/dports/net/clash/clash-1.6.0/vendor/github.com/Dreamacro/go-shadowsocks2/shadowaead/ |
H A D | packet.go | 20 saltSize := ciph.SaltSize() 21 salt := dst[:saltSize] 29 if len(dst) < saltSize+len(plaintext)+aead.Overhead() { 32 b := aead.Seal(dst[saltSize:saltSize], _zerononce[:aead.NonceSize()], plaintext, nil) 33 return dst[:saltSize+len(b)], nil 39 saltSize := ciph.SaltSize() 40 if len(pkt) < saltSize { 43 salt := pkt[:saltSize] 48 if len(pkt) < saltSize+aead.Overhead() { 51 if saltSize+len(dst)+aead.Overhead() < len(pkt) { [all …]
|
/dports/lang/mono/mono-5.10.1.57/external/corefx/src/System.Security.Cryptography.Algorithms/src/System/Security/Cryptography/ |
H A D | Rfc2898DeriveBytes.cs | 72 public Rfc2898DeriveBytes(string password, int saltSize) in Rfc2898DeriveBytes() argument 73 : this(password, saltSize, 1000) in Rfc2898DeriveBytes() 77 public Rfc2898DeriveBytes(string password, int saltSize, int iterations) in Rfc2898DeriveBytes() argument 78 : this(password, saltSize, iterations, HashAlgorithmName.SHA1) in Rfc2898DeriveBytes() 82 …public Rfc2898DeriveBytes(string password, int saltSize, int iterations, HashAlgorithmName hashAlg… in Rfc2898DeriveBytes() argument 84 if (saltSize < 0) in Rfc2898DeriveBytes() 85 … throw new ArgumentOutOfRangeException(nameof(saltSize), SR.ArgumentOutOfRange_NeedNonNegNum); in Rfc2898DeriveBytes() 86 if (saltSize < MinimumSaltSize) in Rfc2898DeriveBytes() 87 … throw new ArgumentException(SR.Cryptography_PasswordDerivedBytes_FewBytesSalt, nameof(saltSize)); in Rfc2898DeriveBytes() 91 _salt = Helpers.GenerateRandom(saltSize); in Rfc2898DeriveBytes()
|
/dports/archivers/7-zip/7-zip-21.07/CPP/7zip/Crypto/ |
H A D | WzAes.cpp | 69 unsigned saltSize = _key.GetSaltSize(); in WriteHeader() local 70 MY_RAND_GEN(_key.Salt, saltSize); in WriteHeader() 72 RINOK(WriteStream(outStream, _key.Salt, saltSize)); in WriteHeader() 96 unsigned saltSize = _key.GetSaltSize(); in ReadHeader() local 97 unsigned extraSize = saltSize + kPwdVerifSize; in ReadHeader() 101 for (i = 0; i < saltSize; i++) in ReadHeader() 104 _pwdVerifFromArchive[i] = temp[saltSize + i]; in ReadHeader()
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/command/bitmark-cli/configuration/ |
H A D | salt.go | 16 saltSize = 32 const 20 type Salt [saltSize]byte 46 size := hex.EncodedLen(saltSize) 61 if saltSize != byteCount {
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/command/bitmark-cli/configuration/ |
H A D | salt.go | 16 saltSize = 32 20 type Salt [saltSize]byte 46 size := hex.EncodedLen(saltSize) 61 if saltSize != byteCount {
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/command/bitmark-cli/configuration/ |
H A D | salt.go | 16 saltSize = 32 const 20 type Salt [saltSize]byte 46 size := hex.EncodedLen(saltSize) 61 if saltSize != byteCount {
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/command/bitmark-cli/configuration/ |
H A D | salt.go | 16 saltSize = 32 const 20 type Salt [saltSize]byte 46 size := hex.EncodedLen(saltSize) 61 if saltSize != byteCount {
|
/dports/security/keybase/client-v5.7.1/go/kbfs/libpages/config/ |
H A D | passwords.go | 32 const saltSize = 12 const 36 hex.EncodedLen(saltSize) + 42 hex.EncodedLen(saltSize) 63 salt [saltSize]byte 131 salt := make([]byte, saltSize) 133 if err != nil || n != saltSize {
