Home
last modified time | relevance | path

Searched refs:derived_key (Results 1 – 25 of 204) sorted by relevance

123456789

/dports/www/chromium-legacy/chromium-88.0.4324.182/components/webcrypto/algorithms/
H A Decdh_unittest.cc153 blink::WebCryptoKey derived_key; in TEST_F() local
168 blink::WebCryptoKey derived_key; in TEST_F() local
183 blink::WebCryptoKey derived_key; in TEST_F() local
191 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F()
200 blink::WebCryptoKey derived_key; in TEST_F() local
208 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F()
212 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F()
230 blink::WebCryptoKey derived_key; in TEST_F() local
242 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F()
266 blink::WebCryptoKey derived_key; in TEST_F() local
[all …]
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/webcrypto/algorithms/
H A Decdh_unittest.cc153 blink::WebCryptoKey derived_key; in TEST_F() local
168 blink::WebCryptoKey derived_key; in TEST_F() local
183 blink::WebCryptoKey derived_key; in TEST_F() local
191 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F()
200 blink::WebCryptoKey derived_key; in TEST_F() local
208 blink::kWebCryptoKeyUsageSign, &derived_key)); in TEST_F()
212 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F()
230 blink::WebCryptoKey derived_key; in TEST_F() local
242 derived_key.Algorithm().HmacParams()->GetHash().Id()); in TEST_F()
266 blink::WebCryptoKey derived_key; in TEST_F() local
[all …]
/dports/security/opencryptoki/opencryptoki-3.11.0/testcases/crypto/
H A Dec.h520 CK_BYTE derived_key[512]; member
555 … .derived_key = {0x70,0x39,0xA4,0x26,0x35,0xF2,0xDB,0xE5,0xE6,0x9E,0xB0,0xF1,0xC7,0xD0,0x56,0xD6,
583 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58,
607 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58,
635 … .derived_key = {0xCA,0x11,0x2E,0x5E,0xDC,0xBE,0x71,0x78,0xB3,0xB7,0xBE,0x67,0xAF,0x54,0xE2,0x58,
669 … .derived_key = {0xE5,0xCA,0xFD,0x5E,0x16,0x08,0x67,0xCF,0x60,0x3F,0x46,0x0F,0xFC,0x53,0x36,0x08,
716 … .derived_key = {0xA6,0x39,0x99,0x84,0xAD,0xC3,0xAA,0x63,0x6C,0xE1,0x43,0x78,0x32,0x9C,0xAF,0x8D,
757 … .derived_key = {0xA6,0x39,0x99,0x84,0xAD,0xC3,0xAA,0x63,0x6C,0xE1,0x43,0x78,0x32,0x9C,0xAF,0x8D,
894 … .derived_key = {0x01,0x11,0xC7,0xD3,0xAC,0x19,0x45,0x20,0x8C,0x55,0xCB,0xCB,0x95,0x2E,0xFF,0x02,
948 … .derived_key = {0xAC,0xEA,0x1C,0xE5,0xF2,0x3C,0x62,0xC9,0x68,0xF5,0x77,0x8B,0x94,0x67,0x2C,0xD8,
[all …]
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/keys/encrypted-keys/
H A Dencrypted.c372 derived_key); in get_derived_key()
491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local
500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append()
505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append()
531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify()
544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify()
702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt()
930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read()
[all …]
/dports/multimedia/libv4l/linux-5.13-rc2/security/keys/encrypted-keys/
H A Dencrypted.c372 derived_key); in get_derived_key()
491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local
500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append()
505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append()
531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify()
544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify()
702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt()
930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read()
[all …]
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/keys/encrypted-keys/
H A Dencrypted.c372 derived_key); in get_derived_key()
491 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local
500 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append()
505 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append()
531 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify()
544 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_verify()
702 ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key); in encrypted_key_decrypt()
708 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_key_decrypt()
930 ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key); in encrypted_read()
946 memzero_explicit(derived_key, sizeof(derived_key)); in encrypted_read()
[all …]
/dports/security/hashcat/hashcat-6.2.5/tools/test_modules/
H A Dm15900.pm163 my $derived_key;
171 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 32, \&hmac_sha1);
175 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 48, \&hmac_sha512);
186 $key = substr ($derived_key, 0, 24);
187 $iv = substr ($derived_key, 24, 8);
251 $key = substr ($derived_key, 0, 32);
252 $iv = substr ($derived_key, 32, 16);
284 $key = substr ($derived_key, 0, 24);
285 $iv = substr ($derived_key, 24, 8);
337 $key = substr ($derived_key, 0, 32);
[all …]
H A Dm15300.pm161 my $derived_key;
169 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 32, \&hmac_sha1);
