Searched refs:salt (Results 51 - 75 of 276) sorted by relevance

1234567891011>>

/macosx-10.10/apache-793/httpd/modules/lua/
H A Dlua_passwd.c90 char salt[16]; local
105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
123 cbuf = crypt(pw, salt);
135 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
147 rv = apr_generate_random_bytes((unsigned char*)salt, 16);
157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
/macosx-10.10/apr-32/apr-util/apr-util/include/
H A Dapr_md5.h135 * @param salt The salt string to use for the encoding
139 APU_DECLARE(apr_status_t) apr_md5_encode(const char *password, const char *salt,
146 * @param salt Pointer to binary data to be used as salt for the encoding
147 * @param salt_len The size of the salt data (must be >= 16)
153 const unsigned char *salt,
/macosx-10.10/vim-55/src/proto/
H A Dblowfish.pro2 void bf_key_init __ARGS((char_u *password, char_u *salt, int salt_len));
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/
H A Dptest.c62 struct berval *salt; local
72 &passwd, &salt, hash[i] );
88 rc = lutil_authpasswd( &pw[j], passwd, salt, NULL );
98 rc = lutil_authpasswd( passwd, salt, &bad, NULL );
H A Dpasswd.c431 const struct berval *salt )
437 if( salt ) {
439 string.bv_len = hash->bv_len + salt->bv_len;
448 AC_MEMCPY( &string.bv_val[hash->bv_len], salt->bv_val,
449 salt->bv_len );
461 if( salt ) ber_memfree( string.bv_val );
471 if( salt ) ber_memfree( string.bv_val );
497 /* safety check -- must have some salt */
510 /* safety check -- must have some salt */
516 /* hash credentials with salt */
899 lutil_crypt( const char *key, const char *salt, char **hash ) argument
1036 struct berval salt; local
1088 struct berval salt; local
1190 unsigned char salt[32]; /* salt suitable for most anything */ local
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Dnsec3_50.h37 unsigned char *salt; member in struct:dns_rdata_nsec3
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dsalt-aes.c42 krb5_salt salt,
78 salt.saltvalue.data, salt.saltvalue.length,
99 "pw-salt",
39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dtest_crypto.c94 krb5_salt salt,
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
158 krb5_salt salt; local
181 salt.salttype = KRB5_PW_SALT;
182 salt.saltvalue.data = NULL;
183 salt.saltvalue.length = 0;
206 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dtest_rfc3961.c94 krb5_salt salt,
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
162 krb5_salt salt; local
185 salt.salttype = KRB5_PW_SALT;
186 salt.saltvalue.data = NULL;
187 salt.saltvalue.length = 0;
210 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter);
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dget_in_tkt.c98 krb5_salt *salt)
106 if(salt == NULL) {
107 /* default to standard salt */
111 salt = &salt2;
129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key);
139 if(salt == &salt2)
158 krb5_salt salt; local
263 krb5_salt *sp = &salt;
265 salt.salttype = *preauth->val[i].info.val[j].salttype;
267 salt
91 add_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_key_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt) argument
383 krb5_salt salt; variable
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecPBKDF.c37 // salt_length + HASH_SIZE is bigger than either salt + 4 and digestSize.
52 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey) argument
55 CFDataGetBytePtr(salt), CFDataGetLength(salt),
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/
H A Dp12Crypto.h49 CSSM_DATA &salt,
69 const CSSM_DATA &salt,
84 const CSSM_DATA &salt,
H A Dp12Crypto.cpp60 const CSSM_DATA &salt,
69 salt.Data, salt.Length,
98 salt.Data, salt.Length,
128 const CSSM_DATA &salt,
147 keySizeInBits, iterCount, salt, pwd, iv, coder);
208 const CSSM_DATA &salt,
234 keySizeInBits, iterCount, salt, pwd, iv, coder);