|
/dports/editors/libreoffice/libreoffice-7.2.6.2/oox/source/crypto/ |
H A D | AgileEngine.cxx | 450 sal_uInt32 saltSize = mInfo.saltSize; in decrypt() local 469 auto p = saltWithBlockKey.begin() + saltSize; in decrypt() 511 mInfo.saltSize = 0; in readEncryptionInfo() 535 if (1 > mInfo.saltSize|| mInfo.saltSize > 65536) // Check in readEncryptionInfo() 563 if (!generateBytes(mInfo.saltValue, mInfo.saltSize)) in generateAndEncryptVerifierHash() 686 mInfo.saltSize = rAgileEncryptionParameters.saltSize; in setupEncryptionParameters() 695 mInfo.keyDataSalt.resize(mInfo.saltSize); in setupEncryptionParameters() 696 mInfo.saltValue.resize(mInfo.saltSize); in setupEncryptionParameters() 728 aXmlWriter.attribute("saltSize", mInfo.saltSize); in writeEncryptionInfo() 791 sal_uInt32 saltSize = mInfo.saltSize; in encrypt() local [all …]
|
H A D | Standard2007Engine.cxx | 72 sal_uInt32 saltSize = mInfo.verifier.saltSize; in calculateEncryptionKey() local 77 std::vector<sal_uInt8> initialData(saltSize + passwordByteLength); in calculateEncryptionKey() 78 std::copy(saltArray, saltArray + saltSize, initialData.begin()); in calculateEncryptionKey() 80 auto p = initialData.begin() + saltSize; in calculateEncryptionKey() 197 lclRandomGenerateValues(mInfo.verifier.salt, mInfo.verifier.saltSize); in setupEncryption() 235 rStream.WriteUInt32(mInfo.verifier.saltSize); in writeEncryptionInfo() 301 mInfo.verifier.saltSize = aBinaryStream.readuInt32(); in readEncryptionInfo() 307 if (mInfo.verifier.saltSize != 16) in readEncryptionInfo()
|
/dports/editors/libreoffice6/libreoffice-6.4.7.2/oox/source/crypto/ |
H A D | AgileEngine.cxx | 323 std::vector<sal_uInt8> hashInput(mInfo.saltSize, 0); in decryptAndCheckVerifierHash() 441 sal_uInt32 saltSize = mInfo.saltSize; in decrypt() local 500 mInfo.saltSize = 0; in readEncryptionInfo() 524 if (1 > mInfo.saltSize|| mInfo.saltSize > 65536) // Check in readEncryptionInfo() 552 if (!generateBytes(mInfo.saltValue, mInfo.saltSize)) in generateAndEncryptVerifierHash() 675 mInfo.saltSize = rAgileEncryptionParameters.saltSize; in setupEncryptionParameters() 684 mInfo.keyDataSalt.resize(mInfo.saltSize); in setupEncryptionParameters() 685 mInfo.saltValue.resize(mInfo.saltSize); in setupEncryptionParameters() 717 aXmlWriter.attribute("saltSize", mInfo.saltSize); in writeEncryptionInfo() 738 aXmlWriter.attribute("saltSize", mInfo.saltSize); in writeEncryptionInfo() [all …]
|
H A D | Standard2007Engine.cxx | 74 sal_uInt32 saltSize = mInfo.verifier.saltSize; in calculateEncryptionKey() local 79 std::vector<sal_uInt8> initialData(saltSize + passwordByteLength); in calculateEncryptionKey() 80 std::copy(saltArray, saltArray + saltSize, initialData.begin()); in calculateEncryptionKey() 87 initialData.begin() + saltSize); in calculateEncryptionKey() 199 lclRandomGenerateValues(mInfo.verifier.salt, mInfo.verifier.saltSize); in setupEncryption() 291 mInfo.verifier.saltSize = aBinaryStream.readuInt32(); in readEncryptionInfo() 297 if (mInfo.verifier.saltSize != 16) in readEncryptionInfo()
|
/dports/archivers/ppmd-7z/p7zip_9.04/CPP/7zip/Crypto/ |
