/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/ |
H A D | openbsd-compat.h | 230 char *xcrypt(const char *password, const char *salt);
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/ |
H A D | cuCdsaUtils.h | 102 CSSM_DATA_PTR salt, // ditto
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/ |
H A D | cuCdsaUtils.h | 102 CSSM_DATA_PTR salt, // ditto
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/include/ |
H A D | apr_crypto.h | 242 * @param salt The salt to use. 243 * @param saltLen The salt length in bytes 258 const unsigned char * salt, apr_size_t saltLen,
|
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/generic/ |
H A D | loadman.c | 94 extern char *md5_crypt(const char *key, const char *salt);
|
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/ |
H A D | register_crypto.h | 67 unsigned long saltLen, const void *salt,
|
/macosx-10.9.5/cups-372.4/cups/scheduler/ |
H A D | auth.c | 112 static char *cups_crypt(const char *pw, const char *salt); 2301 const char *salt) /* I - Salt (key) string */ 2303 if (!strncmp(salt, "$1$", 3)) 2314 const char *salt_end; /* End of "salt" data for MD5 */ 2323 * Get the salt data between dollar signs, e.g. $1$saltdata$md5. 2324 * Get a maximum of 8 characters of salt data after $1$... 2327 for (salt_end = salt + 3; *salt_end && (salt_end - salt) < 11; salt_end ++) 2339 _cupsMD5Append(&state, (unsigned char *)salt, salt_end - salt); 2300 cups_crypt(const char *pw, const char *salt) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/digest/ |
H A D | init_sec_context.c | 40 heim_scram_data *salt, 67 ret = krb5_store_data(request, *salt); 37 calculate(void *ptr, heim_scram_method method, unsigned int iterations, heim_scram_data *salt, const heim_scram_data *c1, const heim_scram_data *s1, const heim_scram_data *c2noproof, heim_scram_data *proof, heim_scram_data *server, heim_scram_data *sessionKey) argument
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | get.c | 109 * return 0 iff `salt' actually is the same as the current salt in `k' 113 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument 115 if (salt->salttype != (size_t)k->key_data_type[1]) 117 if (salt->saltvalue.length != (size_t)k->key_data_length[1]) 119 return memcmp (salt->saltvalue.data, k->key_data_contents[1], 120 salt->saltvalue.length);
|
/macosx-10.9.5/screen-22/screen/ |
H A D | attacher.c | 810 char *pass, mypass[16 + 1], salt[3]; local 840 salt[0] = 'A' + (int)(time(0) % 26); 841 salt[1] = 'A' + (int)((time(0) >> 6) % 26); 842 salt[2] = 0; 843 pass = crypt(mypass, salt);
|
/macosx-10.9.5/vim-53/src/ |
H A D | blowfish.c | 407 * "salt[salt_len]" as the salt. 410 bf_key_init(password, salt, salt_len) 412 char_u *salt; 422 key = sha256_key(password, salt, salt_len); 424 key = sha256_key(key, salt, salt_len); 490 char_u salt[9]; member in struct:__anon14180 504 "salt", 537 bf_test_data[i].salt, 538 (int)STRLEN(bf_test_data[i].salt)); [all...] |
/macosx-10.9.5/libtelnet-13/ |
H A D | sra.c | 441 char *xpasswd, *salt; local 455 salt = pw->pw_passwd; 456 xpasswd = crypt(cred, salt);
|
/macosx-10.9.5/Security-55471.14.18/include/security_asn1/ |
H A D | pkcs12Templates.c | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/Security-55471.14.18/include/securityd_client/ |
H A D | ssblob.h | 126 uint8 salt[20]; // derivation salt member in class:Security::SecurityServer::DbBlob
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/Security/ |
H A D | pkcs12Templates.c | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/lib/ |
H A D | pkcs12Templates.c | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/security_asn1/ |
H A D | pkcs12Templates.c | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/Security-55471.14.18/libsecurityd/lib/ |
