/dports/www/chromium-legacy/chromium-88.0.4324.182/components/webcrypto/algorithms/ |
H A D | ecdh_unittest.cc | 153 blink::WebCryptoKey derived_key; in TEST_F() local 168 blink::WebCryptoKey derived_key; in TEST_F() local 183 blink::WebCryptoKey derived_key; in TEST_F() local 191 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F() 200 blink::WebCryptoKey derived_key; in TEST_F() local 208 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F() 212 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F() 230 blink::WebCryptoKey derived_key; in TEST_F() local 242 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F() 266 blink::WebCryptoKey derived_key; in TEST_F() local [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/webcrypto/algorithms/ |
H A D | ecdh_unittest.cc | 153 blink::WebCryptoKey derived_key; in TEST_F() local 168 blink::WebCryptoKey derived_key; in TEST_F() local 183 blink::WebCryptoKey derived_key; in TEST_F() local 191 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F() 200 blink::WebCryptoKey derived_key; in TEST_F() local 208 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F() 212 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F() 230 blink::WebCryptoKey derived_key; in TEST_F() local 242 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F() 266 blink::WebCryptoKey derived_key; in TEST_F() local [all …]
|
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/ |
H A D | ec.h | 520 CK_BYTE derived_key[512]; member 555 … .derived_key = {0x70,0x39,0xA4,0x26,0x35,0xF2,0xDB,0xE5,0xE6,0x9E,0xB0,0xF1,0xC7,0xD0,0x56,0xD6, 583 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58, 607 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58, 635 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58, 669 … .derived_key = {0xE5,0xCA,0xFD,0x5E,0x16,0x08,0x67,0xCF,0x60,0x3F,0x46,0x0F,0xFC,0x53,0x36,0x08, 716 … .derived_key = {0xA6,0x39,0x99,0x84,0xAD,0xC3,0xAA,0x63,0x6C,0xE1,0x43,0x78,0x32,0x9C,0xAF,0x8D, 757 … .derived_key = {0xA6,0x39,0x99,0x84,0xAD,0xC3,0xAA,0x63,0x6C,0xE1,0x43,0x78,0x32,0x9C,0xAF,0x8D, 894 … .derived_key = {0x01,0x11,0xC7,0xD3,0xAC,0x19,0x45,0x20,0x8C,0x55,0xCB,0xCB,0x95,0x2E,0xFF,0x02, 948 … .derived_key = {0xAC,0xEA,0x1C,0xE5,0xF2,0x3C,0x62,0xC9,0x68,0xF5,0x77,0x8B,0x94,0x67,0x2C,0xD8, [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/keys/encrypted-keys/ |
H A D | encrypted.c | 372 derived_key); in get_derived_key() 491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local 500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append() 531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() 544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify() 702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt() 708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt() 930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read() 946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read() [all …]
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/keys/encrypted-keys/ |
H A D | encrypted.c | 372 derived_key); in get_derived_key() 491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local 500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append() 531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() 544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify() 702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt() 708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt() 930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read() 946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read() [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/keys/encrypted-keys/ |
H A D | encrypted.c | 372 derived_key); in get_derived_key() 491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local 500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append() 531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() 544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify() 702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt() 708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt() 930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read() 946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read() [all …]
|
/dports/security/hashcat/hashcat-6.2.5/tools/test_modules/ |
H A D | m15900.pm | 163 my $derived_key; 171 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 32, \&hmac_sha1); 175 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 48, \&hmac_sha512); 186 $key = substr ($derived_key, 0, 24); 187 $iv = substr ($derived_key, 24, 8); 251 $key = substr ($derived_key, 0, 32); 252 $iv = substr ($derived_key, 32, 16); 284 $key = substr ($derived_key, 0, 24); 285 $iv = substr ($derived_key, 24, 8); 337 $key = substr ($derived_key, 0, 32); [all …]
|
