/openssl-master/apps/ |
A D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len = strlen(ascii_salt); in shacrypt() 575 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in shacrypt() [all …]
|
/openssl-master/providers/implementations/kdfs/ |
A D | hkdf.c | 49 const unsigned char *salt, size_t salt_len, 54 const unsigned char *salt, size_t salt_len, 76 size_t salt_len; member 175 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 179 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 239 &ctx->salt_len)) in hkdf_common_set_ctx_params() 354 const unsigned char *salt, size_t salt_len, in HKDF() argument 370 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 405 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument 420 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() [all …]
|
A D | sskdf.c | 63 size_t salt_len; member 214 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument 238 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 307 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 390 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 396 ctx->salt_len = default_salt_len; in sskdf_derive() 400 ctx->salt, ctx->salt_len, in sskdf_derive() 472 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
|
A D | pvkkdf.c | 33 size_t salt_len; member 152 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) in kdf_pvk_derive() 176 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pvk_set_ctx_params()
|
A D | pbkdf1.c | 41 size_t salt_len; member 170 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive() 188 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf1_set_ctx_params()
|
A D | pbkdf2.c | 58 size_t salt_len; member 163 ctx->salt, ctx->salt_len, ctx->iter, in kdf_pbkdf2_derive() 197 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf2_set_ctx_params()
|
A D | pkcs12kdf.c | 41 size_t salt_len; member 218 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pkcs12_derive() 239 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pkcs12_set_ctx_params()
|
A D | scrypt.c | 48 size_t salt_len; member 172 ctx->salt_len, ctx->N, ctx->r, ctx->p, in kdf_scrypt_derive() 196 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params()
|
/openssl-master/crypto/rand/ |
A D | prov_seed.c | 49 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument 63 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
|
/openssl-master/providers/common/ |
A D | provider_seeding.c | 65 const void *salt, size_t salt_len) in ossl_prov_get_nonce() argument 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/openssl-master/crypto/rsa/ |
A D | rsa_pss.c | 346 rsa_pss_params->salt_len = saltlen; in ossl_rsa_pss_params_30_set_saltlen() 383 return default_RSASSA_PSS_params.salt_len; in ossl_rsa_pss_params_30_saltlen() 384 return rsa_pss_params->salt_len; in ossl_rsa_pss_params_30_saltlen()
|
/openssl-master/providers/implementations/include/prov/ |
A D | seeding.h | 39 const void *salt, size_t salt_len);
|
/openssl-master/doc/internal/man3/ |
A D | ossl_rand_get_entropy.pod | 20 size_t max_len, const void *salt, size_t salt_len); 37 of length I<salt_len> and operating system specific information.
|
/openssl-master/include/crypto/ |
A D | rand.h | 118 const void *salt, size_t salt_len);
|
A D | rsa.h | 26 int salt_len; member
|
/openssl-master/test/ |
A D | acvp_test.c | 1166 int salt_len = tst->pss_salt_len; in rsa_siggen_test() local 1175 if (salt_len >= 0) in rsa_siggen_test() 1177 &salt_len); in rsa_siggen_test() 1208 int salt_len = tst->pss_salt_len; in rsa_sigver_test() local 1218 if (salt_len >= 0) in rsa_sigver_test() 1220 &salt_len); in rsa_sigver_test()
|
A D | evp_test.c | 1131 size_t salt_len; member 1222 return parse_bin(value, &mdata->salt, &mdata->salt_len); in mac_test_parse() 1435 expected->salt_len); in mac_test_run_mac() 1915 size_t salt_len; member 2042 return parse_bin(value, &pdata->salt, &pdata->salt_len); in pbe_test_parse() 2071 expected->salt, expected->salt_len, in pbe_test_run() 2080 expected->salt, expected->salt_len, in pbe_test_run() 2095 expected->salt, expected->salt_len, in pbe_test_run()
|
/openssl-master/include/openssl/ |
A D | core_dispatch.h | 196 size_t salt_len))
|
/openssl-master/doc/man7/ |
A D | provider-base.pod | 88 const void *salt, size_t salt_len); 319 of length I<salt_len> and operating system specific information.
|