H A D | ssblob.h | 126 uint8 salt[20]; // derivation salt member in class:Security::SecurityServer::DbBlob
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | p12import.c | 174 require_noerr(p12_pbe_gen(context->passphrase, pbep.salt.Data, pbep.salt.Length, 181 require_noerr(p12_pbe_gen(context->passphrase, pbep.salt.Data, pbep.salt.Length,
|
/macosx-10.9.5/bind9-45.100/bind9/bin/dnssec/ |
H A D | dnssec-signzone.c | 154 static unsigned char *salt = saltbuf; variable 658 const unsigned char *salt, size_t salt_length, 666 len = isc_iterated_hash(hash, hashalg, iterations, salt, salt_length, 748 const unsigned char *salt, size_t salt_length) 775 hashlist_add_dns_name(l, wild, hashalg, iterations, salt, salt_length, 2191 addnsec3param(const unsigned char *salt, size_t salt_length, argument 2213 DE_CONST(salt, nsec3param.salt); 2251 const unsigned char *salt, size_t salt_length, 2275 salt, salt_lengt 656 hashlist_add_dns_name(hashlist_t *l, dns_name_t *name, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, isc_boolean_t speculative) argument 746 addnowildcardhash(hashlist_t *l, dns_name_t *name, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length) argument 2250 addnsec3(dns_name_t *name, dns_dbnode_t *node, const unsigned char *salt, size_t salt_length, unsigned int iterations, hashlist_t *hashlist, dns_ttl_t ttl) argument 2316 nsec3clean(dns_name_t *name, dns_dbnode_t *node, unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, hashlist_t *hashlist) argument 2509 nsec3ify(unsigned int hashalg, unsigned int iterations, const unsigned char *salt, size_t salt_length, hashlist_t *hashlist) argument [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/ |
H A D | DES.xs | 20 #include "EXTERN.h"
#include "perl.h"
#include "XSUB.h"
#include "des.h"
#define deschar char
static STRLEN len;
static int
not_here(s)
char *s;
{
croak("%s not implemented on this architecture", s);
return -1;
}
MODULE = DES PACKAGE = DES PREFIX = des_
char *
des_crypt(buf,salt)
char * buf
char * salt
void
des_set_odd_parity(key)
des_cblock * key
PPCODE:
{
SV *s;
s=sv_newmortal();
sv_setpvn( (…)
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | sshconnect2.c | 1090 pw_encrypt(const char *password, const char *crypt_scheme, const char *salt) argument 1097 return xstrdup(crypt(password, salt)); 1105 const char *salt) 1116 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) { 1124 debug3("%s: salt = %s", __func__, salt); 1154 char *crypt_scheme, *salt; local 1165 salt = packet_get_string(NULL); 1176 pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt); 1178 bzero(salt, strle 1104 jpake_password_to_secret(Authctxt *authctxt, const char *crypt_scheme, const char *salt) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecWrappedKeys.cpp | 208 const CSSM_DATA &salt, 246 &salt, 327 unwrapParams.iv, /* salt = IV for these algs */ 405 /* 8 bytes of random IV/salt */ 417 saltIvData, // IV == salt for this wrapping alg 201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecWrappedKeys.cpp | 208 const CSSM_DATA &salt, 246 &salt, 327 unwrapParams.iv, /* salt = IV for these algs */ 405 /* 8 bytes of random IV/salt */ 417 saltIvData, // IV == salt for this wrapping alg 201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecWrappedKeys.cpp | 208 const CSSM_DATA &salt, 246 &salt, 327 unwrapParams.iv, /* salt = IV for these algs */ 405 /* 8 bytes of random IV/salt */ 417 saltIvData, // IV == salt for this wrapping alg 201 deriveKeyOpensslWrap( const SecKeyImportExportParameters *keyParams, CSSM_CSP_HANDLE cspHand, impExpVerifyPhrase vp, CSSM_ALGORITHMS pbeAlg, CSSM_ALGORITHMS keyAlg, uint32 keySizeInBits, const CSSM_DATA &salt, CSSM_KEY_PTR derivedKey) argument
|