Searched refs:salt (Results 26 - 50 of 108) sorted by relevance

12345

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Dp5_crpt2.c80 const unsigned char *salt, int saltlen, int iter,
104 HMAC_Update(&hctx, salt, saltlen);
122 h__dump (salt, saltlen);
134 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
135 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
151 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
234 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
241 salt = kdf->salt->value.octet_string->data;
242 saltlen = kdf->salt
79 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
H A Devp_key.c111 const unsigned char *salt, const unsigned char *data, int datal,
134 if (salt != NULL)
135 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN);
110 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dkdf.c39 const void *salt, size_t saltlen,
51 && (!salt || saltlen != 8))
84 gcry_md_write (md, salt, saltlen);
89 gcry_md_write (md, salt, count);
92 gcry_md_write (md, salt, saltlen);
116 used in HMAC mode. SALT is a salt of length SALTLEN and ITERATIONS
121 const void *salt, size_t saltlen,
133 char *sbuf; /* Malloced buffer to concatenate salt and iter
141 if (!salt || !saltlen || !iterations || !dklen)
176 memcpy (sbuf, salt, saltle
37 openpgp_s2k(const void *passphrase, size_t passphraselen, int algo, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
119 pkdf2(const void *passphrase, size_t passphraselen, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
233 gcry_kdf_derive(const void *passphrase, size_t passphraselen, int algo, int subalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/loginutils/
H A Dpasswd.c17 char salt[sizeof("$N$XXXXXXXX")]; /* "$N$XXXXXXXX" or "XX" */ local
25 crypt_make_salt(salt, 1, 0); /* des */
27 strcpy(salt, "$1$");
28 crypt_make_salt(salt + 3, 4, 0);
31 ret = xstrdup(pw_encrypt(newp, salt));
48 char salt[sizeof("$N$XXXXXXXX")]; /* "$N$XXXXXXXX" or "XX" */ local
85 crypt_make_salt(salt, 1, 0); /* des */
87 strcpy(salt, "$1$");
88 crypt_make_salt(salt + 3, 4, 0);
91 ret = xstrdup(pw_encrypt(newp, salt));
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dp5_pbev2.c75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
88 unsigned char *salt, int saltlen)
138 if (salt) memcpy (osalt->data, salt, saltlen);
144 /* Now include salt in kdf structure */
145 kdf->salt->value.octet_string = osalt;
146 kdf->salt->type = V_ASN1_OCTET_STRING;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/asn1/
H A Dp5_pbev2.c75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
88 unsigned char *salt, int saltlen)
138 if (salt) memcpy (osalt->data, salt, saltlen);
144 /* Now include salt in kdf structure */
145 kdf->salt->value.octet_string = osalt;
146 kdf->salt->type = V_ASN1_OCTET_STRING;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/corby/
H A Dchannel.h32 #include <salt/salt.h>
33 #include <salt/socket.h>
121 sw_salt * salt,
H A Dobject.h32 #include <salt/salt.h>
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/discovery/
H A Dtext_record.h32 #include <salt/salt.h>
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/salt/
H A Daddress.h33 #include <salt/salt.h>
H A Dtime.h32 #include <salt/platform.h>
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs12/
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon1413
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
H A Dp12_add.c105 int passlen, unsigned char *salt, int saltlen, int iter,
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
158 unsigned char *salt, int saltlen, int iter,
172 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
157 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon1473
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Denc.c114 unsigned char salt[PKCS5_SALT_LEN]; local
188 else if (strcmp(*argv,"-salt") == 0)
469 * line, so we get no salt in that case. Is this a bug?
473 /* Salt handling: if encrypting generate a salt and
474 * write to output BIO. If decrypting read salt from
482 if(!set_hex(hsalt,salt,sizeof salt)) {
484 "invalid hex salt value\n");
487 } else if (RAND_pseudo_bytes(salt, sizeof salt) <
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/
H A Denc.c114 unsigned char salt[PKCS5_SALT_LEN]; local
189 else if (strcmp(*argv,"-salt") == 0)
469 * line, so we get no salt in that case. Is this a bug?
473 /* Salt handling: if encrypting generate a salt and
474 * write to output BIO. If decrypting read salt from
482 if(!set_hex(hsalt,salt,sizeof salt)) {
484 "invalid hex salt value\n");
487 } else if (RAND_pseudo_bytes(salt, sizeof salt) <
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/evp/
H A Devp_key.c111 const unsigned char *salt, const unsigned char *data, int datal,
133 if (salt != NULL)
134 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN);
110 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/
H A DMakefile120 include/discovery/text_record.h include/salt/socket.h \
121 include/salt/address.h include/salt/platform.h \
122 include/salt/signal.h include/salt/interface.h \
123 include/salt/salt.h include/salt/time.h include/salt/debug.h \
152 include/discovery/text_record.h include/salt/socke
[all...]
H A DMakefile.in120 include/discovery/text_record.h include/salt/socket.h \
121 include/salt/address.h include/salt/platform.h \
122 include/salt/signal.h include/salt/interface.h \
123 include/salt/salt.h include/salt/time.h include/salt/debug.h \
152 include/discovery/text_record.h include/salt/socke
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_add.c105 int passlen, unsigned char *salt, int saltlen, int iter,
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
162 unsigned char *salt, int saltlen, int iter,
176 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
161 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon2911
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon2982
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/
H A Dsmbldap-passwd270 my $salt = sprintf($crypt_salt_format,make_salt());
271 $hash_pass = "{CRYPT}" . crypt($clear_pass,$salt);
278 # Generate SMD5 hash (MD5 with salt)
279 my $salt = make_salt(4);
280 $hash_pass = "{SMD5}" . encode_base64( md5($clear_pass . $salt) . $salt,'');
287 # Generate SSHA hash (SHA1 with salt)
288 my $salt = make_salt(4);
289 $hash_pass = "{SSHA}" . encode_base64( sha1($clear_pass . $salt) . $salt,'' );
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/des/
H A Ddes_old.c188 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument
190 return DES_fcrypt(buf, salt, ret);
192 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument
194 return DES_crypt(buf, salt);
196 char *_ossl_old_crypt(const char *buf,const char *salt) argument
198 return DES_crypt(buf, salt);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/
H A Ddes_old.c188 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument
190 return DES_fcrypt(buf, salt, ret);
192 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument
194 return DES_crypt(buf, salt);
196 char *_ossl_old_crypt(const char *buf,const char *salt) argument
198 return DES_crypt(buf, salt);

Completed in 296 milliseconds

12345