/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
pbkdf.c | 62 const uint8_t *salt, size_t salt_len, unsigned iterations, 101 if (!HMAC_Update(&hctx, salt, salt_len) || 135 const uint8_t *salt, size_t salt_len, 138 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
p_rsa.c | 536 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) { 539 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
|
/external/chromium_org/third_party/libsrtp/srtp/test/ |
dtls_srtp_driver.c | 134 unsigned int key_len, salt_len; local 181 salt_len = srtp_profile_get_master_salt_length(profile); 183 memset(salt, 0xee, salt_len); 184 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 174 salt_len = srtp_profile_get_master_salt_length(profile); 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
pkcs8.h | 79 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If 80 * |salt_len| is zero, a default salt length is used instead. 90 uint8_t *salt, size_t salt_len, 115 uint8_t *salt, size_t salt_len,
|
evp.h | 375 const uint8_t *salt, size_t salt_len, 383 size_t salt_len, unsigned iterations, 614 int salt_len); [all...] |
/external/chromium_org/crypto/ |
signature_verifier.h | 72 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments. 86 int salt_len,
|
signature_verifier_nss.cc | 35 unsigned int salt_len, 57 salt_len); 140 int salt_len, 158 salt_len_ = salt_len;
|
signature_verifier_openssl.cc | 77 int salt_len, 106 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len);
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/external/openssl/apps/ |
passwd.c | 318 size_t passwd_len, salt_len; local 329 salt_len = strlen(salt_out); 330 assert(salt_len <= 8); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 343 EVP_DigestUpdate(&md2, salt_out, salt_len); 365 EVP_DigestUpdate(&md2, salt_out, salt_len); 390 output = salt_out + salt_len;
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 106 const uint8_t *salt, size_t salt_len, 124 Slen = v * ((salt_len + v - 1) / v); 139 *p++ = salt[i % salt_len]; 214 int salt_len, iterations, ret; local 239 salt_len = pbe->salt->length; 240 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID, 246 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID, 482 int pass_len, uint8_t *salt, size_t salt_len, 499 salt, salt_len, iterations, p8inf); 510 uint8_t *salt, size_t salt_len, [all...] |
/system/extras/verity/ |
build_verity_tree.cpp | 51 const unsigned char *salt, size_t salt_len, 61 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
|
/external/srtp/srtp/ |
srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local 385 tmp_key + base_key_len, salt_len); 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local 434 tmp_key + base_key_len, salt_len); [all...] |