/system/keymaster/ |
kdf.cpp | 24 const uint8_t* salt, size_t salt_len) { 48 salt_len_ = salt_len; 49 if (salt && salt_len > 0) { 50 salt_.reset(dup_buffer(salt, salt_len));
|
hkdf.h | 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) { 41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
|
kdf.h | 36 const uint8_t* salt, size_t salt_len);
|
/external/boringssl/src/include/openssl/ |
hkdf.h | 34 const uint8_t *salt, size_t salt_len,
|
pkcs8.h | 79 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If 80 * |salt_len| is zero, a default salt length is used instead. 91 uint8_t *salt, size_t salt_len, 126 uint8_t *salt, size_t salt_len,
|
evp.h | 393 const uint8_t *salt, size_t salt_len, 401 size_t salt_len, unsigned iterations, 583 int salt_len); [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 64 const uint8_t *salt, size_t salt_len, unsigned iterations, 96 if (!HMAC_Update(&hctx, salt, salt_len) || 146 const uint8_t *salt, size_t salt_len, 149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
pbkdf_test.cc | 35 const void *salt, size_t salt_len, unsigned iterations, 46 (const uint8_t *)salt, salt_len, iterations, digest, 161 const size_t salt_len = sizeof(kSalt); local 168 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, 179 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
|
p_rsa.c | 525 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) { 528 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 174 salt_len = srtp_profile_get_master_salt_length(profile); 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 27 const uint8_t *salt, size_t salt_len, 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
|
hkdf_test.c | 29 const size_t salt_len; member in struct:__anon7274 224 test->salt, test->salt_len, test->info, test->info_len)) {
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 27 size_t salt_len; member in struct:pkcs5_params 187 params->salt_len = hdr.length; 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); 348 params->salt_len = hdr.length; 350 params->salt, params->salt_len); 395 params->salt, params->salt_len); 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, 423 size_t salt_len, u8 id, unsigned int iter, 441 S_len = v * ((salt_len + v - 1) / v); 447 if (salt_len) { [all...] |
/external/libchrome/crypto/ |
signature_verifier.h | 73 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments. 87 int salt_len,
|
signature_verifier_nss.cc | 36 unsigned int salt_len, 58 salt_len); 141 int salt_len, 159 salt_len_ = salt_len;
|
signature_verifier_openssl.cc | 77 int salt_len, 106 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len);
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 108 const uint8_t *salt, size_t salt_len, 126 Slen = v * ((salt_len + v - 1) / v); 144 *p++ = salt[i % salt_len]; 223 int salt_len, iterations, ret; local 248 salt_len = pbe->salt->length; 249 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID, 255 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID, 535 int pass_len, uint8_t *salt, size_t salt_len, 544 salt, salt_len, iterations, p8inf); 555 uint8_t *salt, size_t salt_len, [all...] |
/system/extras/verity/ |
build_verity_tree.cpp | 55 const unsigned char *salt, size_t salt_len, 65 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
|
/external/srtp/srtp/ |
srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local 385 tmp_key + base_key_len, salt_len); 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local 434 tmp_key + base_key_len, salt_len); [all...] |