/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | nsec3_50.h | 37 unsigned char *salt; member in struct:dns_rdata_nsec3
|
/freebsd-9.3-release/lib/libcrypt/ |
H A D | crypt-sha256.c | 47 /* Define our magic string to mark salt for SHA256 "encryption" replacement. */ 53 /* Maximum salt string length. */ 63 crypt_sha256_r(const char *key, const char *salt, char *buffer, int buflen) argument 81 /* Find beginning of salt string. The prefix should normally always 83 if (strncmp(sha256_salt_prefix, salt, sizeof(sha256_salt_prefix) - 1) == 0) 84 /* Skip salt prefix. */ 85 salt += sizeof(sha256_salt_prefix) - 1; 87 if (strncmp(salt, sha256_rounds_prefix, sizeof(sha256_rounds_prefix) - 1) 89 num = salt + sizeof(sha256_rounds_prefix) - 1; 93 salt 271 crypt_sha256(const char *key, const char *salt) argument 360 const char *salt; member in struct:__anon5177 [all...] |
H A D | crypt-sha512.c | 47 /* Define our magic string to mark salt for SHA512 "encryption" replacement. */ 53 /* Maximum salt string length. */ 63 crypt_sha512_r(const char *key, const char *salt, char *buffer, int buflen) argument 81 /* Find beginning of salt string. The prefix should normally always 83 if (strncmp(sha512_salt_prefix, salt, sizeof(sha512_salt_prefix) - 1) == 0) 84 /* Skip salt prefix. */ 85 salt += sizeof(sha512_salt_prefix) - 1; 87 if (strncmp(salt, sha512_rounds_prefix, sizeof(sha512_rounds_prefix) - 1) 89 num = salt + sizeof(sha512_rounds_prefix) - 1; 93 salt 283 crypt_sha512(const char *key, const char *salt) argument 391 const char *salt; member in struct:__anon5179 [all...] |
/freebsd-9.3-release/contrib/bind9/bin/tools/ |
H A D | nsec3hash.c | 63 printf("Usage: %s salt algorithm iterations domain\n", program); 75 unsigned char salt[DNS_NSEC3_SALTSIZE]; local 87 salt[0] = 0; 89 isc_buffer_init(&buffer, salt, sizeof(salt)); 91 check_result(result, "isc_hex_decodestring(salt)"); 94 fatal("salt too long"); 111 length = isc_iterated_hash(hash, hash_alg, iterations, salt, 119 fprintf(stdout, "%.*s (salt=%s, hash=%u, iterations=%u)\n",
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | stash.c | 80 krb5_salt salt; local 81 salt.salttype = KRB5_PW_SALT; 83 salt.saltvalue.data = NULL; 84 salt.saltvalue.length = 0; 100 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
H A D | load.c | 206 key->salt = malloc(sizeof(*key->salt)); 207 if (key->salt == NULL) 209 key->salt->type = type; 213 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2); 217 ret = krb5_data_alloc(&key->salt->salt, 224 ((u_char*)key->salt->salt [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kstash.c | 103 krb5_salt salt; local 104 salt.salttype = KRB5_PW_SALT; 106 salt.saltvalue.data = NULL; 107 salt.saltvalue.length = 0; 126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
/freebsd-9.3-release/sys/geom/eli/ |
H A D | pkcs5v2.c | 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, argument 62 bcopy(salt, saltcount, saltsize); 92 uint8_t key[G_ELI_USERKEYLEN], salt[G_ELI_SALTLEN]; local 98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | p5_crpt.c | 115 unsigned char *salt; local 135 salt = pbe->salt->data; 136 saltlen = pbe->salt->length; 146 EVP_DigestUpdate(&ctx, salt, saltlen);
|
H A D | p5_crpt2.c | 83 const unsigned char *salt, int saltlen, int iter, 112 HMAC_Update(&hctx, salt, saltlen); 131 h__dump(salt, saltlen); 143 unsigned char salt[] = { 0x12, 0x34, 0x56, 0x78 }; local 144 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 161 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 242 if (kdf->salt->type != V_ASN1_OCTET_STRING) { 248 salt = kdf->salt->value.octet_string->data; 249 saltlen = kdf->salt 82 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | evp_key.c | 114 const unsigned char *salt, const unsigned char *data, 138 if (salt != NULL) 139 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN); 113 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 106 Salt *salt; local 108 salt = malloc(sizeof(*salt)); 109 if(salt == NULL) { 113 keys[i].salt = salt; 114 salt->type = key_data[i].key_data_type[1]; 115 krb5_data_copy(&salt->salt, 119 keys[i].salt [all...] |
