Home
last modified time | relevance | path

Searched refs:dkLen (Results 1 – 25 of 250) sorted by relevance

12345678910

/dports/archivers/peazip/peazip-8.1.0.src/
H A Dkeyderiv.pas87 procedure PBKDF2S(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word);
96 procedure PBKDF2S_256(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word);
126 if kdf2(FindHash_by_ID(_SHA1),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin
133 procedure PBKDF2S(sPW: TKD_String; salt: pointer; sLen: word; C: longint; var DK; dkLen: word);
136 PBKDF2(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen);
146 if kdf2(FindHash_by_ID(_SHA256),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin
156 PBKDF2_256(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen);
163 if kdf2(FindHash_by_ID(_SHA512),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin
173 PBKDF2_512(@sPW[1], length(sPW), salt, sLen, C, DK, dkLen);
181 if kdf2(FindHash_by_ID(_Whirlpool),pPW,pLen,salt,sLen,C,DK,dkLen)<>0 then begin
[all …]
H A Dkdf.pas190 pbkdf1s := pbkdf1(phash, @sPW[1], length(sPW), salt, C, DK, dkLen);
223 for i:=1 to 1 + pred(dkLen) div hLen do begin
244 if lk<dkLen then begin
258 pbkdf2s := pbkdf2(phash, @sPW[1], length(sPW), salt, sLen, C, DK, dkLen);
293 for i:=1 to 1 + pred(dkLen) div hLen do begin
310 if lk<dkLen then begin
326 kdf1 := kdfx(phash, 1, Z, pOtherInfo, zLen, oiLen, DK, dkLen);
334 kdf2 := kdfx(phash, 2, Z, pOtherInfo, zLen, oiLen, DK, dkLen);
342 kdf3 := kdfx(phash, 3, Z, pOtherInfo, zLen, oiLen, DK, dkLen);
405 for i:=1 to 1 + pred(dkLen) div hLen do begin
[all …]
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_test.c43 unsigned long dkLen; in pkcs_5_test()
158 unsigned long dkLen; in pkcs_5_test()
173 dkLen = cases_5_2[i].dkLen; in pkcs_5_test()
177 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
183 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test()
190 dkLen = cases_5_1[i].dkLen; in pkcs_5_test()
194 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
200 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test()
207 dkLen = cases_5_1o[i].dkLen; in pkcs_5_test()
211 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
[all …]
/dports/security/libtomcrypt/libtomcrypt-1.18.2/src/misc/pkcs5/
H A Dpkcs_5_test.c43 unsigned long dkLen; in pkcs_5_test()
158 unsigned long dkLen; in pkcs_5_test()
173 dkLen = cases_5_2[i].dkLen; in pkcs_5_test()
177 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
183 … else if (compare_testvector(DK, dkLen, cases_5_2[i].DK, cases_5_2[i].dkLen, "PKCS#5_2", i)) { in pkcs_5_test()
190 dkLen = cases_5_1[i].dkLen; in pkcs_5_test()
194 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
200 … else if (compare_testvector(DK, dkLen, cases_5_1[i].DK, cases_5_1[i].dkLen, "PKCS#5_1", i)) { in pkcs_5_test()
207 dkLen = cases_5_1o[i].dkLen; in pkcs_5_test()
211 DK, &dkLen)) != CRYPT_OK) { in pkcs_5_test()
[all …]
/dports/lang/spidermonkey60/firefox-60.9.0/mobile/android/services/src/androidTest/java/org/mozilla/gecko/background/nativecode/test/
H A DTestNativeCrypto.java30 int dkLen = 32; in testPBKDF2SHA256A() local
32 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A()
39 int dkLen = 40; in testPBKDF2SHA256B() local
47 int dkLen = 64; in testPBKDF2SHA256scryptA() local
55 int dkLen = 64; in testPBKDF2SHA256scryptB() local
63 int dkLen = 16; in testPBKDF2SHA256C() local
65 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C()
87 final int dkLen = -1; // Should always be positive. in testPBKDF2SHA256InvalidLenArg() local
90 NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in testPBKDF2SHA256InvalidLenArg()
148 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/mobile/android/tests/background/junit3/src/org/mozilla/gecko/background/nativecode/test/
H A DTestNativeCrypto.java30 int dkLen = 32; in testPBKDF2SHA256A() local
32 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A()
39 int dkLen = 40; in testPBKDF2SHA256B() local
47 int dkLen = 64; in testPBKDF2SHA256scryptA() local