H A D | WzAes.cpp | 131 UInt32 saltSize = _key.GetSaltSize(); in WriteHeader() local 132 g_RandomGenerator.Generate(_key.Salt, saltSize); in WriteHeader() 134 RINOK(WriteStream(outStream, _key.Salt, saltSize)); in WriteHeader() 159 UInt32 saltSize = _key.GetSaltSize(); in ReadHeader() local 160 UInt32 extraSize = saltSize + kPwdVerifCodeSize; in ReadHeader() 164 for (i = 0; i < saltSize; i++) in ReadHeader() 167 _pwdVerifFromArchive[i] = temp[saltSize + i]; in ReadHeader()
|
H A D | Pbkdf2HmacSha1.cpp | 10 void Pbkdf2Hmac(const Byte *pwd, size_t pwdSize, const Byte *salt, size_t saltSize, in Pbkdf2Hmac() argument 18 ctx.Update(salt, saltSize); in Pbkdf2Hmac() 42 void Pbkdf2Hmac32(const Byte *pwd, size_t pwdSize, const UInt32 *salt, size_t saltSize, in Pbkdf2Hmac32() argument 50 ctx.Update(salt, saltSize); in Pbkdf2Hmac32()
|
/dports/archivers/maxcso/maxcso-1.10.0/7zip/CPP/7zip/Crypto/ |
H A D | WzAes.cpp | 98 unsigned saltSize = _key.GetSaltSize(); in WriteHeader() local 99 g_RandomGenerator.Generate(_key.Salt, saltSize); in WriteHeader() 101 RINOK(WriteStream(outStream, _key.Salt, saltSize)); in WriteHeader() 124 unsigned saltSize = _key.GetSaltSize(); in ReadHeader() local 125 unsigned extraSize = saltSize + kPwdVerifSize; in ReadHeader() 129 for (i = 0; i < saltSize; i++) in ReadHeader() 132 _pwdVerifFromArchive[i] = temp[saltSize + i]; in ReadHeader()
|
H A D | Pbkdf2HmacSha1.cpp | 13 const Byte *salt, size_t saltSize, in Pbkdf2Hmac() argument 23 ctx.Update(salt, saltSize); in Pbkdf2Hmac() 51 const UInt32 *salt, size_t saltSize, in Pbkdf2Hmac32() argument 61 ctx.Update(salt, saltSize); in Pbkdf2Hmac32()
|
/dports/security/cryptopp/cryptopp-8.6.0/ |
H A D | pssr.cpp | 61 const size_t saltSize = SaltLen(digestSize); in ComputeMessageRepresentative() local 64 SecByteBlock digest(digestSize), salt(saltSize); in ComputeMessageRepresentative() 66 rng.GenerateBlock(salt, saltSize); in ComputeMessageRepresentative() 75 hash.Update(salt, saltSize); in ComputeMessageRepresentative() 109 const size_t saltSize = SaltLen(digestSize); in RecoverMessageFromRepresentative() local 129 byte *salt = representative + representativeByteLength - u - digestSize - saltSize; in RecoverMessageFromRepresentative() 152 hash.Update(salt, saltSize); in RecoverMessageFromRepresentative()
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cryptopp/ |
H A D | pssr.cpp | 59 const size_t saltSize = SaltLen(digestSize); in ComputeMessageRepresentative() local 62 SecByteBlock digest(digestSize), salt(saltSize); in ComputeMessageRepresentative() 64 rng.GenerateBlock(salt, saltSize); in ComputeMessageRepresentative() 73 hash.Update(salt, saltSize); in ComputeMessageRepresentative() 107 const size_t saltSize = SaltLen(digestSize); in RecoverMessageFromRepresentative() local 127 byte *salt = representative + representativeByteLength - u - digestSize - saltSize; in RecoverMessageFromRepresentative() 150 hash.Update(salt, saltSize); in RecoverMessageFromRepresentative()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | pssr.cpp | 61 const size_t saltSize = SaltLen(digestSize); in ComputeMessageRepresentative() local 64 SecByteBlock digest(digestSize), salt(saltSize); in ComputeMessageRepresentative() 66 rng.GenerateBlock(salt, saltSize); in ComputeMessageRepresentative() 75 hash.Update(salt, saltSize); in ComputeMessageRepresentative() 109 const size_t saltSize = SaltLen(digestSize); in RecoverMessageFromRepresentative() local 129 byte *salt = representative + representativeByteLength - u - digestSize - saltSize; in RecoverMessageFromRepresentative() 152 hash.Update(salt, saltSize); in RecoverMessageFromRepresentative()
