/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecKey.cpp | 1346 uint8_t *salt = NULL; local 1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) { 1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt); 1381 free(salt); 1388 free(salt); 1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) { 1419 #warning "Aren't we leaking salt and thePassword when this fail???" 1424 free(salt);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecKey.cpp | 1346 uint8_t *salt = NULL; local 1372 if((salt = (uint8_t *) malloc(saltLen)) == NULL) { 1377 CFDataGetBytes(saltDictValue, CFRangeMake(0, saltLen), (UInt8 *) salt); 1381 free(salt); 1388 free(salt); 1418 if(CCKeyDerivationPBKDF(kCCPBKDF2, thePassword, passwordLen, salt, saltLen, algorithm, rounds, derivedKey, derivedKeyLen)) { 1419 #warning "Aren't we leaking salt and thePassword when this fail???" 1424 free(salt);
|
/macosx-10.9.5/ruby-104/ruby/test/ruby/ |
H A D | test_m17n_comb.rb | 724 # glibc 2.16 or later denies salt contained other than [0-9A-Za-z./] #7312 731 combination(STRINGS, STRINGS) {|str, salt| 733 next unless salt.ascii_only? && /\A[0-9a-zA-Z.\/]+\z/ =~ salt 735 if a(salt).length < 2 736 assert_raise(ArgumentError) { str.crypt(salt) } 739 t = str.crypt(salt) 740 assert_equal(a(str).crypt(a(salt)), t, "#{encdump(str)}.crypt(#{encdump(salt)})")
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/netlogon/ |
H A D | crypto.c | 191 uint8_t *salt, 200 CCHmac(kCCHmacAlgMD5, tmpData, sizeof(tmpData), salt, saltLength, derivedKey); 190 _netlogon_derive_rc4_hmac_key(uint8_t key[16], uint8_t *salt, size_t saltLength, EVP_CIPHER_CTX *rc4Key, int enc) argument
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/ |
H A D | cuCdsaUtils.cpp | 424 CSSM_DATA_PTR salt, // ditto 445 salt, 417 cuCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | evp.h | 503 int EVP_BytesToKey(const EVP_CIPHER *type,EVP_MD *md,unsigned char *salt, 681 unsigned char *salt, int saltlen, int iter,
|
H A D | x509.h | 432 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 444 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st 1109 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen); 1111 unsigned char *salt, int saltlen);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/ |
H A D | cuCdsaUtils.cpp | 424 CSSM_DATA_PTR salt, // ditto 445 salt, 417 cuCspDeriveKey(CSSM_CSP_HANDLE cspHand, uint32 keyAlg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_DATA_PTR password, CSSM_DATA_PTR salt, uint32 iterationCnt, CSSM_KEY_PTR key) argument
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/crypto/ |
H A D | apr_crypto_nss.c | 380 * @param salt The salt to use. 381 * @param saltLen The salt length in bytes 395 const char *pass, apr_size_t passLen, const unsigned char * salt, 474 /* Turn the raw passphrase and salt into SECItems */ 477 saltItem.data = (unsigned char*) salt; 394 crypto_passphrase(apr_crypto_key_t **k, apr_size_t *ivSize, const char *pass, apr_size_t passLen, const unsigned char * salt, apr_size_t saltLen, const apr_crypto_block_key_type_e type, const apr_crypto_block_key_mode_e mode, const int doPad, const int iterations, const apr_crypto_t *f, apr_pool_t *p) argument
|
H A D | apr_md5.c | 504 APU_DECLARE(apr_status_t) apr_md5_encode(const char *pw, const char *salt, 508 * Minimum size is 8 bytes for salt, plus 1 for the trailing NUL, 521 * Refine the salt first. It's possible we were given an already-hashed 522 * string as the salt argument, so extract the actual salt value from it 523 * if so. Otherwise just use the string up to the first '$' as the salt. 525 sp = salt; 542 * Get the length of the true salt 565 * Then the raw salt 570 * Then just as many characters of the MD5(pw, salt, p [all...] |
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/ |
H A D | tc_nsstring_compat.rb | 420 salt = '.1/1' 421 assert_equal(s.crypt(salt), n.crypt(salt)) 422 assert_kind_of(NSString, n.crypt(salt))