H A D | get_s.c | 173 krb5_salt salt; local 175 krb5_get_pw_salt(context->context, ent.entry.principal, &salt); 187 if(key->salt) 188 kd->key_data_type[1] = key->salt->type; 200 /* setup salt */ 201 if(key->salt) 202 sp = &key->salt->salt; 204 sp = &salt.saltvalue; 216 krb5_free_salt(context->context, salt); [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | test_crypto.c | 96 krb5_salt salt, 116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 160 krb5_salt salt; local 186 salt.salttype = KRB5_PW_SALT; 187 salt.saltvalue.data = NULL; 188 salt.saltvalue.length = 0; 209 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter); 93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | get_in_tkt_pw.c | 41 krb5_salt salt, 62 ret = krb5_string_to_key_salt (context, type, password, salt, *key); 39 krb5_password_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
|
H A D | init_creds_pw.c | 64 krb5_salt salt, krb5_data *s2kparms, 82 salt, opaque, *key); 483 krb5_data *salt, 655 krb5_salt salt; member in struct:pa_info_data 662 krb5_free_salt(context, ppaid->salt); 675 paid->salt.salttype = salttype; 676 paid->salt.saltvalue.data = malloc(salt_len + 1); 677 if (paid->salt.saltvalue.data == NULL) { 681 memcpy(paid->salt.saltvalue.data, salt_string, salt_len); 682 ((char *)paid->salt 62 default_s2k_func(krb5_context context, krb5_enctype type, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument 481 krb5_keyblock_key_proc(krb5_context context, krb5_keytype type, krb5_data *salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument 720 krb5_salt salt; local 769 krb5_salt salt; local 926 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument 987 krb5_salt salt; local 1007 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1611 init_creds_keyblock_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument [all...] |
H A D | get_in_tkt_with_skey.c | 41 krb5_salt salt, 39 krb5_skey_key_proc(krb5_context context, krb5_enctype type, krb5_salt salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
|
H A D | aes-test.c | 57 char *salt; member in struct:__anon4627 203 krb5_salt salt; local 212 salt.salttype = KRB5_PW_SALT; 213 salt.saltvalue.data = keys[i].salt; 215 salt.saltvalue.length = strlen(salt.saltvalue.data); 217 salt.saltvalue.length = keys[i].saltlen; 230 salt.saltvalue.data, salt [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 76 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 90 unsigned char *salt, int saltlen) 145 if (salt) 146 memcpy(osalt->data, salt, saltlen); 155 /* Now include salt in kdf structure */ 156 kdf->salt->value.octet_string = osalt; 157 kdf->salt->type = V_ASN1_OCTET_STRING;
|
/freebsd-9.3-release/lib/libc/gen/ |
H A D | crypt.c | 67 des_cipher(const char *in, char *out, long salt __unused, int num_iter __unused)
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | enc.c | 109 unsigned char salt[PKCS5_SALT_LEN]; local 181 else if (strcmp(*argv, "-salt") == 0) 445 * we get no salt in that case. Is this a bug? 449 * Salt handling: if encrypting generate a salt and write to 450 * output BIO. If decrypting read salt from input BIO. 458 if (!set_hex(hsalt, salt, sizeof salt)) { 459 BIO_printf(bio_err, "invalid hex salt value\n"); 462 } else if (RAND_pseudo_bytes(salt, sizeof salt) < [all...] |
/freebsd-9.3-release/crypto/heimdal/admin/ |
H A D | add.c | 126 krb5_salt salt; local 129 salt.salttype = KRB5_PW_SALT; 130 salt.saltvalue.data = NULL; 131 salt.saltvalue.length = 0; 134 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | md5crypt.c | 45 is_md5_salt(const char *salt) argument 47 return (strncmp(salt, magic, strlen(magic)) == 0); 51 md5_crypt(const char *pw, const char *salt) argument 61 sp = salt; 73 /* get the length of the true salt */ 76 /* Stash the salt */ 88 /* Then the raw salt */ 91 /* Then just as many characters of the MD5(pw, salt, pw) */
|
/freebsd-9.3-release/usr.bin/enigma/ |
H A D | enigma.c | 41 char salt[3]; local 45 strlcpy(salt, pw, sizeof(salt)); 46 memcpy(buf, crypt(pw, salt), sizeof(buf));
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 106 int passlen, unsigned char *salt, 120 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 164 unsigned char *salt, int saltlen, int iter, 178 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) { 105 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument 163 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
|