Home
last modified time | relevance | path

Searched refs:salt (Results 76 – 100 of 135) sorted by relevance

123456

/openssl/include/openssl/
H A Dkdf.h108 const unsigned char *salt, int saltlen);
123 const unsigned char *salt, int saltlen);
H A Ddes.h162 char *DES_fcrypt(const char *buf, const char *salt, char *ret);
164 char *DES_crypt(const char *buf, const char *salt);
H A Dx509.h.in263 ASN1_OCTET_STRING *salt; member
276 ASN1_TYPE *salt; member
284 ASN1_OCTET_STRING *salt; member
1028 const unsigned char *salt, int saltlen);
1030 const unsigned char *salt, int saltlen,
1034 const unsigned char *salt, int saltlen);
1036 const unsigned char *salt, int saltlen,
1040 unsigned char *salt, int saltlen);
1042 unsigned char *salt, int saltlen,
1045 unsigned char *salt, int saltlen,
[all …]
/openssl/providers/implementations/kdfs/
H A Dargon2.c162 uint8_t *salt; member
692 if (ctx->salt != NULL) in initial_hash()
995 if (ctx->salt != NULL) in kdf_argon2_free()
996 OPENSSL_clear_free(ctx->salt, ctx->saltlen); in kdf_argon2_free()
1041 if (ctx->salt == NULL || ctx->saltlen == 0) { in kdf_argon2_derive()
1136 if (ctx->salt != NULL) in kdf_argon2_reset()
1137 OPENSSL_clear_free(ctx->salt, ctx->saltlen); in kdf_argon2_reset()
1298 if (ctx->salt != NULL) { in kdf_argon2_ctx_set_salt()
1300 ctx->salt = NULL; in kdf_argon2_ctx_set_salt()
1323 OPENSSL_free(ctx->salt); in kdf_argon2_ctx_set_salt()
[all …]
/openssl/crypto/pkcs12/
H A Dp12_npas.c225 if (kdf->salt->type != V_ASN1_OCTET_STRING) in alg_get()
234 *psaltlen = kdf->salt->value.octet_string->length; in alg_get()
245 *psaltlen = pbe->salt->length; in alg_get()
H A Dp12_local.h12 ASN1_OCTET_STRING *salt; member
H A Dp12_asn.c43 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
/openssl/doc/man7/
H A DRSA-PSS.pod24 and minimum salt length 32 then the digest, MGF1 digest and salt length
H A DEVP_MAC-BLAKE2.pod53 =item "salt" (B<OSSL_MAC_PARAM_SALT>) <octet string>
55 Sets the salt.
H A DEVP_KDF-KB.pod42 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
73 The parameters key, salt, info, and seed correspond to KI, Label, Context, and
74 IV (respectively) in SP800-108. As in that document, salt, info, and seed are
H A DEVP_KDF-TLS13_KDF.pod32 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
66 The digest, key and salt values must be set before a key is derived otherwise
H A DEVP_KDF-SCRYPT.pod48 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
84 "password", salt "NaCl" and N = 1024, r = 8, p = 16.
/openssl/providers/implementations/include/prov/
H A Dseeding.h28 const void *salt, size_t salt_len);
/openssl/doc/designs/
H A Dfast-param-find.md36 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
42 memcpy(p->data, ctx->salt, p->data_size >= ctx->salt_len);
195 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
293 memcpy(p->data, ctx->salt, ctx->salt_len);
/openssl/ssl/quic/
H A Dquic_record_util.c25 const unsigned char *salt, size_t salt_len, in ossl_quic_hkdf_extract() argument
45 (unsigned char *)salt, salt_len); in ossl_quic_hkdf_extract()
/openssl/include/internal/
H A Dquic_record_util.h30 const unsigned char *salt, size_t salt_len,
/openssl/apps/
H A Dsrp.c166 char *salt = NULL; in srp_create_user() local
177 if ((gNid = SRP_create_verifier(user, password, &salt, in srp_create_user()
181 *srp_usersalt = salt; in srp_create_user()
186 gNid, salt, *srp_verifier); in srp_create_user()
/openssl/doc/man3/
H A DOSSL_CRMF_pbmp_new.pod36 with a new random salt of given length I<saltlen>,
48 RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long,
H A DSSL_CTX_set_tlsext_use_srtp.pod115 master key length and the salt length as defined for the protection profile in
117 client write master salt and the server write master salt in that order.
H A DEVP_PKEY_CTX_set1_pbe_pass.pod39 Just as for the function description, the strings "salt", "hexsalt",
/openssl/crypto/pem/
H A Dpvkfmt.c806 const unsigned char *salt, unsigned int saltlen, in derive_pvk_key() argument
823 (void *)salt, saltlen); in derive_pvk_key()
1020 unsigned char *salt = NULL; in i2b_PVK() local
1059 salt = p; in i2b_PVK()
1077 if (!derive_pvk_key(keybuf, sizeof(keybuf), salt, PVK_SALTLEN, in i2b_PVK()
1084 p = salt + PVK_SALTLEN + 8; in i2b_PVK()
/openssl/ssl/record/methods/
H A Dktls_meth.c226 memcpy(crypto_info->gcm128.salt, iv, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in ktls_configure_crypto()
243 memcpy(crypto_info->gcm256.salt, iv, TLS_CIPHER_AES_GCM_256_SALT_SIZE); in ktls_configure_crypto()
261 memcpy(crypto_info->ccm128.salt, iv, TLS_CIPHER_AES_CCM_128_SALT_SIZE); in ktls_configure_crypto()
/openssl/ssl/
H A Ds3_enc.c378 static const unsigned char *const salt[3] = { in ssl3_generate_master_secret() local
401 || EVP_DigestUpdate(ctx, salt[i], in ssl3_generate_master_secret()
402 strlen((const char *)salt[i])) <= 0 in ssl3_generate_master_secret()
/openssl/crypto/crmf/
H A Dcrmf_local.h210 ASN1_OCTET_STRING *salt; member
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in261 For B<pss> mode only this option specifies the salt length. Three special
262 values are supported: B<digest> sets the salt length to the digest length,
263 B<max> sets the salt length to the maximum permissible value. When verifying
264 B<auto> causes the salt length to be automatically determined based on the
305 digest and salt length are set to the values specified in the parameters.
306 The digest and MG cannot be changed and the salt length cannot be set to a

Completed in 102 milliseconds

123456