Searched refs:salt (Results 151 - 175 of 247) sorted by relevance

12345678910

/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/
H A Dopenbsd-compat.h230 char *xcrypt(const char *password, const char *salt);
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/
H A DcuCdsaUtils.h102 CSSM_DATA_PTR salt, // ditto
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/
H A DcuCdsaUtils.h102 CSSM_DATA_PTR salt, // ditto
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/include/
H A Dapr_crypto.h242 * @param salt The salt to use.
243 * @param saltLen The salt length in bytes
258 const unsigned char * salt, apr_size_t saltLen,
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/generic/
H A Dloadman.c94 extern char *md5_crypt(const char *key, const char *salt);
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/
H A Dregister_crypto.h67 unsigned long saltLen, const void *salt,
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Dauth.c112 static char *cups_crypt(const char *pw, const char *salt);
2301 const char *salt) /* I - Salt (key) string */
2303 if (!strncmp(salt, "$1$", 3))
2314 const char *salt_end; /* End of "salt" data for MD5 */
2323 * Get the salt data between dollar signs, e.g. $1$saltdata$md5.
2324 * Get a maximum of 8 characters of salt data after $1$...
2327 for (salt_end = salt + 3; *salt_end && (salt_end - salt) < 11; salt_end ++)
2339 _cupsMD5Append(&state, (unsigned char *)salt, salt_end - salt);
2300 cups_crypt(const char *pw, const char *salt) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/digest/
H A Dinit_sec_context.c40 heim_scram_data *salt,
67 ret = krb5_store_data(request, *salt);
37 calculate(void *ptr, heim_scram_method method, unsigned int iterations, heim_scram_data *salt, const heim_scram_data *c1, const heim_scram_data *s1, const heim_scram_data *c2noproof, heim_scram_data *proof, heim_scram_data *server, heim_scram_data *sessionKey) argument
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dget.c109 * return 0 iff `salt' actually is the same as the current salt in `k'
113 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument
115 if (salt->salttype != (size_t)k->key_data_type[1])
117 if (salt->saltvalue.length != (size_t)k->key_data_length[1])
119 return memcmp (salt->saltvalue.data, k->key_data_contents[1],
120 salt->saltvalue.length);
/macosx-10.9.5/screen-22/screen/
H A Dattacher.c810 char *pass, mypass[16 + 1], salt[3]; local
840 salt[0] = 'A' + (int)(time(0) % 26);
841 salt[1] = 'A' + (int)((time(0) >> 6) % 26);
842 salt[2] = 0;
843 pass = crypt(mypass, salt);
/macosx-10.9.5/vim-53/src/
H A Dblowfish.c407 * "salt[salt_len]" as the salt.
410 bf_key_init(password, salt, salt_len)
412 char_u *salt;
422 key = sha256_key(password, salt, salt_len);
424 key = sha256_key(key, salt, salt_len);
490 char_u salt[9]; member in struct:__anon14180
504 "salt",
537 bf_test_data[i].salt,
538 (int)STRLEN(bf_test_data[i].salt));
[all...]
/macosx-10.9.5/libtelnet-13/
H A Dsra.c441 char *xpasswd, *salt; local
455 salt = pw->pw_passwd;
456 xpasswd = crypt(cred, salt);
/macosx-10.9.5/Security-55471.14.18/include/security_asn1/
H A Dpkcs12Templates.c282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/Security-55471.14.18/include/securityd_client/
H A Dssblob.h126 uint8 salt[20]; // derivation salt member in class:Security::SecurityServer::DbBlob
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/Security/
H A Dpkcs12Templates.c282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/lib/
H A Dpkcs12Templates.c282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/security_asn1/
H A Dpkcs12Templates.c282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/Security-55471.14.18/libsecurityd/lib/
H A Dssblob.h126 uint8 salt[20]; // derivation salt member in class:Security::SecurityServer::DbBlob
/macosx-10.9.5/Security-55471.14.18/sec/Security/
H A Dp12import.c174 require_noerr(p12_pbe_gen(context->passphrase, pbep.salt.Data, pbep.salt.Length,
181 require_noerr(p12_pbe_gen(context->passphrase, pbep.salt.Data, pbep.salt.Length,
/macosx-10.9.5/bind9-45.100/bind9/bin/dnssec/
H A Ddnssec-signzone.c154 static unsigned char *salt = saltbuf; variable
658 const unsigned char *salt, size_t salt_length,
666 len = isc_iterated_hash(hash, hashalg, iterations, salt, salt_length,
748 const unsigned char *salt, size_t salt_length)
775 hashlist_add_dns_name(l, wild, hashalg, iterations, salt, salt_length,
2191 addnsec3param(const unsigned char *salt, size_t salt_length, argument
2213 DE_CONST(salt, nsec3param.salt);
2251 const unsigned char *salt, size_t salt_length,
2275 salt, salt_lengt
656 hashlist_add_dns_name(hashlist_t *l, dns_name_t *name, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, isc_boolean_t speculative) argument
746 addnowildcardhash(hashlist_t *l, dns_name_t *name, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length) argument
2250 addnsec3(dns_name_t *name, dns_dbnode_t *node, const unsigned char *salt, size_t salt_length, unsigned int iterations, hashlist_t *hashlist, dns_ttl_t ttl) argument
2316 nsec3clean(dns_name_t *name, dns_dbnode_t *node, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, hashlist_t *hashlist) argument
2509 nsec3ify(unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, hashlist_t *hashlist) argument
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/
H A DDES.xs20 #include "EXTERN.h" #include "perl.h" #include "XSUB.h" #include "des.h" #define deschar char static STRLEN len; static int not_here(s) char *s; { croak("%s not implemented on this architecture", s); return -1; } MODULE = DES PACKAGE = DES PREFIX = des_ char * des_crypt(buf,salt) char * buf char * salt void des_set_odd_parity(key) des_cblock * key PPCODE: { SV *s; s=sv_newmortal(); sv_setpvn( (…)
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dsshconnect2.c1090 pw_encrypt(const char *password, const char *crypt_scheme, const char *salt) argument
1097 return xstrdup(crypt(password, salt));
1105 const char *salt)
1116 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) {
1124 debug3("%s: salt = %s", __func__, salt);
1154 char *crypt_scheme, *salt; local
1165 salt = packet_get_string(NULL);
1176 pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt);
1178 bzero(salt, strle
1104 jpake_password_to_secret(Authctxt *authctxt, const char *crypt_scheme, const char *salt) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecWrappedKeys.cpp208 const CSSM_DATA &salt,
246 &salt,
327 unwrapParams.iv, /* salt = IV for these algs */
405 /* 8 bytes of random IV/salt */
417 saltIvData, // IV == salt for this wrapping alg
201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecWrappedKeys.cpp208 const CSSM_DATA &salt,
246 &salt,
327 unwrapParams.iv, /* salt = IV for these algs */
405 /* 8 bytes of random IV/salt */
417 saltIvData, // IV == salt for this wrapping alg
201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecWrappedKeys.cpp208 const CSSM_DATA &salt,
246 &salt,
327 unwrapParams.iv, /* salt = IV for these algs */
405 /* 8 bytes of random IV/salt */
417 saltIvData, // IV == salt for this wrapping alg
201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument

Completed in 218 milliseconds

12345678910