/openssl/crypto/rand/ |
H A D | prov_seed.c | 77 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument 91 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce() 103 const void *salt, size_t salt_len) in ossl_rand_get_user_nonce() argument 109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len); in ossl_rand_get_user_nonce() 114 if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) { in ossl_rand_get_user_nonce()
|
/openssl/apps/ |
H A D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 assert(salt_len <= 8); in md5crypt() 386 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 393 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 458 output = salt_out + salt_len; in md5crypt() 519 size_t passwd_len, salt_len, magic_len; in shacrypt() local 572 salt_len = strlen(ascii_salt); in shacrypt() 574 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in shacrypt() [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 55 const unsigned char *salt, size_t salt_len, 60 const unsigned char *salt, size_t salt_len, 87 size_t salt_len; member 132 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in kdf_hkdf_reset() 152 if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, in kdf_hkdf_dup() 153 &dest->salt_len) in kdf_hkdf_dup() 240 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 244 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 314 &ctx->salt_len)) in hkdf_common_set_ctx_params() 456 const unsigned char *salt, size_t salt_len, in HKDF() argument [all …]
|
H A D | pvkkdf.c | 35 size_t salt_len; member 81 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pvk_dup() 82 &dest->salt, &dest->salt_len) in kdf_pvk_dup() 172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) in kdf_pvk_derive() 196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pvk_set_ctx_params()
|
H A D | pbkdf1.c | 42 size_t salt_len; member 145 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pbkdf1_dup() 146 &dest->salt, &dest->salt_len) in kdf_pbkdf1_dup() 197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive() 215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf1_set_ctx_params()
|
H A D | pbkdf2.c | 55 size_t salt_len; member 97 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in kdf_pbkdf2_cleanup() 133 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pbkdf2_dup() 134 &dest->salt, &dest->salt_len) in kdf_pbkdf2_dup() 213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter, in fips_lower_bound_check_passed() 249 ctx->salt, ctx->salt_len, ctx->iter, in kdf_pbkdf2_derive() 296 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf2_set_ctx_params()
|
H A D | sskdf.c | 65 size_t salt_len; member 238 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument 262 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 332 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 361 || !ossl_prov_memdup(src->salt, src->salt_len, in sskdf_dup() 362 &dest->salt , &dest->salt_len) in sskdf_dup() 458 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 462 ctx->salt_len = default_salt_len; in sskdf_derive() 466 ctx->salt, ctx->salt_len, in sskdf_derive() 599 &ctx->salt, &ctx->salt_len) == 0) in sskdf_common_set_ctx_params()
|
H A D | pkcs12kdf.c | 42 size_t salt_len; member 185 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pkcs12_dup() 186 &dest->salt, &dest->salt_len) in kdf_pkcs12_dup() 238 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pkcs12_derive() 259 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pkcs12_set_ctx_params()
|
H A D | scrypt.c | 49 size_t salt_len; member 113 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_scrypt_dup() 114 &dest->salt, &dest->salt_len) in kdf_scrypt_dup() 206 ctx->salt_len, ctx->N, ctx->r, ctx->p, in kdf_scrypt_derive() 230 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params()
|
/openssl/doc/designs/ |
H A D | fast-param-find.md | 36 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) 40 p->return_size = ctx->salt_len; 41 if (p->data_size >= ctx->salt_len) 42 memcpy(p->data, ctx->salt, p->data_size >= ctx->salt_len); 195 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) 291 p->return_size = ctx->salt_len; 292 if (p->data_size >= ctx->salt_len) 293 memcpy(p->data, ctx->salt, ctx->salt_len);
|
/openssl/providers/common/ |
H A D | provider_seeding.c | 107 const void *salt, size_t salt_len) in ossl_prov_get_nonce() argument 112 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 114 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/openssl/include/crypto/ |
H A D | rand.h | 123 const void *salt, size_t salt_len); 126 const void *salt, size_t salt_len);
|
H A D | rsa.h | 26 int salt_len; member
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 27 size_t max_len, const void *salt, size_t salt_len); 30 const void *salt, size_t salt_len); 58 of length I<salt_len> and operating system specific information.
|
/openssl/crypto/rsa/ |
H A D | rsa_pss.c | 372 rsa_pss_params->salt_len = saltlen; in ossl_rsa_pss_params_30_set_saltlen() 409 return default_RSASSA_PSS_params.salt_len; in ossl_rsa_pss_params_30_saltlen() 410 return rsa_pss_params->salt_len; in ossl_rsa_pss_params_30_saltlen()
|
/openssl/providers/implementations/include/prov/ |
H A D | seeding.h | 28 const void *salt, size_t salt_len);
|
/openssl/ssl/quic/ |
H A D | quic_record_util.c | 25 const unsigned char *salt, size_t salt_len, in ossl_quic_hkdf_extract() argument 55 (unsigned char *)salt, salt_len); in ossl_quic_hkdf_extract()
|
/openssl/include/internal/ |
H A D | quic_record_util.h | 30 const unsigned char *salt, size_t salt_len,
|
/openssl/test/ |
H A D | acvp_test.c | 1410 int salt_len = tst->pss_salt_len; in rsa_siggen_test() local 1423 if (salt_len >= 0) in rsa_siggen_test() 1425 &salt_len); in rsa_siggen_test() 1456 int salt_len = tst->pss_salt_len; in rsa_sigver_test() local 1466 if (salt_len >= 0) in rsa_sigver_test() 1468 &salt_len); in rsa_sigver_test()
|
H A D | evp_test.c | 1581 size_t salt_len; member 1679 return parse_bin(value, &mdata->salt, &mdata->salt_len); in mac_test_parse() 1922 expected->salt_len); in mac_test_run_mac() 2885 size_t salt_len; member 3012 return parse_bin(value, &pdata->salt, &pdata->salt_len); in pbe_test_parse() 3041 expected->salt, expected->salt_len, in pbe_test_run() 3050 expected->salt, expected->salt_len, in pbe_test_run() 3065 expected->salt, expected->salt_len, in pbe_test_run()
|
/openssl/crypto/ |
H A D | provider_core.c | 2366 const void *salt, size_t salt_len) in rand_get_nonce() argument 2369 pout, min_len, max_len, salt, salt_len); in rand_get_nonce() 2375 const void *salt, size_t salt_len) in rand_get_user_nonce() argument 2378 pout, min_len, max_len, salt, salt_len); in rand_get_user_nonce()
|
/openssl/include/openssl/ |
H A D | core_dispatch.h | 211 size_t salt_len)) 215 size_t salt_len))
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 88 const void *salt, size_t salt_len); 91 const void *salt, size_t salt_len); 332 of length I<salt_len> and operating system specific information.
|