H A D | m15300.pm | 161 my $derived_key; 169 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 32, \&hmac_sha1); 173 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 48, \&hmac_sha512); 184 $key = substr ($derived_key, 0, 24); 185 $iv = substr ($derived_key, 24, 8); 249 $key = substr ($derived_key, 0, 32); 250 $iv = substr ($derived_key, 32, 16); 282 $key = substr ($derived_key, 0, 24); 283 $iv = substr ($derived_key, 24, 8); 335 $key = substr ($derived_key, 0, 32); [all …]
|
/dports/security/aws-c-auth/aws-c-auth-0.6.5/tests/ |
H A D | key_derivation_tests.c | 274 …struct aws_ecc_key_pair *derived_key = aws_ecc_key_pair_new_ecdsa_p256_key_from_aws_credentials(al… in s_credentials_derive_ecc_key_fixed() local 275 ASSERT_TRUE(derived_key != NULL); in s_credentials_derive_ecc_key_fixed() 277 ASSERT_SUCCESS(s_verify_fixed_ecc_key_public(derived_key, allocator)); in s_credentials_derive_ecc_key_fixed() 278 ASSERT_SUCCESS(s_verify_fixed_ecc_key_private(derived_key, allocator)); in s_credentials_derive_ecc_key_fixed() 280 aws_ecc_key_pair_release(derived_key); in s_credentials_derive_ecc_key_fixed() 305 struct aws_ecc_key_pair *derived_key = aws_credentials_get_ecc_key_pair(derived_credentials); in s_credentials_new_ecc_fixed() local 307 ASSERT_SUCCESS(s_verify_fixed_ecc_key_public(derived_key, allocator)); in s_credentials_new_ecc_fixed() 308 ASSERT_SUCCESS(s_verify_fixed_ecc_key_private(derived_key, allocator)); in s_credentials_new_ecc_fixed() 341 …struct aws_ecc_key_pair *derived_key = aws_ecc_key_pair_new_ecdsa_p256_key_from_aws_credentials(al… in s_credentials_derive_ecc_key_long_access_key() local 342 ASSERT_TRUE(derived_key != NULL); in s_credentials_derive_ecc_key_long_access_key() [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/securemessage/src/cpp/src/securemessage/ |
H A D | crypto_ops.cc | 122 unique_ptr<CryptoOps::SecretKey> derived_key = in DeriveAes256KeyFor() local 125 return derived_key; in DeriveAes256KeyFor() 164 unique_ptr<SecretKey> derived_key = in Decrypt() local 166 plaintext = Aes256CBCDecrypt(*derived_key, ByteBuffer(iv), in Decrypt() 201 unique_ptr<SecretKey> derived_key = in Encrypt() local 294 unique_ptr<SecretKey> derived_key = DeriveAes256KeyFor( in Sign() local 297 if (derived_key == nullptr) { in Sign() 301 signature = Sha256hmac(derived_key->data(), ByteBuffer(data)); in Sign() 363 unique_ptr<SecretKey> derived_key = DeriveAes256KeyFor( in Verify() local 366 if (derived_key == nullptr) { in Verify() [all …]
|
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/storage/innobase/xtrabackup/src/ |
H A D | keyring_plugins.cc | 479 byte derived_key[ENCRYPTION_KEY_LEN]; in xb_tablespace_keys_load_one() local 543 salt, sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_load_one() 560 derived_key, in xb_tablespace_keys_load_one() 561 sizeof(derived_key), in xb_tablespace_keys_load_one() 576 derived_key, in xb_tablespace_keys_load_one() 577 sizeof(derived_key), in xb_tablespace_keys_load_one() 649 derived_key, in xb_tablespace_keys_write_single() 664 derived_key, in xb_tablespace_keys_write_single() 699 byte derived_key[ENCRYPTION_KEY_LEN]; in xb_tablespace_keys_dump() local 722 salt, sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_dump() [all …]
|
/dports/security/py-stem/stem-1.8.0/stem/client/ |
H A D | datatype.py | 716 derived_key = b'' 719 while len(derived_key) < KEY_LEN * 2 + HASH_LEN * 3: 720 derived_key += hashlib.sha1(key_material + Size.CHAR.pack(counter)).digest() 723 key_hash, derived_key = split(derived_key, HASH_LEN) 724 forward_digest, derived_key = split(derived_key, HASH_LEN) 725 backward_digest, derived_key = split(derived_key, HASH_LEN) 726 forward_key, derived_key = split(derived_key, KEY_LEN) 727 backward_key, derived_key = split(derived_key, KEY_LEN)
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/crypto/ |
H A D | keysetup_v1.c | 49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument 76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes() 268 u8 *derived_key; in setup_v1_file_key_derived() local 275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 276 if (!derived_key) in setup_v1_file_key_derived() 280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived() 286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
|
/dports/multimedia/libv4l/linux-5.13-rc2/fs/crypto/ |
H A D | keysetup_v1.c | 49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument 76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes() 268 u8 *derived_key; in setup_v1_file_key_derived() local 275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 276 if (!derived_key) in setup_v1_file_key_derived() 280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived() 286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/fs/crypto/ |
H A D | keysetup_v1.c | 49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument 76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes() 268 u8 *derived_key; in setup_v1_file_key_derived() local 275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 276 if (!derived_key) in setup_v1_file_key_derived() 280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived() 286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/softoken/ |