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | passwd.c | 762 static int slapd_crypt( const char *key, const char *salt, char **hash ) argument 769 cr = crypt( key, salt ); 771 /* salt must have been invalid */ 779 rc = strcmp( salt, cr ) ? LUTIL_PASSWD_ERR : LUTIL_PASSWD_OK;
|
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/ |
H A D | ossl-evp.c | 1561 * @param salt salt salt string, should be an binary 8 byte buffer. 1573 const void *salt, 1612 if (salt) { 1613 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN); 1571 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/test/ |
H A D | testcrypto.c | 105 const char *salt = "salt"; local 114 (unsigned char *) salt, strlen(salt), type, mode, doPad, 4096, f,
|
/macosx-10.9.5/system_cmds-597.90.1/login.tproj/ |
H A D | login.c | 514 char* salt = pwd->pw_passwd; local 516 rval = strcmp(crypt(p, salt), salt);
|
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/login.tproj/ |
H A D | login.c | 514 char* salt = pwd->pw_passwd; local 516 rval = strcmp(crypt(p, salt), salt);
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/ |
H A D | AuthDBI.pm | 566 my ($salt, @passwds_to_check); 587 $salt = $Attr->{encryption_salt} eq 'userid' ? 589 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent 591 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt); 1453 selected from the database as salt. Setting this parameter to 'userid', 1454 the module uses the userid as salt.
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/ |
H A D | AuthDBI.pm | 567 my ($salt, @passwds_to_check); 588 $salt = $Attr->{encryption_salt} eq 'userid' ? 590 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent 592 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt); 1456 selected from the database as salt. Setting this parameter to 'userid', 1457 the module uses the userid as salt.
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | crypto.c | 2836 unsigned char *salt; local 2853 salt = p12params.salt.data; 2854 saltlen = p12params.salt.length; 2856 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, 2862 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | monitor.c | 2301 char *hash_scheme, *salt; local 2306 auth2_jpake_get_pwdata(authctxt, &pctx->s, &hash_scheme, &salt); 2311 buffer_put_cstring(m, salt); 2317 bzero(salt, strlen(salt)); 2319 xfree(salt);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/ |
H A D | hdb.c | 440 entry->entry.keys.val[0].salt = NULL;
|
/macosx-10.9.5/apr-30/apr-util/apr-util/crypto/ |
H A D | apr_md5.c | 500 APU_DECLARE(apr_status_t) apr_md5_encode(const char *pw, const char *salt, 504 * Minimum size is 8 bytes for salt, plus 1 for the trailing NUL, 517 * Refine the salt first. It's possible we were given an already-hashed 518 * string as the salt argument, so extract the actual salt value from it 519 * if so. Otherwise just use the string up to the first '$' as the salt. 521 sp = salt; 538 * Get the length of the true salt 561 * Then the raw salt 566 * Then just as many characters of the MD5(pw, salt, p [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/ |
H A D | db.c | 910 unsigned char *salt, size_t *salt_length) 918 salt, salt_length)); 907 dns_db_getnsec3parameters(dns_db_t *db, dns_dbversion_t *version, dns_hash_t *hash, isc_uint8_t *flags, isc_uint16_t *iterations, unsigned char *salt, size_t *salt_length) argument
|
/macosx-10.9.5/vim-53/src/ |
H A D | memline.c | 4884 char_u salt[50]; local 4906 vim_snprintf((char *)salt, sizeof(salt), "%s%ld", key, (long)offset); 4907 crypt_init_keys(salt); 4911 /* Using blowfish, add salt and seed. We use the byte offset of the 4912 * block for the salt. */ 4913 vim_snprintf((char *)salt, sizeof(salt), "%ld", (long)offset); 4914 bf_key_init(key, salt, (int)STRLEN(salt)); [all...] |
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | protocol.c | 2420 * salt: krb5_data 2436 krb5_data salt, c1, s1, c2noproof; local 2452 krb5_data_zero(&salt); 2473 ret = krb5_ret_data(request, &salt); 2489 ret = heim_scram_stored_key(method, c->u.password, iterations, &salt, 2530 krb5_data_free(&salt);
|