173 $derived_key = dpapi_pbkdf2 ($user_derivationKey, $salt, $iterations, 48, \&hmac_sha512);
184 $key = substr ($derived_key, 0, 24);
185 $iv = substr ($derived_key, 24, 8);
249 $key = substr ($derived_key, 0, 32);
250 $iv = substr ($derived_key, 32, 16);
282 $key = substr ($derived_key, 0, 24);
283 $iv = substr ($derived_key, 24, 8);
335 $key = substr ($derived_key, 0, 32);
[all …]
/dports/security/aws-c-auth/aws-c-auth-0.6.5/tests/
H A Dkey_derivation_tests.c274 …struct aws_ecc_key_pair *derived_key = aws_ecc_key_pair_new_ecdsa_p256_key_from_aws_credentials(al… in s_credentials_derive_ecc_key_fixed() local
275 ASSERT_TRUE(derived_key != NULL); in s_credentials_derive_ecc_key_fixed()
277 ASSERT_SUCCESS(s_verify_fixed_ecc_key_public(derived_key, allocator)); in s_credentials_derive_ecc_key_fixed()
278 ASSERT_SUCCESS(s_verify_fixed_ecc_key_private(derived_key, allocator)); in s_credentials_derive_ecc_key_fixed()
280 aws_ecc_key_pair_release(derived_key); in s_credentials_derive_ecc_key_fixed()
305 struct aws_ecc_key_pair *derived_key = aws_credentials_get_ecc_key_pair(derived_credentials); in s_credentials_new_ecc_fixed() local
307 ASSERT_SUCCESS(s_verify_fixed_ecc_key_public(derived_key, allocator)); in s_credentials_new_ecc_fixed()
308 ASSERT_SUCCESS(s_verify_fixed_ecc_key_private(derived_key, allocator)); in s_credentials_new_ecc_fixed()
341 …struct aws_ecc_key_pair *derived_key = aws_ecc_key_pair_new_ecdsa_p256_key_from_aws_credentials(al… in s_credentials_derive_ecc_key_long_access_key() local
342 ASSERT_TRUE(derived_key != NULL); in s_credentials_derive_ecc_key_long_access_key()
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/securemessage/src/cpp/src/securemessage/
H A Dcrypto_ops.cc122 unique_ptr<CryptoOps::SecretKey> derived_key = in DeriveAes256KeyFor() local
125 return derived_key; in DeriveAes256KeyFor()
164 unique_ptr<SecretKey> derived_key = in Decrypt() local
166 plaintext = Aes256CBCDecrypt(*derived_key, ByteBuffer(iv), in Decrypt()
201 unique_ptr<SecretKey> derived_key = in Encrypt() local
294 unique_ptr<SecretKey> derived_key = DeriveAes256KeyFor( in Sign() local
297 if (derived_key == nullptr) { in Sign()
301 signature = Sha256hmac(derived_key->data(), ByteBuffer(data)); in Sign()
363 unique_ptr<SecretKey> derived_key = DeriveAes256KeyFor( in Verify() local
366 if (derived_key == nullptr) { in Verify()
[all …]
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/storage/innobase/xtrabackup/src/
H A Dkeyring_plugins.cc479 byte derived_key[ENCRYPTION_KEY_LEN]; in xb_tablespace_keys_load_one() local
543 salt, sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_load_one()
560 derived_key, in xb_tablespace_keys_load_one()
561 sizeof(derived_key), in xb_tablespace_keys_load_one()
576 derived_key, in xb_tablespace_keys_load_one()
577 sizeof(derived_key), in xb_tablespace_keys_load_one()
649 derived_key, in xb_tablespace_keys_write_single()
664 derived_key, in xb_tablespace_keys_write_single()
699 byte derived_key[ENCRYPTION_KEY_LEN]; in xb_tablespace_keys_dump() local
722 salt, sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_dump()
[all …]
/dports/security/py-stem/stem-1.8.0/stem/client/
H A Ddatatype.py716 derived_key = b''
719 while len(derived_key) < KEY_LEN * 2 + HASH_LEN * 3:
720 derived_key += hashlib.sha1(key_material + Size.CHAR.pack(counter)).digest()
723 key_hash, derived_key = split(derived_key, HASH_LEN)
724 forward_digest, derived_key = split(derived_key, HASH_LEN)
725 backward_digest, derived_key = split(derived_key, HASH_LEN)
726 forward_key, derived_key = split(derived_key, KEY_LEN)
727 backward_key, derived_key = split(derived_key, KEY_LEN)
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/crypto/
H A Dkeysetup_v1.c49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument
76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes()
268 u8 *derived_key; in setup_v1_file_key_derived() local
275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
276 if (!derived_key) in setup_v1_file_key_derived()
280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived()
286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
/dports/multimedia/libv4l/linux-5.13-rc2/fs/crypto/
H A Dkeysetup_v1.c49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument
76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes()
268 u8 *derived_key; in setup_v1_file_key_derived() local
275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
276 if (!derived_key) in setup_v1_file_key_derived()
280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived()
286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
/dports/multimedia/v4l-utils/linux-5.13-rc2/fs/crypto/
H A Dkeysetup_v1.c49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument
76 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes()
268 u8 *derived_key; in setup_v1_file_key_derived() local
275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
276 if (!derived_key) in setup_v1_file_key_derived()
280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
284 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived()
