa_ameth.c | 465 int saltlen; local 521 saltlen = ASN1_INTEGER_get(pss->saltLength); 526 if (saltlen < 0) 533 saltlen = 20; 552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0) 584 int saltlen, rv = 0; local 588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 590 if (saltlen == -1) 591 saltlen = EVP_MD_size(sigmd); 592 else if (saltlen == -2 [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa.c | 81 int saltlen; member in struct:__anon16256 100 rctx->saltlen = -2; 209 rctx->mgf1md, rctx->saltlen) || 242 rctx->tbuf, rctx->saltlen)) { 390 *(int *)p2 = rctx->saltlen; 395 rctx->saltlen = p1;
|
p_rsa_asn1.c | 533 int saltlen, rv = 0; local 537 !EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) { 541 if (saltlen == -1) { 542 saltlen = EVP_MD_size(sigmd); 543 } else if (saltlen == -2) { 544 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 546 saltlen--; 557 if (saltlen != 20) { 560 !ASN1_INTEGER_set(pss->saltLength, saltlen)) { 592 int saltlen; local [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 708 const unsigned char *salt, unsigned int saltlen, 715 || !EVP_DigestUpdate(&mctx, salt, saltlen) 726 unsigned int saltlen, unsigned int keylen, 735 if (saltlen) 755 if (!derive_pvk_key(keybuf, p, saltlen, 758 p += saltlen; 804 if (enctmp && saltlen) 816 unsigned int saltlen, keylen; local 824 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 826 buflen = (int) keylen + saltlen; [all...] |