/macosx-10.10/apache-793/httpd/modules/lua/ |
H A D | lua_passwd.c | 90 char salt[16]; local 105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len); 120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 123 cbuf = crypt(pw, salt); 135 if (!strcmp(ctx->out, crypt(truncpw, salt))) { 147 rv = apr_generate_random_bytes((unsigned char*)salt, 16); 157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
|
/macosx-10.10/apr-32/apr-util/apr-util/include/ |
H A D | apr_md5.h | 135 * @param salt The salt string to use for the encoding 139 APU_DECLARE(apr_status_t) apr_md5_encode(const char *password, const char *salt, 146 * @param salt Pointer to binary data to be used as salt for the encoding 147 * @param salt_len The size of the salt data (must be >= 16) 153 const unsigned char *salt,
|
/macosx-10.10/vim-55/src/proto/ |
H A D | blowfish.pro | 2 void bf_key_init __ARGS((char_u *password, char_u *salt, int salt_len));
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/ |
H A D | ptest.c | 62 struct berval *salt; local 72 &passwd, &salt, hash[i] ); 88 rc = lutil_authpasswd( &pw[j], passwd, salt, NULL ); 98 rc = lutil_authpasswd( passwd, salt, &bad, NULL );
|
H A D | passwd.c | 431 const struct berval *salt ) 437 if( salt ) { 439 string.bv_len = hash->bv_len + salt->bv_len; 448 AC_MEMCPY( &string.bv_val[hash->bv_len], salt->bv_val, 449 salt->bv_len ); 461 if( salt ) ber_memfree( string.bv_val ); 471 if( salt ) ber_memfree( string.bv_val ); 497 /* safety check -- must have some salt */ 510 /* safety check -- must have some salt */ 516 /* hash credentials with salt */ 899 lutil_crypt( const char *key, const char *salt, char **hash ) argument 1036 struct berval salt; local 1088 struct berval salt; local 1190 unsigned char salt[32]; /* salt suitable for most anything */ local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | nsec3_50.h | 37 unsigned char *salt; member in struct:dns_rdata_nsec3
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-aes.c | 42 krb5_salt salt, 78 salt.saltvalue.data, salt.saltvalue.length, 99 "pw-salt", 39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | test_crypto.c | 94 krb5_salt salt, 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 158 krb5_salt salt; local 181 salt.salttype = KRB5_PW_SALT; 182 salt.saltvalue.data = NULL; 183 salt.saltvalue.length = 0; 206 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter); 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | test_rfc3961.c | 94 krb5_salt salt, 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 162 krb5_salt salt; local 185 salt.salttype = KRB5_PW_SALT; 186 salt.saltvalue.data = NULL; 187 salt.saltvalue.length = 0; 210 time_s2k(context, enctypes[i], "mYsecreitPassword", salt, s2kiter); 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | get_in_tkt.c | 98 krb5_salt *salt) 106 if(salt == NULL) { 107 /* default to standard salt */ 111 salt = &salt2; 129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key); 139 if(salt == &salt2) 158 krb5_salt salt; local 263 krb5_salt *sp = &salt; 265 salt.salttype = *preauth->val[i].info.val[j].salttype; 267 salt 91 add_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_key_proc key_proc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt) argument 383 krb5_salt salt; variable [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecPBKDF.c | 37 // salt_length + HASH_SIZE is bigger than either salt + 4 and digestSize. 52 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey) argument 55 CFDataGetBytePtr(salt), CFDataGetLength(salt),
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Crypto.h | 49 CSSM_DATA &salt, 69 const CSSM_DATA &salt, 84 const CSSM_DATA &salt,
|