52 p12KeyGen_app( CSSM_CSP_HANDLE cspHand, CSSM_KEY &key, bool isForEncr, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, CSSM_DATA &iv, SecNssCoder &coder) argument
117 p12Decrypt_app( CSSM_CSP_HANDLE cspHand, const CSSM_DATA &cipherText, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, SecNssCoder &coder, CSSM_DATA &plainText) argument
203 p12GenMac_app( CSSM_CSP_HANDLE cspHand, const CSSM_DATA &ptext, CSSM_ALGORITHMS alg, unsigned iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, SecNssCoder &coder, CSSM_DATA &macData) argument
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/
H A Dp12Crypto.h49 CSSM_DATA &salt,
69 const CSSM_DATA &salt,
84 const CSSM_DATA &salt,
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dstash.c80 krb5_salt salt; local
81 salt.salttype = KRB5_PW_SALT;
83 salt.saltvalue.data = NULL;
84 salt.saltvalue.length = 0;
106 (void)krb5_string_to_key_salt(context, enctype, buf, salt, &key);
H A Dload.c204 key->salt = calloc(1, sizeof(*key->salt));
205 if (key->salt == NULL)
207 key->salt->type = type;
211 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2);
215 ret = krb5_data_alloc(&key->salt->salt,
222 ((u_char*)key->salt->salt
534 Salt salt; local
[all...]
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dkstash.c103 krb5_salt salt; local
104 salt.salttype = KRB5_PW_SALT;
106 salt.saltvalue.data = NULL;
107 salt.saltvalue.length = 0;
126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
/macosx-10.10/OpenSSL098-52/src/crypto/evp/
H A Dp5_crpt.c113 unsigned char *salt; local
131 salt = pbe->salt->data;
132 saltlen = pbe->salt->length;
140 EVP_DigestUpdate(&ctx, salt, saltlen);
H A Dp5_crpt2.c80 const unsigned char *salt, int saltlen, int iter,
104 HMAC_Update(&hctx, salt, saltlen);
122 h__dump (salt, saltlen);
134 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
135 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
151 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
234 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
241 salt = kdf->salt->value.octet_string->data;
242 saltlen = kdf->salt
79 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/tools/
H A Dnsec3hash.c63 printf("Usage: %s salt algorithm iterations domain\n", program);
75 unsigned char salt[DNS_NSEC3_SALTSIZE]; local
87 salt[0] = 0;
89 isc_buffer_init(&buffer, salt, sizeof(salt));
91 check_result(result, "isc_hex_decodestring(salt)");
94 fatal("salt too long");
111 length = isc_iterated_hash(hash, hash_alg, iterations, salt,
119 fprintf(stdout, "%.*s (salt=%s, hash=%u, iterations=%u)\n",
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dhdb-mitdb.c71 salt:
72 version2 = salt in key_data->key_data_contents[1]
73 else default salt.
119 Salt *salt = k->salt; local
120 /* fix salt type */
121 switch((int)salt->type) {
123 salt->type = KRB5_PADATA_PW_SALT;
126 krb5_data_free(&salt->salt);
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Dpkcs5.c53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key.
57 * @param salt Salt
58 * @param salt_len Length of salt.
70 const void * salt, size_t salt_len,
76 salt, salt_len,
101 memcpy(data, salt, salt_len);
69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void *key) argument
H A Dtest_pkcs12.c48 void *salt; member in struct:tests
116 t->salt, t->saltsize,
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dp5_pbev2.c75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
88 unsigned char *salt, int saltlen)
138 if (salt) memcpy (osalt->data, salt, saltlen);
144 /* Now include salt in kdf structure */
145 kdf->salt->value.octet_string = osalt;
146 kdf->salt->type = V_ASN1_OCTET_STRING;
/macosx-10.10/CommonCrypto-60061/include/
H A DCommonKeyDerivationSPI.h46 const void *salt, size_t saltLen, // for PBKDF

Completed in 411 milliseconds

1234567891011>>