Searched refs:salt (Results 26 - 50 of 113) sorted by relevance

12345

/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dnsec3_50.h37 unsigned char *salt; member in struct:dns_rdata_nsec3
/freebsd-9.3-release/lib/libcrypt/
H A Dcrypt-sha256.c47 /* Define our magic string to mark salt for SHA256 "encryption" replacement. */
53 /* Maximum salt string length. */
63 crypt_sha256_r(const char *key, const char *salt, char *buffer, int buflen) argument
81 /* Find beginning of salt string. The prefix should normally always
83 if (strncmp(sha256_salt_prefix, salt, sizeof(sha256_salt_prefix) - 1) == 0)
84 /* Skip salt prefix. */
85 salt += sizeof(sha256_salt_prefix) - 1;
87 if (strncmp(salt, sha256_rounds_prefix, sizeof(sha256_rounds_prefix) - 1)
89 num = salt + sizeof(sha256_rounds_prefix) - 1;
93 salt
271 crypt_sha256(const char *key, const char *salt) argument
360 const char *salt; member in struct:__anon5177
[all...]
H A Dcrypt-sha512.c47 /* Define our magic string to mark salt for SHA512 "encryption" replacement. */
53 /* Maximum salt string length. */
63 crypt_sha512_r(const char *key, const char *salt, char *buffer, int buflen) argument
81 /* Find beginning of salt string. The prefix should normally always
83 if (strncmp(sha512_salt_prefix, salt, sizeof(sha512_salt_prefix) - 1) == 0)
84 /* Skip salt prefix. */
85 salt += sizeof(sha512_salt_prefix) - 1;
87 if (strncmp(salt, sha512_rounds_prefix, sizeof(sha512_rounds_prefix) - 1)
89 num = salt + sizeof(sha512_rounds_prefix) - 1;
93 salt
283 crypt_sha512(const char *key, const char *salt) argument
391 const char *salt; member in struct:__anon5179
[all...]
/freebsd-9.3-release/contrib/bind9/bin/tools/
H A Dnsec3hash.c63 printf("Usage: %s salt algorithm iterations domain\n", program);
75 unsigned char salt[DNS_NSEC3_SALTSIZE]; local
87 salt[0] = 0;
89 isc_buffer_init(&buffer, salt, sizeof(salt));
91 check_result(result, "isc_hex_decodestring(salt)");
94 fatal("salt too long");
111 length = isc_iterated_hash(hash, hash_alg, iterations, salt,
119 fprintf(stdout, "%.*s (salt=%s, hash=%u, iterations=%u)\n",
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dstash.c80 krb5_salt salt; local
81 salt.salttype = KRB5_PW_SALT;
83 salt.saltvalue.data = NULL;
84 salt.saltvalue.length = 0;
100 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
H A Dload.c206 key->salt = malloc(sizeof(*key->salt));
207 if (key->salt == NULL)
209 key->salt->type = type;
213 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2);
217 ret = krb5_data_alloc(&key->salt->salt,
224 ((u_char*)key->salt->salt
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dkstash.c103 krb5_salt salt; local
104 salt.salttype = KRB5_PW_SALT;
106 salt.saltvalue.data = NULL;
107 salt.saltvalue.length = 0;
126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
/freebsd-9.3-release/sys/geom/eli/
H A Dpkcs5v2.c52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, argument
62 bcopy(salt, saltcount, saltsize);
92 uint8_t key[G_ELI_USERKEYLEN], salt[G_ELI_SALTLEN]; local
98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
/freebsd-9.3-release/crypto/openssl/crypto/evp/
H A Dp5_crpt.c115 unsigned char *salt; local
135 salt = pbe->salt->data;
136 saltlen = pbe->salt->length;
146 EVP_DigestUpdate(&ctx, salt, saltlen);
H A Dp5_crpt2.c83 const unsigned char *salt, int saltlen, int iter,
112 HMAC_Update(&hctx, salt, saltlen);
131 h__dump(salt, saltlen);
143 unsigned char salt[] = { 0x12, 0x34, 0x56, 0x78 }; local
144 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
161 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
242 if (kdf->salt->type != V_ASN1_OCTET_STRING) {
248 salt = kdf->salt->value.octet_string->data;
249 saltlen = kdf->salt
82 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
H A Devp_key.c114 const unsigned char *salt, const unsigned char *data,
138 if (salt != NULL)
139 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN);
113 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dset_keys.c106 Salt *salt; local
108 salt = malloc(sizeof(*salt));
109 if(salt == NULL) {
113 keys[i].salt = salt;
114 salt->type = key_data[i].key_data_type[1];
115 krb5_data_copy(&salt->salt,
119 keys[i].salt
[all...]
H A Dget_s.c173 krb5_salt salt; local
