/macosx-10.9.5/SecurityTool-55115/ |
H A D | srCdsaUtils.cpp | 295 CSSM_DATA_PTR salt, // ditto 316 salt, 288 srCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/crypto/ |
H A D | apr_crypto.c | 328 * @param salt The salt to use. 329 * @param saltLen The salt length in bytes 344 const unsigned char * salt, apr_size_t saltLen, 349 return f->provider->passphrase(key, ivSize, pass, passLen, salt, saltLen,
|
H A D | apr_crypto_openssl.c | 343 * @param salt The salt to use. 344 * @param saltLen The salt length in bytes 358 const char *pass, apr_size_t passLen, const unsigned char * salt, 437 if (PKCS5_PBKDF2_HMAC_SHA1(pass, passLen, (unsigned char *) salt, saltLen, 357 crypto_passphrase(apr_crypto_key_t **k, apr_size_t *ivSize, const char *pass, apr_size_t passLen, const unsigned char * salt, apr_size_t saltLen, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad, const int iterations, const apr_crypto_t *f, apr_pool_t *p) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/akadmin/ |
H A D | HeimODAdmin.c | 1079 krb5_salt salt; 1081 krb5_get_pw_salt(context, princ, &salt); 1091 salt, 1095 /* Now set salt */ 1096 key.keys.val[key.keys.len].salt = calloc(1, sizeof(*key.keys.val[key.keys.len].salt)); 1097 if (key.keys.val[key.keys.len].salt == NULL) 1100 key.keys.val[key.keys.len].salt->type = salt.salttype; 1101 krb5_data_zero(&key.keys.val[key.keys.len].salt [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | evp.c | 1344 * @param salt salt salt string, should be an binary 8 byte buffer. 1359 const void *salt, 1395 if (salt) 1396 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN); 1357 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecRecoveryPassword.c | 124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible. 135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local 136 static const int saltLen = sizeof(salt); 181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
|
H A D | SecKey.cpp | 1346 uint8_t *salt = NULL; local 1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) { 1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt); 1381 free(salt); 1388 free(salt); 1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) { 1419 #warning "Aren't we leaking salt and thePassword when this fail???" 1424 free(salt);
|
/macosx-10.9.5/Security-55471.14.18/include/security_pkcs12/ |
H A D | pkcs12Utils.cpp | 475 /* we generate 8 random bytes of salt */ 479 CSSM_DATA &salt, 483 coder.allocItem(salt, P12_SALT_LEN); 484 rng.random(salt.Data, P12_SALT_LEN); 478 p12GenSalt( CSSM_DATA &salt, SecNssCoder &coder) argument
|
H A D | pkcs12Decode.cpp | 137 iterCount, pbep->salt, 264 iterCount, pbep.salt,
|
H A D | pkcs12Coder.h | 318 const CSSM_DATA &salt,
|
H A D | pkcs12Templates.cpp | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecRecoveryPassword.c | 124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible. 135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local 136 static const int saltLen = sizeof(salt); 181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecRecoveryPassword.c | 124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible. 135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local 136 static const int saltLen = sizeof(salt); 181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_pkcs12/lib/ |
H A D | pkcs12Utils.cpp | 475 /* we generate 8 random bytes of salt */ 479 CSSM_DATA &salt, 483 coder.allocItem(salt, P12_SALT_LEN); 484 rng.random(salt.Data, P12_SALT_LEN); 478 p12GenSalt( CSSM_DATA &salt, SecNssCoder &coder) argument
|
H A D | pkcs12Decode.cpp | 137 iterCount, pbep->salt, 264 iterCount, pbep.salt,
|
H A D | pkcs12Coder.h | 318 const CSSM_DATA &salt,
|
H A D | pkcs12Templates.cpp | 282 offsetof(NSS_P12_PBE_Params,salt) },
|
/macosx-10.9.5/bind9-45.100/bind9/contrib/zkt/ |
H A D | misc.c | 996 ** generate a random hexstring of 'bits' salt and store it 1000 int gensalt (char *salt, size_t saltsize, int saltbits, unsigned int seed) argument 1003 int saltlen = 0; /* current length of salt in hex nibbles */ 1018 salt[i] = hexstr[hex]; 1020 salt[i] = '\0';
|
H A D | zkt-signer.c | 888 char salt[510+1]; /* salt has a maximum of 255 bytes == 510 hex nibbles */ local 903 /* static zones can use always a new salt (full zone signing) */ 906 { /* dynamic zones have to reuse the salt on signing */ 918 if ( gensalt (salt, sizeof (salt), conf->saltbits, seed) ) 919 snprintf (nsec3param, sizeof (nsec3param), "%s%s-3 %s ", update, optout, salt);
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/tests/ |
H A D | dbversion_test.c | 575 unsigned char salt[DNS_NSEC3_SALTSIZE]; local 576 size_t salt_length = sizeof(salt); 585 &flags, &iterations, salt,
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/lib/ |
H A D | checkpw.c | 100 * <salt> \0 <secret> 102 * where <secret> = MD5(<salt>, "sasldb", <pass>) 104 static int _sasl_make_plain_secret(const char *salt, argument 109 unsigned sec_len = 16 + 1 + 16; /* salt + "\0" + hash */ 118 _sasl_MD5Update(&ctx, salt, 16); 121 memcpy((*secret)->data, salt, 16);
|
/macosx-10.9.5/ruby-104/ruby/ext/openssl/ |
H A D | ossl_cipher.c | 212 * oops. this code mistakes salt for IV. 284 * cipher.pkcs5_keyivgen(pass [, salt [, iterations [, digest]]] ) -> nil 295 * +salt+ must be an 8 byte string if provided. 308 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH], *salt = NULL; local 316 ossl_raise(eCipherError, "salt must be an 8-octet string"); 317 salt = (unsigned char *)RSTRING_PTR(vsalt); 322 EVP_BytesToKey(EVP_CIPHER_CTX_cipher(ctx), digest, salt, local
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/ |
H A D | db.h | 159 unsigned char *salt, 1392 unsigned char *salt, size_t *salt_length);
|
/macosx-10.9.5/objc4-551.1/runtime/ |
H A D | objc-sel-old.mm | 66 _objc_inform("BUILTIN SELECTORS: salt: 0x%llx", builtins->salt);
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/smbk5pwd/ |
H A D | smbk5pwd.c | 331 krb5_salt salt; local 369 krb5_get_pw_salt( context, ent.principal, &salt ); 383 salt, &key ); 385 krb5_free_salt( context, salt );
|