|
/dports/emulators/citra/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | pssr.cpp | 61 const size_t saltSize = SaltLen(digestSize); in ComputeMessageRepresentative() local 64 SecByteBlock digest(digestSize), salt(saltSize); in ComputeMessageRepresentative() 66 rng.GenerateBlock(salt, saltSize); in ComputeMessageRepresentative() 75 hash.Update(salt, saltSize); in ComputeMessageRepresentative() 109 const size_t saltSize = SaltLen(digestSize); in RecoverMessageFromRepresentative() local 129 byte *salt = representative + representativeByteLength - u - digestSize - saltSize; in RecoverMessageFromRepresentative() 152 hash.Update(salt, saltSize); in RecoverMessageFromRepresentative()
|
/dports/sysutils/fusefs-securefs/securefs-0.12.0/external/cryptopp/ |
H A D | pssr.cpp | 61 const size_t saltSize = SaltLen(digestSize); 64 SecByteBlock digest(digestSize), salt(saltSize); 66 rng.GenerateBlock(salt, saltSize); 75 hash.Update(salt, saltSize); 109 const size_t saltSize = SaltLen(digestSize); 129 byte *salt = representative + representativeByteLength - u - digestSize - saltSize; 152 hash.Update(salt, saltSize);
|
/dports/security/cryptlib/cryptlib-3.4.3/misc/ |
H A D | pgp_misc.c | 191 IN_BUFFER_OPT( saltSize ) const BYTE *salt, 192 IN_RANGE( 0, CRYPT_MAX_HASHSIZE ) const int saltSize, 200 assert( ( salt == NULL && saltSize == 0 ) || \ 201 isReadPtr( salt, saltSize ) ); 209 REQUIRES( ( salt == NULL && saltSize == 0 ) || \ 210 ( saltSize > 0 && saltSize <= CRYPT_MAX_HASHSIZE ) ); 238 salt, saltSize, iterations ); 245 setMessageData( &msgData, ( MESSAGE_CAST ) salt, saltSize );
|
/dports/devel/eric6/eric6-21.11/eric/eric6/Utilities/crypto/ |
H A D | py3PBKDF2.py | 44 saltSize=32): argument 55 salt = os.urandom(saltSize) 63 saltSize=32): argument 74 password, digestMod, iterations, saltSize)
|
/dports/security/cryptlib/cryptlib-3.4.3/session/ |
H A D | cmp_cry.c | 209 if( protocolInfo->saltSize <= 0 ) in readMacInfo() 222 protocolInfo->saltSize = saltLength; in readMacInfo() 228 protocolInfo->salt, protocolInfo->saltSize ); in readMacInfo() 239 saltLength == protocolInfo->saltSize && \ in readMacInfo() 248 protocolInfo->salt, protocolInfo->saltSize ); in readMacInfo() 277 protocolInfo->saltSize = saltLength; in readMacInfo() 283 protocolInfo->salt, protocolInfo->saltSize ); in readMacInfo() 308 paramSize = ( int ) sizeofObject( protocolInfo->saltSize ) + \ in writeMacInfo() 323 protocolInfo->salt, protocolInfo->saltSize ); in writeMacInfo() 325 writeOctetString( stream, protocolInfo->salt, protocolInfo->saltSize, in writeMacInfo()
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/mscorlib/system/security/cryptography/ |
H A D | rfc2898derivebytes.cs | 48 public Rfc2898DeriveBytes(string password, int saltSize) : this(password, saltSize, 1000) {} in Rfc2898DeriveBytes() argument 54 public Rfc2898DeriveBytes(string password, int saltSize, int iterations) { in Rfc2898DeriveBytes() argument 55 if (saltSize < 0) in Rfc2898DeriveBytes() 59 byte[] salt = new byte[saltSize]; in Rfc2898DeriveBytes()
|