/dports/archivers/peazip/peazip-8.1.0.src/ |
H A D | keyderiv.pas | 87 procedure PBKDF2S(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word); 96 procedure PBKDF2S_256(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word); 126 if kdf2(FindHash_by_ID(_SHA1),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin 133 procedure PBKDF2S(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word); 136 PBKDF2(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen); 146 if kdf2(FindHash_by_ID(_SHA256),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin 156 PBKDF2_256(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen); 163 if kdf2(FindHash_by_ID(_SHA512),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin 173 PBKDF2_512(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen); 181 if kdf2(FindHash_by_ID(_Whirlpool),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin [all …]
|
H A D | kdf.pas | 190 pbkdf1s := pbkdf1(phash, @sPW[1], length(sPW), salt, C, DK, dkLen); 223 for i:=1 to 1 + pred(dkLen) div hLen do begin 244 if lk<dkLen then begin 258 pbkdf2s := pbkdf2(phash, @sPW[1], length(sPW), salt, sLen, C, DK, dkLen); 293 for i:=1 to 1 + pred(dkLen) div hLen do begin 310 if lk<dkLen then begin 326 kdf1 := kdfx(phash, 1, Z, pOtherInfo, zLen, oiLen, DK, dkLen); 334 kdf2 := kdfx(phash, 2, Z, pOtherInfo, zLen, oiLen, DK, dkLen); 342 kdf3 := kdfx(phash, 3, Z, pOtherInfo, zLen, oiLen, DK, dkLen); 405 for i:=1 to 1 + pred(dkLen) div hLen do begin [all …]
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/ |
H A D | pkcs_5_test.c | 43 unsigned long dkLen; in pkcs_5_test() 158 unsigned long dkLen; in pkcs_5_test() 173 dkLen = cases_5_2[i].dkLen; in pkcs_5_test() 177 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() 183 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test() 190 dkLen = cases_5_1[i].dkLen; in pkcs_5_test() 194 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() 200 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test() 207 dkLen = cases_5_1o[i].dkLen; in pkcs_5_test() 211 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() [all …]
|
/dports/security/libtomcrypt/libtomcrypt-1.18.2/src/misc/pkcs5/ |
H A D | pkcs_5_test.c | 43 unsigned long dkLen; in pkcs_5_test() 158 unsigned long dkLen; in pkcs_5_test() 173 dkLen = cases_5_2[i].dkLen; in pkcs_5_test() 177 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() 183 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test() 190 dkLen = cases_5_1[i].dkLen; in pkcs_5_test() 194 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() 200 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test() 207 dkLen = cases_5_1o[i].dkLen; in pkcs_5_test() 211 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test() [all …]
|
/dports/lang/spidermonkey60/firefox-60.9.0/mobile/android/services/src/androidTest/java/org/mozilla/gecko/background/nativecode/test/ |
H A D | TestNativeCrypto.java | 30 int dkLen = 32; in testPBKDF2SHA256A() local 32 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A() 39 int dkLen = 40; in testPBKDF2SHA256B() local 47 int dkLen = 64; in testPBKDF2SHA256scryptA() local 55 int dkLen = 64; in testPBKDF2SHA256scryptB() local 63 int dkLen = 16; in testPBKDF2SHA256C() local 65 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C() 87 final int dkLen = -1; // Should always be positive. in testPBKDF2SHA256InvalidLenArg() local 90 NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in testPBKDF2SHA256InvalidLenArg() 148 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/mobile/android/tests/background/junit3/src/org/mozilla/gecko/background/nativecode/test/ |
H A D | TestNativeCrypto.java | 30 int dkLen = 32; in testPBKDF2SHA256A() local 32 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A() 39 int dkLen = 40; in testPBKDF2SHA256B() local 47 int dkLen = 64; in testPBKDF2SHA256scryptA() local 55 int dkLen = 64; in testPBKDF2SHA256scryptB() local 63 int dkLen = 16; in testPBKDF2SHA256C() local 65 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C() 87 final int dkLen = -1; // Should always be positive. in testPBKDF2SHA256InvalidLenArg() local 90 NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in testPBKDF2SHA256InvalidLenArg() 148 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument [all …]
|
/dports/lang/spidermonkey60/firefox-60.9.0/mobile/android/services/src/test/java/org/mozilla/gecko/sync/crypto/test/ |
H A D | TestPBKDF2.java | 33 int dkLen = 32; in testPBKDF2SHA256A() local 35 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A() 36 …checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98… in testPBKDF2SHA256A() 43 int dkLen = 40; in testPBKDF2SHA256B() local 45 …checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd… in testPBKDF2SHA256B() 52 int dkLen = 64; in testPBKDF2SHA256scryptA() local 73 int dkLen = 16; in testPBKDF2SHA256C() local 75 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C() 97 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument 101 byte[] key = PBKDF2.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in checkPBKDF2SHA256() [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/mobile/android/tests/background/junit4/src/org/mozilla/gecko/sync/crypto/test/ |
H A D | TestPBKDF2.java | 33 int dkLen = 32; in testPBKDF2SHA256A() local 35 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A() 36 …checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98… in testPBKDF2SHA256A() 43 int dkLen = 40; in testPBKDF2SHA256B() local 45 …checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd… in testPBKDF2SHA256B() 52 int dkLen = 64; in testPBKDF2SHA256scryptA() local 73 int dkLen = 16; in testPBKDF2SHA256C() local 75 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C() 97 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument 101 byte[] key = PBKDF2.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in checkPBKDF2SHA256() [all …]
|
/dports/databases/qt5-sqldrivers-sqlite2/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-tds/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-sqlite3/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/textproc/qt5-xml/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sql/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-ibase/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-odbc/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-pgsql/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/databases/qt5-sqldrivers-mysql/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/net/qt5-network/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/x11-toolkits/qt5-widgets/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/x11-toolkits/qt5-gui/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/devel/qt5-testlib/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/devel/qt5-dbus/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/devel/qt5-concurrent/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/devel/qt5-buildtools/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|
/dports/devel/qt5-qmake/kde-qtbase-5.15.2p263/src/network/ssl/ |
H A D | qpassworddigestor.cpp | 84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument 101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1() 104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1() 107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1() 122 return key.left(dkLen); in deriveKeyPbkdf1() 144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument 151 if (dkLen > maxLen) { in deriveKeyPbkdf2() 154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2() 158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2() 165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2() [all …]
|