HomeSort by relevance Sort by last modified time
    Searched refs:salt_len (Results 1 - 14 of 14) sorted by null

  /external/chromium_org/third_party/boringssl/src/crypto/evp/
pbkdf.c 62 const uint8_t *salt, size_t salt_len, unsigned iterations,
101 if (!HMAC_Update(&hctx, salt, salt_len) ||
135 const uint8_t *salt, size_t salt_len,
138 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
p_rsa.c 536 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) {
539 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
  /external/chromium_org/third_party/libsrtp/srtp/test/
dtls_srtp_driver.c 134 unsigned int key_len, salt_len; local
181 salt_len = srtp_profile_get_master_salt_length(profile);
183 memset(salt, 0xee, salt_len);
184 append_salt_to_key(key, key_len, salt, salt_len);
  /external/srtp/test/
dtls_srtp_driver.c 127 unsigned int key_len, salt_len; local
174 salt_len = srtp_profile_get_master_salt_length(profile);
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/chromium_org/third_party/boringssl/src/include/openssl/
pkcs8.h 79 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If
80 * |salt_len| is zero, a default salt length is used instead.
90 uint8_t *salt, size_t salt_len,
115 uint8_t *salt, size_t salt_len,
evp.h 375 const uint8_t *salt, size_t salt_len,
383 size_t salt_len, unsigned iterations,
614 int salt_len);
    [all...]
  /external/chromium_org/crypto/
signature_verifier.h 72 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments.
86 int salt_len,
signature_verifier_nss.cc 35 unsigned int salt_len,
57 salt_len);
140 int salt_len,
158 salt_len_ = salt_len;
signature_verifier_openssl.cc 77 int salt_len,
106 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len);
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
  /external/openssl/apps/
passwd.c 318 size_t passwd_len, salt_len; local
329 salt_len = strlen(salt_out);
330 assert(salt_len <= 8);
338 EVP_DigestUpdate(&md, salt_out, salt_len);
343 EVP_DigestUpdate(&md2, salt_out, salt_len);
365 EVP_DigestUpdate(&md2, salt_out, salt_len);
390 output = salt_out + salt_len;
  /external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
pkcs8.c 106 const uint8_t *salt, size_t salt_len,
124 Slen = v * ((salt_len + v - 1) / v);
139 *p++ = salt[i % salt_len];
214 int salt_len, iterations, ret; local
239 salt_len = pbe->salt->length;
240 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID,
246 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID,
482 int pass_len, uint8_t *salt, size_t salt_len,
499 salt, salt_len, iterations, p8inf);
510 uint8_t *salt, size_t salt_len,
    [all...]
  /system/extras/verity/
build_verity_tree.cpp 51 const unsigned char *salt, size_t salt_len,
61 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
  /external/srtp/srtp/
srtp.c 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local
385 tmp_key + base_key_len, salt_len);
428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local
434 tmp_key + base_key_len, salt_len);
    [all...]

Completed in 173 milliseconds