/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_pwd.c | 30 u8 *salt; member in struct:eap_pwd_data 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); 124 if (!data->salt) { 126 "EAP-pwd: Memory allocation of salt failed"); 156 bin_clear_free(data->salt, data->salt_len); 195 wpa_hexdump(MSG_DEBUG, "EAP-pwd (server): salt", 196 data->salt, data->salt_len); 283 (data->salt ? 1 + data->salt_len : 0)); 287 /* If we're doing salted password prep, add the salt */ [all...] |
H A D | eap.h | 34 u8 *salt; member in struct:eap_user
|
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 159 const unsigned char *salt, size_t saltlen, 248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(), 158 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) argument
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | des.h | 135 char *DES_fcrypt(const char *buf, const char *salt, char *ret); 136 char *DES_crypt(const char *buf, const char *salt);
|
H A D | x509.h | 287 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 300 ASN1_TYPE *salt; member in struct:PBKDF2PARAM_st 308 ASN1_OCTET_STRING *salt; member in struct:SCRYPT_PARAMS_st 990 const unsigned char *salt, int saltlen); 993 const unsigned char *salt, int saltlen); 995 unsigned char *salt, int saltlen); 997 unsigned char *salt, int saltlen, 1002 const unsigned char *salt, int saltlen, 1007 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
|
/freebsd-13-stable/contrib/libarchive/libarchive/ |
H A D | archive_blake2.h | 102 uint8_t salt[BLAKE2S_SALTBYTES]; /* 24 */ 120 uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */
|
/freebsd-13-stable/sys/contrib/openzfs/include/sys/ |
H A D | dsl_crypt.h | 55 /* the pbkdf2 salt, if the keyformat is of type passphrase */ 215 int spa_crypt_get_salt(spa_t *spa, uint64_t dsobj, uint8_t *salt); 221 dmu_object_type_t ot, boolean_t dedup, boolean_t bswap, uint8_t *salt,
|
/freebsd-13-stable/sys/dev/ice/ |
H A D | virtchnl_inline_ipsec.h | 225 /* SA salt */ 226 u32 salt; member in struct:virtchnl_ipsec_crypto_cfg_item 449 /* SA salt */ 450 u32 salt; member in struct:virtchnl_ipsec_sa_read
|
/freebsd-13-stable/sys/contrib/libb2/ |
H A D | blake2.h | 82 uint8_t salt[BLAKE2S_SALTBYTES]; // 24 member in struct:__blake2s_param 108 uint8_t salt[BLAKE2B_SALTBYTES]; // 48 member in struct:__blake2b_param
|
H A D | blake2b.c | 169 static inline int blake2b_param_set_salt( blake2b_param *P, const uint8_t salt[BLAKE2B_SALTBYTES] ) 171 memcpy( P->salt, salt, BLAKE2B_SALTBYTES );
|
H A D | blake2s.c | 157 static inline int blake2s_param_set_salt( blake2s_param *P, const uint8_t salt[BLAKE2S_SALTBYTES] ) 159 memcpy( P->salt, salt, BLAKE2S_SALTBYTES );
|
/freebsd-13-stable/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2-encoding.c | 82 * the salt and the output. Both are required. The binary salt length and the 85 * The ctx struct must contain buffers large enough to hold the salt and pwd 193 BIN(ctx->salt, maxsaltlen, ctx->saltlen); 234 * If pp->output_len is 0, then the hash string will be a salt string 236 * parameter-only string (no salt and no output). 296 SB(ctx->salt, ctx->saltlen);
|
H A D | argon2-core.c | 278 /* Validate salt (required param) */ 279 if (NULL == context->salt) { 440 if (context->salt != NULL) { 442 &BlakeHash, (const uint8_t *) context->salt, context->saltlen);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | hostfile.c | 73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument 90 debug2("extract_salt: missing salt termination character"); 97 debug2("extract_salt: bad encoded salt length %u", b64len); 104 ret = __b64_pton(b64salt, salt, salt_len); 107 debug2("extract_salt: salt decode error"); 111 debug2("extract_salt: expected salt len %zd, got %d", 123 u_char salt[256], result[256]; local 131 /* Create new salt */ 132 arc4random_buf(salt, len); 134 /* Extract salt fro [all...] |
/freebsd-13-stable/crypto/openssl/crypto/blake2/ |
H A D | blake2b.c | 94 memset(P->salt, 0, sizeof(P->salt));
|
H A D | blake2s.c | 90 memset(P->salt, 0, sizeof(P->salt));
|
/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius.c | 993 /* key: 16-bit salt followed by encrypted key info */ 1059 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, argument 1069 WPA_PUT_BE16(saltbuf, salt); 1199 u16 salt; local 1214 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) { 1218 salt |= 0x8000; 1219 WPA_PUT_BE16(pos, salt); 1221 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret, 1243 salt 1561 const u8 *salt; local [all...] |
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | get.c | 107 * return 0 iff `salt' actually is the same as the current salt in `k' 111 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument 113 if (salt->salttype != (size_t)k->key_data_type[1]) 115 if (salt->saltvalue.length != (size_t)k->key_data_length[1]) 117 return memcmp (salt->saltvalue.data, k->key_data_contents[1], 118 salt->saltvalue.length);
|
/freebsd-13-stable/kerberos5/lib/libkrb5/ |
H A D | Makefile | 587 salt-aes.c \ 588 salt-arcfour.c \ 589 salt-des.c \ 590 salt-des3.c \ 591 salt.c \
|
/freebsd-13-stable/contrib/telnet/libtelnet/ |
H A D | sra.c | 439 char *xpasswd, *salt; local 453 salt = pw->pw_passwd; 454 xpasswd = crypt(cred, salt);
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | chap_ms.c | 403 static u_char salt[] = "KGS!@#$%"; /* RASAPI32.dll */ local 413 DesEncrypt(salt, SECRET, hash); 414 DesEncrypt(salt, SECRET + 7, hash + 8);
|
/freebsd-13-stable/sys/geom/bde/ |
H A D | g_bde.h | 113 uint8_t salt[16]; member in struct:g_bde_key
|
/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | openbsd-compat.h | 324 char *xcrypt(const char *password, const char *salt);
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | srp.c | 162 char *salt = NULL; local 173 if ((gNid = SRP_create_verifier(user, password, &salt, 177 *srp_usersalt = salt; 181 BIO_printf(bio_err, "gNid=%s salt =\"%s\"\n verifier =\"%s\"\n", 182 gNid, salt, *srp_verifier);
|
/freebsd-13-stable/contrib/ldns/ |
H A D | str2host.c | 132 uint8_t *salt; local 148 salt = LDNS_XMALLOC(uint8_t, salt_length_str / 2); 149 if(!salt) { 154 salt[c/2] = (uint8_t) ldns_hexdigit_to_int(salt_str[c]) * 16 + 157 LDNS_FREE(salt); 165 LDNS_FREE(salt); 169 memcpy(&data[1], salt, salt_length); 172 LDNS_FREE(salt);
|