286 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/softoken/
H A Dkbkdf.c365 kbkdf_GetDerivedKeySize(CK_DERIVED_KEY_PTR derived_key) in kbkdf_GetDerivedKeySize() argument
374 CK_ATTRIBUTE_PTR template = derived_key->pTemplate + offset; in kbkdf_GetDerivedKeySize()
613 PR_ASSERT(derived_key != NULL); in kbkdf_CreateKey()
614 PR_ASSERT(derived_key->phKey != NULL); in kbkdf_CreateKey()
657 PR_ASSERT(derived_key != NULL && key != NULL); in kbkdf_FinalizeKey()
674 *(derived_key->phKey) = key->handle; in kbkdf_FinalizeKey()
712 size_t key_size = kbkdf_GetDerivedKeySize(derived_key); in kbkdf_SaveKeys()
717 *(derived_key->phKey) = CK_INVALID_HANDLE; in kbkdf_SaveKeys()
730 *(derived_key->phKey) = CK_INVALID_HANDLE; in kbkdf_SaveKeys()
738 ret = kbkdf_FinalizeKey(hSession, derived_key, key_obj); in kbkdf_SaveKeys()
[all …]
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/storage/innobase/xtrabackup/src/
H A Dkeyring_plugins.cc478 byte derived_key[Encryption::KEY_LEN]; in xb_tablespace_keys_load_one() local
537 sizeof(derived_key), derived_key); in xb_tablespace_keys_load_one()
552 sizeof(derived_key), my_aes_256_ecb, NULL, false); in xb_tablespace_keys_load_one()
561 Encryption::KEY_LEN, info.iv, derived_key, in xb_tablespace_keys_load_one()
562 sizeof(derived_key), my_aes_256_ecb, NULL, false); in xb_tablespace_keys_load_one()
613 const byte *derived_key, in xb_tablespace_keys_write_single() argument
634 write_buf + Encryption::KEY_LEN + 4, derived_key, in xb_tablespace_keys_write_single()
665 byte derived_key[Encryption::KEY_LEN]; in xb_tablespace_keys_dump() local
687 sizeof(salt), sizeof(derived_key), derived_key); in xb_tablespace_keys_dump()
725 if (!xb_tablespace_keys_write_single(stream, derived_key, space->id, in xb_tablespace_keys_dump()
[all …]
/dports/devel/dtool/dtool-0.11.0/cargo-crates/schnorrkel-0.10.1/src/
H A Dderive.rs57 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (Self, ChainCode) in derived_key() method
66 self.derived_key(t, cc) in derived_key_simple()
76 self.derived_key(super::context::attach_rng(t,rng), cc) in derived_key_simple_rng()
203 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (Keypair, ChainCode) in derived_key() method
213 fn derived_key<T>(&self, t: T, cc: ChainCode) -> (SecretKey, ChainCode) in derived_key() method
221 fn derived_key<T>(&self, mut t: T, cc: ChainCode) -> (PublicKey, ChainCode) in derived_key() method
248 pub fn derived_key<T>(&self, t: T) -> ExtendedKey<K> in derived_key() method
251 let (key, chaincode) = self.key.derived_key(t, self.chaincode.clone()); in derived_key()
/dports/graphics/aseprite/aseprite-1.2.9/third_party/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
95 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
103 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
107 derived_key_len, derived_key); in pbkdf2_sha1()
116 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
123 (void)derived_key; /* UNUSED */ in pbkdf2_sha1()
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/storage/innobase/xtrabackup/src/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
95 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
103 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
107 derived_key_len, derived_key); in pbkdf2_sha1()
116 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
123 (void)derived_key; /* UNUSED */ in pbkdf2_sha1()
/dports/archivers/libarchive/libarchive-3.5.2/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
136 derived_key_len, derived_key); in pbkdf2_sha1()
145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
[all …]
/dports/devel/cmake-gui/cmake-3.22.1/Utilities/cmlibarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
136 derived_key_len, derived_key); in pbkdf2_sha1()
145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
[all …]
/dports/devel/cmake-doc/cmake-3.22.1/Utilities/cmlibarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
136 derived_key_len, derived_key); in pbkdf2_sha1()
145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
[all …]
/dports/devel/cmake/cmake-3.22.1/Utilities/cmlibarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
56 derived_key, derived_key_len); in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
81 (PUCHAR)derived_key, (ULONG)derived_key_len, 0); in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
136 derived_key_len, derived_key); in pbkdf2_sha1()
145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
[all …]
/dports/net/freerdp/freerdp-2.5.0/client/iOS/Models/
H A DEncryptor.m46 uint8_t *derived_key = calloc(1, TSXEncryptorPBKDF2KeySize);
53 TSXEncryptorPBKDF2Rounds, derived_key, TSXEncryptorPBKDF2KeySize);
55 // dataWithBytesNoCopy:derived_key length:TWEncryptorPBKDF2KeySize freeWhenDone:NO]);
61 free(derived_key);
72 TSXEncryptorPBKDF2Rounds, TSXEncryptorPBKDF2KeySize, derived_key);
74 // dataWithBytesNoCopy:derived_key length:TWEncryptorPBKDF2KeySize freeWhenDone:NO]);
80 free(derived_key);
86 _encryption_key = [[NSData alloc] initWithBytesNoCopy:derived_key

123456789