HomeSort by relevance Sort by last modified time
    Searched refs:salt_len (Results 1 - 19 of 19) sorted by null

  /system/keymaster/
kdf.cpp 24 const uint8_t* salt, size_t salt_len) {
48 salt_len_ = salt_len;
49 if (salt && salt_len > 0) {
50 salt_.reset(dup_buffer(salt, salt_len));
hkdf.h 40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) {
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
kdf.h 36 const uint8_t* salt, size_t salt_len);
  /external/boringssl/src/include/openssl/
hkdf.h 34 const uint8_t *salt, size_t salt_len,
pkcs8.h 79 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If
80 * |salt_len| is zero, a default salt length is used instead.
91 uint8_t *salt, size_t salt_len,
126 uint8_t *salt, size_t salt_len,
evp.h 393 const uint8_t *salt, size_t salt_len,
401 size_t salt_len, unsigned iterations,
583 int salt_len);
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 64 const uint8_t *salt, size_t salt_len, unsigned iterations,
96 if (!HMAC_Update(&hctx, salt, salt_len) ||
146 const uint8_t *salt, size_t salt_len,
149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
pbkdf_test.cc 35 const void *salt, size_t salt_len, unsigned iterations,
46 (const uint8_t *)salt, salt_len, iterations, digest,
161 const size_t salt_len = sizeof(kSalt); local
168 if (!PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
179 if (PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len,
p_rsa.c 525 int EVP_PKEY_CTX_set_rsa_pss_saltlen(EVP_PKEY_CTX *ctx, int salt_len) {
528 EVP_PKEY_CTRL_RSA_PSS_SALTLEN, salt_len, NULL);
  /external/srtp/test/
dtls_srtp_driver.c 127 unsigned int key_len, salt_len; local
174 salt_len = srtp_profile_get_master_salt_length(profile);
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/boringssl/src/crypto/hkdf/
hkdf.c 27 const uint8_t *salt, size_t salt_len,
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
hkdf_test.c 29 const size_t salt_len; member in struct:__anon7274
224 test->salt, test->salt_len, test->info, test->info_len)) {
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 27 size_t salt_len; member in struct:pkcs5_params
187 params->salt_len = hdr.length;
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
348 params->salt_len = hdr.length;
350 params->salt, params->salt_len);
395 params->salt, params->salt_len);
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
423 size_t salt_len, u8 id, unsigned int iter,
441 S_len = v * ((salt_len + v - 1) / v);
447 if (salt_len) {
    [all...]
  /external/libchrome/crypto/
signature_verifier.h 73 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments.
87 int salt_len,
signature_verifier_nss.cc 36 unsigned int salt_len,
58 salt_len);
141 int salt_len,
159 salt_len_ = salt_len;
signature_verifier_openssl.cc 77 int salt_len,
106 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len);
  /external/boringssl/src/crypto/pkcs8/
pkcs8.c 108 const uint8_t *salt, size_t salt_len,
126 Slen = v * ((salt_len + v - 1) / v);
144 *p++ = salt[i % salt_len];
223 int salt_len, iterations, ret; local
248 salt_len = pbe->salt->length;
249 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID,
255 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID,
535 int pass_len, uint8_t *salt, size_t salt_len,
544 salt, salt_len, iterations, p8inf);
555 uint8_t *salt, size_t salt_len,
    [all...]
  /system/extras/verity/
build_verity_tree.cpp 55 const unsigned char *salt, size_t salt_len,
65 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
  /external/srtp/srtp/
srtp.c 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local
385 tmp_key + base_key_len, salt_len);
428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local
434 tmp_key + base_key_len, salt_len);
    [all...]

Completed in 276 milliseconds