H A D | kbkdf.c | 365 kbkdf_GetDerivedKeySize(CK_DERIVED_KEY_PTR derived_key) in kbkdf_GetDerivedKeySize() argument 374 CK_ATTRIBUTE_PTR template = derived_key->pTemplate + offset; in kbkdf_GetDerivedKeySize() 613 PR_ASSERT(derived_key != NULL); in kbkdf_CreateKey() 614 PR_ASSERT(derived_key->phKey != NULL); in kbkdf_CreateKey() 657 PR_ASSERT(derived_key != NULL && key != NULL); in kbkdf_FinalizeKey() 674 *(derived_key->phKey) = key->handle; in kbkdf_FinalizeKey() 712 size_t key_size = kbkdf_GetDerivedKeySize(derived_key); in kbkdf_SaveKeys() 717 *(derived_key->phKey) = CK_INVALID_HANDLE; in kbkdf_SaveKeys() 730 *(derived_key->phKey) = CK_INVALID_HANDLE; in kbkdf_SaveKeys() 738 ret = kbkdf_FinalizeKey(hSession, derived_key, key_obj); in kbkdf_SaveKeys() [all …]
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/storage/innobase/xtrabackup/src/ |
H A D | keyring_plugins.cc | 478 byte derived_key[Encryption::KEY_LEN]; in xb_tablespace_keys_load_one() local 537 sizeof(derived_key), derived_key); in xb_tablespace_keys_load_one() 552 sizeof(derived_key), my_aes_256_ecb, NULL, false); in xb_tablespace_keys_load_one() 561 Encryption::KEY_LEN, info.iv, derived_key, in xb_tablespace_keys_load_one() 562 sizeof(derived_key), my_aes_256_ecb, NULL, false); in xb_tablespace_keys_load_one() 613 const byte *derived_key, in xb_tablespace_keys_write_single() argument 634 write_buf + Encryption::KEY_LEN + 4, derived_key, in xb_tablespace_keys_write_single() 665 byte derived_key[Encryption::KEY_LEN]; in xb_tablespace_keys_dump() local 687 sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_dump() 725 if (!xb_tablespace_keys_write_single(stream, derived_key, space->id, in xb_tablespace_keys_dump() [all …]
|
/dports/devel/dtool/dtool-0.11.0/cargo-crates/schnorrkel-0.10.1/src/ |
H A D | derive.rs | 57 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (Self, ChainCode) in derived_key() method 66 self.derived_key(t, cc) in derived_key_simple() 76 self.derived_key(super::context::attach_rng(t,rng), cc) in derived_key_simple_rng() 203 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (Keypair, ChainCode) in derived_key() method 213 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (SecretKey, ChainCode) in derived_key() method 221 fn derived_key<T>(&self, mut t: T, cc: ChainCode) -> (PublicKey, ChainCode) in derived_key() method 248 pub fn derived_key<T>(&self, t: T) -> ExtendedKey<K> in derived_key() method 251 let (key, chaincode) = self.key.derived_key(t, self.chaincode.clone()); in derived_key()
|
/dports/graphics/aseprite/aseprite-1.2.9/third_party/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 95 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 103 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 107 derived_key_len, derived_key); in pbkdf2_sha1() 116 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 123 (void)derived_key; /* UNUSED */ in pbkdf2_sha1()
|
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/storage/innobase/xtrabackup/src/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 95 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 103 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 107 derived_key_len, derived_key); in pbkdf2_sha1() 116 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 123 (void)derived_key; /* UNUSED */ in pbkdf2_sha1()
|
/dports/archivers/libarchive/libarchive-3.5.2/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 136 derived_key_len, derived_key); in pbkdf2_sha1() 145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument [all …]
|
/dports/devel/cmake-gui/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 136 derived_key_len, derived_key); in pbkdf2_sha1() 145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument [all …]
|
/dports/devel/cmake-doc/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 136 derived_key_len, derived_key); in pbkdf2_sha1() 145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument [all …]
|
/dports/devel/cmake/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 56 derived_key, derived_key_len); in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 136 derived_key_len, derived_key); in pbkdf2_sha1() 145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument [all …]
|
/dports/net/freerdp/freerdp-2.5.0/client/iOS/Models/ |
H A D | Encryptor.m | 46 uint8_t *derived_key = calloc(1, TSXEncryptorPBKDF2KeySize); 53 TSXEncryptorPBKDF2Rounds, derived_key, TSXEncryptorPBKDF2KeySize); 55 // dataWithBytesNoCopy:derived_key length:TWEncryptorPBKDF2KeySize freeWhenDone:NO]); 61 free(derived_key); 72 TSXEncryptorPBKDF2Rounds, TSXEncryptorPBKDF2KeySize, derived_key); 74 // dataWithBytesNoCopy:derived_key length:TWEncryptorPBKDF2KeySize freeWhenDone:NO]); 80 free(derived_key); 86 _encryption_key = [[NSData alloc] initWithBytesNoCopy:derived_key
|