Searched refs:salt (Results 176 - 200 of 247) sorted by relevance

12345678910

/macosx-10.9.5/SecurityTool-55115/
H A DsrCdsaUtils.cpp295 CSSM_DATA_PTR salt, // ditto
316 salt,
288 srCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/crypto/
H A Dapr_crypto.c328 * @param salt The salt to use.
329 * @param saltLen The salt length in bytes
344 const unsigned char * salt, apr_size_t saltLen,
349 return f->provider->passphrase(key, ivSize, pass, passLen, salt, saltLen,
H A Dapr_crypto_openssl.c343 * @param salt The salt to use.
344 * @param saltLen The salt length in bytes
358 const char *pass, apr_size_t passLen, const unsigned char * salt,
437 if (PKCS5_PBKDF2_HMAC_SHA1(pass, passLen, (unsigned char *) salt, saltLen,
357 crypto_passphrase(apr_crypto_key_t **k, apr_size_t *ivSize, const char *pass, apr_size_t passLen, const unsigned char * salt, apr_size_t saltLen, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad, const int iterations, const apr_crypto_t *f, apr_pool_t *p) argument
/macosx-10.9.5/Heimdal-323.92.1/lib/akadmin/
H A DHeimODAdmin.c1079 krb5_salt salt;
1081 krb5_get_pw_salt(context, princ, &salt);
1091 salt,
1095 /* Now set salt */
1096 key.keys.val[key.keys.len].salt = calloc(1, sizeof(*key.keys.val[key.keys.len].salt));
1097 if (key.keys.val[key.keys.len].salt == NULL)
1100 key.keys.val[key.keys.len].salt->type = salt.salttype;
1101 krb5_data_zero(&key.keys.val[key.keys.len].salt
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Devp.c1344 * @param salt salt salt string, should be an binary 8 byte buffer.
1359 const void *salt,
1395 if (salt)
1396 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN);
1357 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecRecoveryPassword.c124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible.
135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local
136 static const int saltLen = sizeof(salt);
181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
H A DSecKey.cpp1346 uint8_t *salt = NULL; local
1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) {
1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt);
1381 free(salt);
1388 free(salt);
1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) {
1419 #warning "Aren't we leaking salt and thePassword when this fail???"
1424 free(salt);
/macosx-10.9.5/Security-55471.14.18/include/security_pkcs12/
H A Dpkcs12Utils.cpp475 /* we generate 8 random bytes of salt */
479 CSSM_DATA &salt,
483 coder.allocItem(salt, P12_SALT_LEN);
484 rng.random(salt.Data, P12_SALT_LEN);
478 p12GenSalt( CSSM_DATA &salt, SecNssCoder &coder) argument
H A Dpkcs12Decode.cpp137 iterCount, pbep->salt,
264 iterCount, pbep.salt,
H A Dpkcs12Coder.h318 const CSSM_DATA &salt,
H A Dpkcs12Templates.cpp282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecRecoveryPassword.c124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible.
135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local
136 static const int saltLen = sizeof(salt);
181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecRecoveryPassword.c124 * Todo: For version 2 it would be better to randomly generate the salt and make the iteration count flexible.
135 static const uint8_t salt[16] = { 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F, 0x0A, 0x1F }; local
136 static const int saltLen = sizeof(salt);
181 if (CCKeyDerivationPBKDF(kCCPBKDF2, concatenatedAnswers, strlen(concatenatedAnswers), salt, saltLen, kCCPRFHmacAlgSHA256, PBKDF_ROUNDS, rawKeyData, RETURN_KEY_SIZE)) {
/macosx-10.9.5/Security-55471.14.18/libsecurity_pkcs12/lib/
H A Dpkcs12Utils.cpp475 /* we generate 8 random bytes of salt */
479 CSSM_DATA &salt,
483 coder.allocItem(salt, P12_SALT_LEN);
484 rng.random(salt.Data, P12_SALT_LEN);
478 p12GenSalt( CSSM_DATA &salt, SecNssCoder &coder) argument
H A Dpkcs12Decode.cpp137 iterCount, pbep->salt,
264 iterCount, pbep.salt,
H A Dpkcs12Coder.h318 const CSSM_DATA &salt,
H A Dpkcs12Templates.cpp282 offsetof(NSS_P12_PBE_Params,salt) },
/macosx-10.9.5/bind9-45.100/bind9/contrib/zkt/
H A Dmisc.c996 ** generate a random hexstring of 'bits' salt and store it
1000 int gensalt (char *salt, size_t saltsize, int saltbits, unsigned int seed) argument
1003 int saltlen = 0; /* current length of salt in hex nibbles */
1018 salt[i] = hexstr[hex];
1020 salt[i] = '\0';
H A Dzkt-signer.c888 char salt[510+1]; /* salt has a maximum of 255 bytes == 510 hex nibbles */ local
903 /* static zones can use always a new salt (full zone signing) */
906 { /* dynamic zones have to reuse the salt on signing */
918 if ( gensalt (salt, sizeof (salt), conf->saltbits, seed) )
919 snprintf (nsec3param, sizeof (nsec3param), "%s%s-3 %s ", update, optout, salt);
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/tests/
H A Ddbversion_test.c575 unsigned char salt[DNS_NSEC3_SALTSIZE]; local
576 size_t salt_length = sizeof(salt);
585 &flags, &iterations, salt,
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/lib/
H A Dcheckpw.c100 * <salt> \0 <secret>
102 * where <secret> = MD5(<salt>, "sasldb", <pass>)
104 static int _sasl_make_plain_secret(const char *salt, argument
109 unsigned sec_len = 16 + 1 + 16; /* salt + "\0" + hash */
118 _sasl_MD5Update(&ctx, salt, 16);
121 memcpy((*secret)->data, salt, 16);
/macosx-10.9.5/ruby-104/ruby/ext/openssl/
H A Dossl_cipher.c212 * oops. this code mistakes salt for IV.
284 * cipher.pkcs5_keyivgen(pass [, salt [, iterations [, digest]]] ) -> nil
295 * +salt+ must be an 8 byte string if provided.
308 unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH], *salt = NULL; local
316 ossl_raise(eCipherError, "salt must be an 8-octet string");
317 salt = (unsigned char *)RSTRING_PTR(vsalt);
322 EVP_BytesToKey(EVP_CIPHER_CTX_cipher(ctx), digest, salt, local
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/
H A Ddb.h159 unsigned char *salt,
1392 unsigned char *salt, size_t *salt_length);
/macosx-10.9.5/objc4-551.1/runtime/
H A Dobjc-sel-old.mm66 _objc_inform("BUILTIN SELECTORS: salt: 0x%llx", builtins->salt);
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/smbk5pwd/
H A Dsmbk5pwd.c331 krb5_salt salt; local
369 krb5_get_pw_salt( context, ent.principal, &salt );
383 salt, &key );
385 krb5_free_salt( context, salt );

Completed in 193 milliseconds

12345678910