H A D | p12Crypto.cpp | 60 const CSSM_DATA &salt, 69 salt.Data, salt.Length, 98 salt.Data, salt.Length, 128 const CSSM_DATA &salt, 147 keySizeInBits, iterCount, salt, pwd, iv, coder); 208 const CSSM_DATA &salt, 234 keySizeInBits, iterCount, salt, pwd, iv, coder); 52 p12KeyGen_app( CSSM_CSP_HANDLE cspHand, CSSM_KEY &key, bool isForEncr, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, CSSM_DATA &iv, SecNssCoder &coder) argument 117 p12Decrypt_app( CSSM_CSP_HANDLE cspHand, const CSSM_DATA &cipherText, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, SecNssCoder &coder, CSSM_DATA &plainText) argument 203 p12GenMac_app( CSSM_CSP_HANDLE cspHand, const CSSM_DATA &ptext, CSSM_ALGORITHMS alg, unsigned iterCount, const CSSM_DATA &salt, const CSSM_DATA &pwd, SecNssCoder &coder, CSSM_DATA &macData) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | p12Crypto.h | 49 CSSM_DATA &salt, 69 const CSSM_DATA &salt, 84 const CSSM_DATA &salt,
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | stash.c | 80 krb5_salt salt; local 81 salt.salttype = KRB5_PW_SALT; 83 salt.saltvalue.data = NULL; 84 salt.saltvalue.length = 0; 106 (void)krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
H A D | load.c | 204 key->salt = calloc(1, sizeof(*key->salt)); 205 if (key->salt == NULL) 207 key->salt->type = type; 211 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2); 215 ret = krb5_data_alloc(&key->salt->salt, 222 ((u_char*)key->salt->salt 534 Salt salt; local [all...] |
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | kstash.c | 103 krb5_salt salt; local 104 salt.salttype = KRB5_PW_SALT; 106 salt.saltvalue.data = NULL; 107 salt.saltvalue.length = 0; 126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | p5_crpt.c | 113 unsigned char *salt; local 131 salt = pbe->salt->data; 132 saltlen = pbe->salt->length; 140 EVP_DigestUpdate(&ctx, salt, saltlen);
|
H A D | p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 104 HMAC_Update(&hctx, salt, saltlen); 122 h__dump (salt, saltlen); 134 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 135 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 151 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 234 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 241 salt = kdf->salt->value.octet_string->data; 242 saltlen = kdf->salt 79 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/tools/ |
H A D | nsec3hash.c | 63 printf("Usage: %s salt algorithm iterations domain\n", program); 75 unsigned char salt[DNS_NSEC3_SALTSIZE]; local 87 salt[0] = 0; 89 isc_buffer_init(&buffer, salt, sizeof(salt)); 91 check_result(result, "isc_hex_decodestring(salt)"); 94 fatal("salt too long"); 111 length = isc_iterated_hash(hash, hash_alg, iterations, salt, 119 fprintf(stdout, "%.*s (salt=%s, hash=%u, iterations=%u)\n",
|
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-mitdb.c | 71 salt: 72 version2 = salt in key_data->key_data_contents[1] 73 else default salt. 119 Salt *salt = k->salt; local 120 /* fix salt type */ 121 switch((int)salt->type) { 123 salt->type = KRB5_PADATA_PW_SALT; 126 krb5_data_free(&salt->salt); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | pkcs5.c | 53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key. 57 * @param salt Salt 58 * @param salt_len Length of salt. 70 const void * salt, size_t salt_len, 76 salt, salt_len, 101 memcpy(data, salt, salt_len); 69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void *key) argument
|
H A D | test_pkcs12.c | 48 void *salt; member in struct:tests 116 t->salt, t->saltsize,
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 88 unsigned char *salt, int saltlen) 138 if (salt) memcpy (osalt->data, salt, saltlen); 144 /* Now include salt in kdf structure */ 145 kdf->salt->value.octet_string = osalt; 146 kdf->salt->type = V_ASN1_OCTET_STRING;
|
/macosx-10.10/CommonCrypto-60061/include/ |
H A D | CommonKeyDerivationSPI.h | 46 const void *salt, size_t saltLen, // for PBKDF
|