Searched refs:salt (Results 201 - 225 of 247) sorted by relevance

12345678910

/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecKey.cpp1346 uint8_t *salt = NULL; local
1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) {
1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt);
1381 free(salt);
1388 free(salt);
1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) {
1419 #warning "Aren't we leaking salt and thePassword when this fail???"
1424 free(salt);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecKey.cpp1346 uint8_t *salt = NULL; local
1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) {
1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt);
1381 free(salt);
1388 free(salt);
1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) {
1419 #warning "Aren't we leaking salt and thePassword when this fail???"
1424 free(salt);
/macosx-10.9.5/ruby-104/ruby/test/ruby/
H A Dtest_m17n_comb.rb724 # glibc 2.16 or later denies salt contained other than [0-9A-Za-z./] #7312
731 combination(STRINGS, STRINGS) {|str, salt|
733 next unless salt.ascii_only? && /\A[0-9a-zA-Z.\/]+\z/ =~ salt
735 if a(salt).length < 2
736 assert_raise(ArgumentError) { str.crypt(salt) }
739 t = str.crypt(salt)
740 assert_equal(a(str).crypt(a(salt)), t, "#{encdump(str)}.crypt(#{encdump(salt)})")
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/netlogon/
H A Dcrypto.c191 uint8_t *salt,
200 CCHmac(kCCHmacAlgMD5, tmpData, sizeof(tmpData), salt, saltLength, derivedKey);
190 _netlogon_derive_rc4_hmac_key(uint8_t key[16], uint8_t *salt, size_t saltLength, EVP_CIPHER_CTX *rc4Key, int enc) argument
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/
H A DcuCdsaUtils.cpp424 CSSM_DATA_PTR salt, // ditto
445 salt,
417 cuCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/open_ssl/openssl/
H A Devp.h503 int EVP_BytesToKey(const EVP_CIPHER *type,EVP_MD *md,unsigned char *salt,
681 unsigned char *salt, int saltlen, int iter,
H A Dx509.h432 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
444 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
1109 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen);
1111 unsigned char *salt, int saltlen);
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/
H A DcuCdsaUtils.cpp424 CSSM_DATA_PTR salt, // ditto
445 salt,
417 cuCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/crypto/
H A Dapr_crypto_nss.c380 * @param salt The salt to use.
381 * @param saltLen The salt length in bytes
395 const char *pass, apr_size_t passLen, const unsigned char * salt,
474 /* Turn the raw passphrase and salt into SECItems */
477 saltItem.data = (unsigned char*) salt;
394 crypto_passphrase(apr_crypto_key_t **k, apr_size_t *ivSize, const char *pass, apr_size_t passLen, const unsigned char * salt, apr_size_t saltLen, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad, const int iterations, const apr_crypto_t *f, apr_pool_t *p) argument
H A Dapr_md5.c504 APU_DECLARE(apr_status_t) apr_md5_encode(const char *pw, const char *salt,
508 * Minimum size is 8 bytes for salt, plus 1 for the trailing NUL,
521 * Refine the salt first. It's possible we were given an already-hashed
522 * string as the salt argument, so extract the actual salt value from it
523 * if so. Otherwise just use the string up to the first '$' as the salt.
525 sp = salt;
542 * Get the length of the true salt
565 * Then the raw salt
570 * Then just as many characters of the MD5(pw, salt, p
[all...]
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/
H A Dtc_nsstring_compat.rb420 salt = '.1/1'
421 assert_equal(s.crypt(salt), n.crypt(salt))
422 assert_kind_of(NSString, n.crypt(salt))
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/
H A Dpasswd.c762 static int slapd_crypt( const char *key, const char *salt, char **hash ) argument
769 cr = crypt( key, salt );
771 /* salt must have been invalid */
779 rc = strcmp( salt, cr ) ? LUTIL_PASSWD_ERR : LUTIL_PASSWD_OK;
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/
H A Dossl-evp.c1561 * @param salt salt salt string, should be an binary 8 byte buffer.
1573 const void *salt,
1612 if (salt) {
1613 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN);
1571 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/test/
H A Dtestcrypto.c105 const char *salt = "salt"; local
114 (unsigned char *) salt, strlen(salt), type, mode, doPad, 4096, f,
/macosx-10.9.5/system_cmds-597.90.1/login.tproj/
H A Dlogin.c514 char* salt = pwd->pw_passwd; local
516 rval = strcmp(crypt(p, salt), salt);
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/login.tproj/
H A Dlogin.c514 char* salt = pwd->pw_passwd; local
516 rval = strcmp(crypt(p, salt), salt);
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/
H A DAuthDBI.pm566 my ($salt, @passwds_to_check);
587 $salt = $Attr->{encryption_salt} eq 'userid' ?
589 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent
591 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt);
1453 selected from the database as salt. Setting this parameter to 'userid',
1454 the module uses the userid as salt.
/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/
H A DAuthDBI.pm567 my ($salt, @passwds_to_check);
588 $salt = $Attr->{encryption_salt} eq 'userid' ?
590 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent
592 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt);
1456 selected from the database as salt. Setting this parameter to 'userid',
1457 the module uses the userid as salt.
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dcrypto.c2836 unsigned char *salt; local
2853 salt = p12params.salt.data;
2854 saltlen = p12params.salt.length;
2856 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2862 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dmonitor.c2301 char *hash_scheme, *salt; local
2306 auth2_jpake_get_pwdata(authctxt, &pctx->s, &hash_scheme, &salt);
2311 buffer_put_cstring(m, salt);
2317 bzero(salt, strlen(salt));
2319 xfree(salt);
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/
H A Dhdb.c440 entry->entry.keys.val[0].salt = NULL;
/macosx-10.9.5/apr-30/apr-util/apr-util/crypto/
H A Dapr_md5.c500 APU_DECLARE(apr_status_t) apr_md5_encode(const char *pw, const char *salt,
504 * Minimum size is 8 bytes for salt, plus 1 for the trailing NUL,
517 * Refine the salt first. It's possible we were given an already-hashed
518 * string as the salt argument, so extract the actual salt value from it
519 * if so. Otherwise just use the string up to the first '$' as the salt.
521 sp = salt;
538 * Get the length of the true salt
561 * Then the raw salt
566 * Then just as many characters of the MD5(pw, salt, p
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/
H A Ddb.c910 unsigned char *salt, size_t *salt_length)
918 salt, salt_length));
907 dns_db_getnsec3parameters(dns_db_t *db, dns_dbversion_t *version, dns_hash_t *hash, isc_uint8_t *flags, isc_uint16_t *iterations, unsigned char *salt, size_t *salt_length) argument
/macosx-10.9.5/vim-53/src/
H A Dmemline.c4884 char_u salt[50]; local
4906 vim_snprintf((char *)salt, sizeof(salt), "%s%ld", key, (long)offset);
4907 crypt_init_keys(salt);
4911 /* Using blowfish, add salt and seed. We use the byte offset of the
4912 * block for the salt. */
4913 vim_snprintf((char *)salt, sizeof(salt), "%ld", (long)offset);
4914 bf_key_init(key, salt, (int)STRLEN(salt));
[all...]
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dprotocol.c2420 * salt: krb5_data
2436 krb5_data salt, c1, s1, c2noproof; local
2452 krb5_data_zero(&salt);
2473 ret = krb5_ret_data(request, &salt);
2489 ret = heim_scram_stored_key(method, c->u.password, iterations, &salt,
2530 krb5_data_free(&salt);

Completed in 219 milliseconds

12345678910