Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 23 of 23) sorted by relevance

/openssl/crypto/rand/
H A Dprov_seed.c77 const void *salt, size_t salt_len) in ossl_rand_get_nonce() argument
91 if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0)) in ossl_rand_get_nonce()
103 const void *salt, size_t salt_len) in ossl_rand_get_user_nonce() argument
109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len); in ossl_rand_get_user_nonce()
114 if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) { in ossl_rand_get_user_nonce()
/openssl/apps/
H A Dpasswd.c326 size_t passwd_len, salt_len, magic_len; in md5crypt() local
340 salt_len = strlen(ascii_salt); in md5crypt()
342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt()
372 assert(salt_len <= 8); in md5crypt()
386 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt()
393 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt()
458 output = salt_out + salt_len; in md5crypt()
519 size_t passwd_len, salt_len, magic_len; in shacrypt() local
572 salt_len = strlen(ascii_salt); in shacrypt()
574 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in shacrypt()
[all …]
/openssl/providers/implementations/kdfs/
H A Dhkdf.c55 const unsigned char *salt, size_t salt_len,
60 const unsigned char *salt, size_t salt_len,
87 size_t salt_len; member
132 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in kdf_hkdf_reset()
152 if (!ossl_prov_memdup(src->salt, src->salt_len, &dest->salt, in kdf_hkdf_dup()
153 &dest->salt_len) in kdf_hkdf_dup()
240 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
244 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive()
314 &ctx->salt_len)) in hkdf_common_set_ctx_params()
456 const unsigned char *salt, size_t salt_len, in HKDF() argument
[all …]
H A Dpvkkdf.c35 size_t salt_len; member
81 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pvk_dup()
82 &dest->salt, &dest->salt_len) in kdf_pvk_dup()
172 && EVP_DigestUpdate(mctx, ctx->salt, ctx->salt_len) in kdf_pvk_derive()
196 if (!pvk_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pvk_set_ctx_params()
H A Dpbkdf1.c42 size_t salt_len; member
145 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pbkdf1_dup()
146 &dest->salt, &dest->salt_len) in kdf_pbkdf1_dup()
197 return kdf_pbkdf1_do_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pbkdf1_derive()
215 if (!kdf_pbkdf1_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf1_set_ctx_params()
H A Dpbkdf2.c55 size_t salt_len; member
97 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in kdf_pbkdf2_cleanup()
133 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pbkdf2_dup()
134 &dest->salt, &dest->salt_len) in kdf_pbkdf2_dup()
213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter, in fips_lower_bound_check_passed()
249 ctx->salt, ctx->salt_len, ctx->iter, in kdf_pbkdf2_derive()
296 if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pbkdf2_set_ctx_params()
H A Dsskdf.c65 size_t salt_len; member
238 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument
262 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm()
332 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset()
361 || !ossl_prov_memdup(src->salt, src->salt_len, in sskdf_dup()
362 &dest->salt , &dest->salt_len) in sskdf_dup()
458 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive()
462 ctx->salt_len = default_salt_len; in sskdf_derive()
466 ctx->salt, ctx->salt_len, in sskdf_derive()
599 &ctx->salt, &ctx->salt_len) == 0) in sskdf_common_set_ctx_params()
H A Dpkcs12kdf.c42 size_t salt_len; member
185 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_pkcs12_dup()
186 &dest->salt, &dest->salt_len) in kdf_pkcs12_dup()
238 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, in kdf_pkcs12_derive()
259 if (!pkcs12kdf_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_pkcs12_set_ctx_params()
H A Dscrypt.c49 size_t salt_len; member
113 if (!ossl_prov_memdup(src->salt, src->salt_len, in kdf_scrypt_dup()
114 &dest->salt, &dest->salt_len) in kdf_scrypt_dup()
206 ctx->salt_len, ctx->N, ctx->r, ctx->p, in kdf_scrypt_derive()
230 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p)) in kdf_scrypt_set_ctx_params()
/openssl/doc/designs/
H A Dfast-param-find.md36 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
40 p->return_size = ctx->salt_len;
41 if (p->data_size >= ctx->salt_len)
42 memcpy(p->data, ctx->salt, p->data_size >= ctx->salt_len);
195 if (!scrypt_set_membuf(&ctx->salt, &ctx->salt_len, p))
291 p->return_size = ctx->salt_len;
292 if (p->data_size >= ctx->salt_len)
293 memcpy(p->data, ctx->salt, ctx->salt_len);
/openssl/providers/common/
H A Dprovider_seeding.c107 const void *salt, size_t salt_len) in ossl_prov_get_nonce() argument
112 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
114 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
/openssl/include/crypto/
H A Drand.h123 const void *salt, size_t salt_len);
126 const void *salt, size_t salt_len);
H A Drsa.h26 int salt_len; member
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod27 size_t max_len, const void *salt, size_t salt_len);
30 const void *salt, size_t salt_len);
58 of length I<salt_len> and operating system specific information.
/openssl/crypto/rsa/
H A Drsa_pss.c372 rsa_pss_params->salt_len = saltlen; in ossl_rsa_pss_params_30_set_saltlen()
409 return default_RSASSA_PSS_params.salt_len; in ossl_rsa_pss_params_30_saltlen()
410 return rsa_pss_params->salt_len; in ossl_rsa_pss_params_30_saltlen()
/openssl/providers/implementations/include/prov/
H A Dseeding.h28 const void *salt, size_t salt_len);
/openssl/ssl/quic/
H A Dquic_record_util.c25 const unsigned char *salt, size_t salt_len, in ossl_quic_hkdf_extract() argument
55 (unsigned char *)salt, salt_len); in ossl_quic_hkdf_extract()
/openssl/include/internal/
H A Dquic_record_util.h30 const unsigned char *salt, size_t salt_len,
/openssl/test/
H A Dacvp_test.c1410 int salt_len = tst->pss_salt_len; in rsa_siggen_test() local
1423 if (salt_len >= 0) in rsa_siggen_test()
1425 &salt_len); in rsa_siggen_test()
1456 int salt_len = tst->pss_salt_len; in rsa_sigver_test() local
1466 if (salt_len >= 0) in rsa_sigver_test()
1468 &salt_len); in rsa_sigver_test()
H A Devp_test.c1581 size_t salt_len; member
1679 return parse_bin(value, &mdata->salt, &mdata->salt_len); in mac_test_parse()
1922 expected->salt_len); in mac_test_run_mac()
2885 size_t salt_len; member
3012 return parse_bin(value, &pdata->salt, &pdata->salt_len); in pbe_test_parse()
3041 expected->salt, expected->salt_len, in pbe_test_run()
3050 expected->salt, expected->salt_len, in pbe_test_run()
3065 expected->salt, expected->salt_len, in pbe_test_run()
/openssl/crypto/
H A Dprovider_core.c2366 const void *salt, size_t salt_len) in rand_get_nonce() argument
2369 pout, min_len, max_len, salt, salt_len); in rand_get_nonce()
2375 const void *salt, size_t salt_len) in rand_get_user_nonce() argument
2378 pout, min_len, max_len, salt, salt_len); in rand_get_user_nonce()
/openssl/include/openssl/
H A Dcore_dispatch.h211 size_t salt_len))
215 size_t salt_len))
/openssl/doc/man7/
H A Dprovider-base.pod88 const void *salt, size_t salt_len);
91 const void *salt, size_t salt_len);
332 of length I<salt_len> and operating system specific information.

Completed in 68 milliseconds