175 krb5_get_pw_salt(context->context, ent.entry.principal, &salt);
187 if(key->salt)
188 kd->key_data_type[1] = key->salt->type;
200 /* setup salt */
201 if(key->salt)
202 sp = &key->salt->salt;
204 sp = &salt.saltvalue;
216 krb5_free_salt(context->context, salt);
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dtest_crypto.c96 krb5_salt salt,
116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
160 krb5_salt salt; local
186 salt.salttype = KRB5_PW_SALT;
187 salt.saltvalue.data = NULL;
188 salt.saltvalue.length = 0;
209 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dget_in_tkt_pw.c41 krb5_salt salt,
62 ret = krb5_string_to_key_salt (context, type, password, salt, *key);
39 krb5_password_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
H A Dinit_creds_pw.c64 krb5_salt salt, krb5_data *s2kparms,
82 salt, opaque, *key);
483 krb5_data *salt,
655 krb5_salt salt; member in struct:pa_info_data
662 krb5_free_salt(context, ppaid->salt);
675 paid->salt.salttype = salttype;
676 paid->salt.saltvalue.data = malloc(salt_len + 1);
677 if (paid->salt.saltvalue.data == NULL) {
681 memcpy(paid->salt.saltvalue.data, salt_string, salt_len);
682 ((char *)paid->salt
62 default_s2k_func(krb5_context context, krb5_enctype type, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument
481 krb5_keyblock_key_proc(krb5_context context, krb5_keytype type, krb5_data *salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
720 krb5_salt salt; local
769 krb5_salt salt; local
926 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument
987 krb5_salt salt; local
1007 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1611 init_creds_keyblock_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
[all...]
H A Dget_in_tkt_with_skey.c41 krb5_salt salt,
39 krb5_skey_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
H A Daes-test.c57 char *salt; member in struct:__anon4627
203 krb5_salt salt; local
212 salt.salttype = KRB5_PW_SALT;
213 salt.saltvalue.data = keys[i].salt;
215 salt.saltvalue.length = strlen(salt.saltvalue.data);
217 salt.saltvalue.length = keys[i].saltlen;
230 salt.saltvalue.data, salt
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/asn1/
H A Dp5_pbev2.c76 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
90 unsigned char *salt, int saltlen)
145 if (salt)
146 memcpy(osalt->data, salt, saltlen);
155 /* Now include salt in kdf structure */
156 kdf->salt->value.octet_string = osalt;
157 kdf->salt->type = V_ASN1_OCTET_STRING;
/freebsd-9.3-release/lib/libc/gen/
H A Dcrypt.c67 des_cipher(const char *in, char *out, long salt __unused, int num_iter __unused)
/freebsd-9.3-release/crypto/openssl/apps/
H A Denc.c109 unsigned char salt[PKCS5_SALT_LEN]; local
181 else if (strcmp(*argv, "-salt") == 0)
445 * we get no salt in that case. Is this a bug?
449 * Salt handling: if encrypting generate a salt and write to
450 * output BIO. If decrypting read salt from input BIO.
458 if (!set_hex(hsalt, salt, sizeof salt)) {
459 BIO_printf(bio_err, "invalid hex salt value\n");
462 } else if (RAND_pseudo_bytes(salt, sizeof salt) <
[all...]
/freebsd-9.3-release/crypto/heimdal/admin/
H A Dadd.c126 krb5_salt salt; local
129 salt.salttype = KRB5_PW_SALT;
130 salt.saltvalue.data = NULL;
131 salt.saltvalue.length = 0;
134 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
/freebsd-9.3-release/crypto/openssh/
H A Dmd5crypt.c45 is_md5_salt(const char *salt) argument
47 return (strncmp(salt, magic, strlen(magic)) == 0);
51 md5_crypt(const char *pw, const char *salt) argument
61 sp = salt;
73 /* get the length of the true salt */
76 /* Stash the salt */
88 /* Then the raw salt */
91 /* Then just as many characters of the MD5(pw, salt, pw) */
/freebsd-9.3-release/usr.bin/enigma/
H A Denigma.c41 char salt[3]; local
45 strlcpy(salt, pw, sizeof(salt));
46 memcpy(buf, crypt(pw, salt), sizeof(buf));
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_add.c106 int passlen, unsigned char *salt,
120 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
164 unsigned char *salt, int saltlen, int iter,
178 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
105 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
163 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument

Completed in 234 milliseconds

12345