Searched refs:salt (Results 151 - 175 of 216) sorted by relevance

123456789

/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_server_pwd.c30 u8 *salt; member in struct:eap_pwd_data
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len);
124 if (!data->salt) {
126 "EAP-pwd: Memory allocation of salt failed");
156 bin_clear_free(data->salt, data->salt_len);
195 wpa_hexdump(MSG_DEBUG, "EAP-pwd (server): salt",
196 data->salt, data->salt_len);
283 (data->salt ? 1 + data->salt_len : 0));
287 /* If we're doing salted password prep, add the salt */
[all...]
H A Deap.h34 u8 *salt; member in struct:eap_user
/freebsd-13-stable/crypto/openssl/crypto/evp/
H A Dpbe_scrypt.c159 const unsigned char *salt, size_t saltlen,
248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(),
158 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) argument
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Ddes.h135 char *DES_fcrypt(const char *buf, const char *salt, char *ret);
136 char *DES_crypt(const char *buf, const char *salt);
H A Dx509.h287 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
300 ASN1_TYPE *salt; member in struct:PBKDF2PARAM_st
308 ASN1_OCTET_STRING *salt; member in struct:SCRYPT_PARAMS_st
990 const unsigned char *salt, int saltlen);
993 const unsigned char *salt, int saltlen);
995 unsigned char *salt, int saltlen);
997 unsigned char *salt, int saltlen,
1002 const unsigned char *salt, int saltlen,
1007 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
/freebsd-13-stable/contrib/libarchive/libarchive/
H A Darchive_blake2.h102 uint8_t salt[BLAKE2S_SALTBYTES]; /* 24 */
120 uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */
/freebsd-13-stable/sys/contrib/openzfs/include/sys/
H A Ddsl_crypt.h55 /* the pbkdf2 salt, if the keyformat is of type passphrase */
215 int spa_crypt_get_salt(spa_t *spa, uint64_t dsobj, uint8_t *salt);
221 dmu_object_type_t ot, boolean_t dedup, boolean_t bswap, uint8_t *salt,
/freebsd-13-stable/sys/dev/ice/
H A Dvirtchnl_inline_ipsec.h225 /* SA salt */
226 u32 salt; member in struct:virtchnl_ipsec_crypto_cfg_item
449 /* SA salt */
450 u32 salt; member in struct:virtchnl_ipsec_sa_read
/freebsd-13-stable/sys/contrib/libb2/
H A Dblake2.h82 uint8_t salt[BLAKE2S_SALTBYTES]; // 24 member in struct:__blake2s_param
108 uint8_t salt[BLAKE2B_SALTBYTES]; // 48 member in struct:__blake2b_param
H A Dblake2b.c169 static inline int blake2b_param_set_salt( blake2b_param *P, const uint8_t salt[BLAKE2B_SALTBYTES] )
171 memcpy( P->salt, salt, BLAKE2B_SALTBYTES );
H A Dblake2s.c157 static inline int blake2s_param_set_salt( blake2s_param *P, const uint8_t salt[BLAKE2S_SALTBYTES] )
159 memcpy( P->salt, salt, BLAKE2S_SALTBYTES );
/freebsd-13-stable/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/
H A Dargon2-encoding.c82 * the salt and the output. Both are required. The binary salt length and the
85 * The ctx struct must contain buffers large enough to hold the salt and pwd
193 BIN(ctx->salt, maxsaltlen, ctx->saltlen);
234 * If pp->output_len is 0, then the hash string will be a salt string
236 * parameter-only string (no salt and no output).
296 SB(ctx->salt, ctx->saltlen);
H A Dargon2-core.c278 /* Validate salt (required param) */
279 if (NULL == context->salt) {
440 if (context->salt != NULL) {
442 &BlakeHash, (const uint8_t *) context->salt, context->saltlen);
/freebsd-13-stable/crypto/openssh/
H A Dhostfile.c73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument
90 debug2("extract_salt: missing salt termination character");
97 debug2("extract_salt: bad encoded salt length %u", b64len);
104 ret = __b64_pton(b64salt, salt, salt_len);
107 debug2("extract_salt: salt decode error");
111 debug2("extract_salt: expected salt len %zd, got %d",
123 u_char salt[256], result[256]; local
131 /* Create new salt */
132 arc4random_buf(salt, len);
134 /* Extract salt fro
[all...]
/freebsd-13-stable/crypto/openssl/crypto/blake2/
H A Dblake2b.c94 memset(P->salt, 0, sizeof(P->salt));
H A Dblake2s.c90 memset(P->salt, 0, sizeof(P->salt));
/freebsd-13-stable/contrib/wpa/src/radius/
H A Dradius.c993 /* key: 16-bit salt followed by encrypted key info */
1059 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, argument
1069 WPA_PUT_BE16(saltbuf, salt);
1199 u16 salt; local
1214 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) {
1218 salt |= 0x8000;
1219 WPA_PUT_BE16(pos, salt);
1221 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret,
1243 salt
1561 const u8 *salt; local
[all...]
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Dget.c107 * return 0 iff `salt' actually is the same as the current salt in `k'
111 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument
113 if (salt->salttype != (size_t)k->key_data_type[1])
115 if (salt->saltvalue.length != (size_t)k->key_data_length[1])
117 return memcmp (salt->saltvalue.data, k->key_data_contents[1],
118 salt->saltvalue.length);
/freebsd-13-stable/kerberos5/lib/libkrb5/
H A DMakefile587 salt-aes.c \
588 salt-arcfour.c \
589 salt-des.c \
590 salt-des3.c \
591 salt.c \
/freebsd-13-stable/contrib/telnet/libtelnet/
H A Dsra.c439 char *xpasswd, *salt; local
453 salt = pw->pw_passwd;
454 xpasswd = crypt(cred, salt);
/freebsd-13-stable/usr.sbin/ppp/
H A Dchap_ms.c403 static u_char salt[] = "KGS!@#$%"; /* RASAPI32.dll */ local
413 DesEncrypt(salt, SECRET, hash);
414 DesEncrypt(salt, SECRET + 7, hash + 8);
/freebsd-13-stable/sys/geom/bde/
H A Dg_bde.h113 uint8_t salt[16]; member in struct:g_bde_key
/freebsd-13-stable/crypto/openssh/openbsd-compat/
H A Dopenbsd-compat.h324 char *xcrypt(const char *password, const char *salt);
/freebsd-13-stable/crypto/openssl/apps/
H A Dsrp.c162 char *salt = NULL; local
173 if ((gNid = SRP_create_verifier(user, password, &salt,
177 *srp_usersalt = salt;
181 BIO_printf(bio_err, "gNid=%s salt =\"%s\"\n verifier =\"%s\"\n",
182 gNid, salt, *srp_verifier);
/freebsd-13-stable/contrib/ldns/
H A Dstr2host.c132 uint8_t *salt; local
148 salt = LDNS_XMALLOC(uint8_t, salt_length_str / 2);
149 if(!salt) {
154 salt[c/2] = (uint8_t) ldns_hexdigit_to_int(salt_str[c]) * 16 +
157 LDNS_FREE(salt);
165 LDNS_FREE(salt);
169 memcpy(&data[1], salt, salt_length);
172 LDNS_FREE(salt);

Completed in 211 milliseconds

123456789