55 int dkLen = 64; in testPBKDF2SHA256scryptB() local
63 int dkLen = 16; in testPBKDF2SHA256C() local
65 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C()
87 final int dkLen = -1; // Should always be positive. in testPBKDF2SHA256InvalidLenArg() local
90 NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in testPBKDF2SHA256InvalidLenArg()
148 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument
[all …]
/dports/lang/spidermonkey60/firefox-60.9.0/mobile/android/services/src/test/java/org/mozilla/gecko/sync/crypto/test/
H A DTestPBKDF2.java33 int dkLen = 32; in testPBKDF2SHA256A() local
35 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A()
36 …checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98… in testPBKDF2SHA256A()
43 int dkLen = 40; in testPBKDF2SHA256B() local
45 …checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd… in testPBKDF2SHA256B()
52 int dkLen = 64; in testPBKDF2SHA256scryptA() local
73 int dkLen = 16; in testPBKDF2SHA256C() local
75 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C()
97 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument
101 byte[] key = PBKDF2.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in checkPBKDF2SHA256()
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/mobile/android/tests/background/junit4/src/org/mozilla/gecko/sync/crypto/test/
H A DTestPBKDF2.java33 int dkLen = 32; in testPBKDF2SHA256A() local
35 …checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17… in testPBKDF2SHA256A()
36 …checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98… in testPBKDF2SHA256A()
43 int dkLen = 40; in testPBKDF2SHA256B() local
45 …checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd… in testPBKDF2SHA256B()
52 int dkLen = 64; in testPBKDF2SHA256scryptA() local
73 int dkLen = 16; in testPBKDF2SHA256C() local
75 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687"); in testPBKDF2SHA256C()
97 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, in checkPBKDF2SHA256() argument
101 byte[] key = PBKDF2.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen); in checkPBKDF2SHA256()
[all …]
/dports/databases/qt5-sqldrivers-sqlite2/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-tds/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-sqlite3/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/textproc/qt5-xml/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sql/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-ibase/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-odbc/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-pgsql/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/databases/qt5-sqldrivers-mysql/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/net/qt5-network/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/x11-toolkits/qt5-widgets/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/x11-toolkits/qt5-gui/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/devel/qt5-testlib/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/devel/qt5-dbus/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/devel/qt5-concurrent/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/devel/qt5-buildtools/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]
/dports/devel/qt5-qmake/kde-qtbase-5.15.2p263/src/network/ssl/
H A Dqpassworddigestor.cpp84 int iterations, quint64 dkLen) in deriveKeyPbkdf1() argument
101 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf1()
104 if (dkLen > quint64(QCryptographicHash::hashLength(algorithm))) { in deriveKeyPbkdf1()
107 << QCryptographicHash::hashLength(algorithm) << "but" << dkLen in deriveKeyPbkdf1()
122 return key.left(dkLen); in deriveKeyPbkdf1()
144 int iterations, quint64 dkLen) in deriveKeyPbkdf2() argument
151 if (dkLen > maxLen) { in deriveKeyPbkdf2()
154 << maxLen << " but " << dkLen << " was requested."; in deriveKeyPbkdf2()
158 if (iterations < 1 || dkLen < 1) in deriveKeyPbkdf2()
165 while (quint64(key.length()) < dkLen) { in deriveKeyPbkdf2()
[all …]

12345678910