/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 129 if ((countsalt = calloc(1, saltlen + 4)) == NULL) in bcrypt_pbkdf() 134 memcpy(countsalt, salt, saltlen); in bcrypt_pbkdf() 141 countsalt[saltlen + 0] = (count >> 24) & 0xff; in bcrypt_pbkdf() 142 countsalt[saltlen + 1] = (count >> 16) & 0xff; in bcrypt_pbkdf() 143 countsalt[saltlen + 2] = (count >> 8) & 0xff; in bcrypt_pbkdf() 144 countsalt[saltlen + 3] = count & 0xff; in bcrypt_pbkdf() 147 crypto_hash_sha512(sha2salt, countsalt, saltlen + 4); in bcrypt_pbkdf()
|
/external/boringssl/src/crypto/x509/ |
D | rsa_pss.c | 191 int saltlen; in x509_rsa_ctx_to_pss() local 194 !EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx->pctx, &saltlen)) { in x509_rsa_ctx_to_pss() 199 if (saltlen == -1) { in x509_rsa_ctx_to_pss() 200 saltlen = EVP_MD_size(sigmd); in x509_rsa_ctx_to_pss() 201 } else if (saltlen == -2) { in x509_rsa_ctx_to_pss() 202 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; in x509_rsa_ctx_to_pss() 204 saltlen--; in x509_rsa_ctx_to_pss() 217 if (saltlen != 20) { in x509_rsa_ctx_to_pss() 220 !ASN1_INTEGER_set(pss->saltLength, saltlen)) { in x509_rsa_ctx_to_pss() 263 int saltlen = 20; in x509_rsa_pss_to_ctx() local [all …]
|
/external/scrypt/patches/ |
D | use_openssl_pbkdf2.patch | 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
D | arm-neon.patch | 315 + * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 316 + * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 325 + const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 398 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 400 + PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/external/boringssl/src/crypto/evp/ |
D | p_rsa.c | 86 int saltlen; member 105 rctx->saltlen = -2; in pkey_rsa_init() 206 rctx->mgf1md, rctx->saltlen) || in pkey_rsa_sign() 244 rctx->tbuf, rctx->saltlen)) { in pkey_rsa_verify() 466 *(int *)p2 = rctx->saltlen; in pkey_rsa_ctrl() 471 rctx->saltlen = p1; in pkey_rsa_ctrl()
|
/external/scrypt/lib/crypto/ |
D | crypto_scrypt-neon.c | 193 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, in crypto_scrypt() argument 266 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 268 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt()
|
D | crypto_scrypt-ref.c | 221 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, in crypto_scrypt() argument 263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt()
|
D | crypto_scrypt-sse.c | 267 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, in crypto_scrypt() argument 340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 342 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt()
|