/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509.h | 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st 1162 const unsigned char *salt, int saltlen); 1165 const unsigned char *salt, int saltlen); 1167 unsigned char *salt, int saltlen); 1169 unsigned char *salt, int saltlen, 1172 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | evp.c | 1328 * @param salt salt salt string, should be an binary 8 byte buffer. 1343 const void *salt, 1379 if (salt) 1380 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN); 1341 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/zkt/ |
H A D | misc.c | 998 ** generate a random hexstring of 'bits' salt and store it 1002 int gensalt (char *salt, size_t saltsize, int saltbits, unsigned int seed) argument 1005 int saltlen = 0; /* current length of salt in hex nibbles */ 1020 salt[i] = hexstr[hex]; 1022 salt[i] = '\0';
|
H A D | zkt-signer.c | 890 char salt[510+1]; /* salt has a maximum of 255 bytes == 510 hex nibbles */ local 905 /* static zones can use always a new salt (full zone signing) */ 908 { /* dynamic zones have to reuse the salt on signing */ 920 if ( gensalt (salt, sizeof (salt), conf->saltbits, seed) ) 921 snprintf (nsec3param, sizeof (nsec3param), "%s%s-3 %s ", update, optout, salt);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/tests/ |
H A D | dbversion_test.c | 577 unsigned char salt[DNS_NSEC3_SALTSIZE]; local 578 size_t salt_length = sizeof(salt); 587 &flags, &iterations, salt,
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/ |
H A D | passwd.c | 595 static int slapd_crypt( const char *key, const char *salt, char **hash ) argument 602 cr = crypt( key, salt ); 604 /* salt must have been invalid */ 612 rc = strcmp( salt, cr ) ? LUTIL_PASSWD_ERR : LUTIL_PASSWD_OK;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/dnssec/ |
H A D | dnssectool.c | 71 /* unsigned char salt[0]; */ 717 memcpy(cp, nsec3->salt, nsec3->salt_length); 757 memcmp(nsec3.salt, nsec3param->salt, 798 memcmp(nsec3.salt, nsec3param->salt, 830 memcmp(nsec3param.salt, nsec3->salt, 922 nsec3param.salt, nsec3param.salt_length);
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/ |
H A D | smbk5pwd.c | 318 krb5_salt salt; local 356 krb5_get_pw_salt( context, ent.principal, &salt ); 370 salt, &key ); 372 krb5_free_salt( context, salt );
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/netlogon/ |
H A D | crypto.c | 193 uint8_t *salt, 204 salt, saltLength, derivedKey, &len); local 192 _netlogon_derive_rc4_hmac_key(uint8_t key[16], uint8_t *salt, size_t saltLength, EVP_CIPHER_CTX *rc4Key, int enc) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/ |
H A D | db.h | 162 unsigned char *salt, 1436 unsigned char *salt, size_t *salt_length);
|
H A D | zone.h | 2024 unsigned char *salt, isc_boolean_t replace);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/include/dns/ |
H A D | rdatastruct.h | 1745 unsigned char *salt; member in struct:dns_rdata_nsec3 1861 unsigned char *salt; member in struct:dns_rdata_nsec3param
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | create.c | 329 /* 8-octet salt value */ 330 pgp_random(__UNCONST(&key->salt[0]), PGP_SALT_SIZE); 331 if (!pgp_write(output, key->salt, PGP_SALT_SIZE)) { 337 * \todo case PGP_S2KS_ITERATED_AND_SALTED: // 8-octet salt 396 hash.add(&hash, key->salt, PGP_SALT_SIZE); 418 * \todo case PGP_S2KS_ITERATED_AND_SALTED: * 8-octet salt 734 length += 1 + 8; /* hash algorithm + salt */ 738 length += 1 + 8 + 1; /* hash algorithm, salt +
|
H A D | packet.h | 539 uint8_t salt[PGP_SALT_SIZE]; member in struct:pgp_seckey_t
|
H A D | ssh2pgp.c | 404 hash.add(&hash, key->key.seckey.salt, PGP_SALT_SIZE);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/des/ |
H A D | des_old.h | 376 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret); 377 char *_ossl_old_des_crypt(const char *buf,const char *salt); 379 char *_ossl_old_crypt(const char *buf,const char *salt);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | s3_enc.c | 830 static const unsigned char *salt[3]={ local 850 EVP_DigestUpdate(&ctx,salt[i],strlen((const char *)salt[i]));
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | crypto.c | 2739 unsigned char *salt; local 2756 salt = p12params.salt.data; 2757 saltlen = p12params.salt.length; 2759 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, 2765 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | monitor.c | 2177 char *hash_scheme, *salt; local 2182 auth2_jpake_get_pwdata(authctxt, &pctx->s, &hash_scheme, &salt); 2187 buffer_put_cstring(m, salt); 2193 bzero(salt, strlen(salt)); 2195 xfree(salt);
|
H A D | monitor_wrap.c | 1265 char **hash_scheme, char **salt) 1280 *salt = buffer_get_string(&m, NULL); 1264 mm_auth2_jpake_get_pwdata(Authctxt *authctxt, BIGNUM **s, char **hash_scheme, char **salt) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | evp.h | 573 const unsigned char *salt, const unsigned char *data, 967 const unsigned char *salt, int saltlen, int iter, 970 const unsigned char *salt, int saltlen, int iter,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | hdb.c | 438 entry->entry.keys.val[0].salt = NULL;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/ |
H A D | db.c | 974 unsigned char *salt, size_t *salt_length) 982 salt, salt_length)); 971 dns_db_getnsec3parameters(dns_db_t *db, dns_dbversion_t *version, dns_hash_t *hash, isc_uint8_t *flags, isc_uint16_t *iterations, unsigned char *salt, size_t *salt_length) argument
|
H A D | zone.c | 575 unsigned char salt[255]; member in struct:dns_nsec3chain 591 * 'salt' is buffer space and is referenced via 'nsec3param.salt'. 2694 memcpy(nsec3chain->salt, nsec3param->salt, nsec3param->salt_length); 2695 nsec3chain->nsec3param.salt = nsec3chain->salt; 2735 sprintf(&saltbuf[i*2], "%02X", nsec3chain->salt[i]); 2748 && !memcmp(current->nsec3param.salt, nsec3param->salt, 14893 char salt[255*2+1]; local 16276 dns_zone_setnsec3param(dns_zone_t *zone, isc_uint8_t hash, isc_uint8_t flags, isc_uint8_t iter, isc_uint8_t saltlen, unsigned char *salt, isc_boolean_t replace) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | krb5.h | 668 krb5_salt /*salt*/, 679 krb5_salt /*salt*/, 699 krb5_data *salt; member in struct:_krb5_get_init_creds_opt
|