Searched refs:salt (Results 1 - 25 of 35) sorted by relevance

12

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
H A Dp5_pbev2.c75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
90 unsigned char *salt, int saltlen,
154 if (salt) memcpy (osalt->data, salt, saltlen);
160 /* Now include salt in kdf structure */
161 kdf->salt->value.octet_string = osalt;
162 kdf->salt->type = V_ASN1_OCTET_STRING;
232 unsigned char *salt, int saltlen)
234 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs12/
H A Dp12_crpt.c74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
129 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
135 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
152 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
167 p12->mac->salt->length = saltlen;
168 if (!(p12->mac->salt
128 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon1271
183 unsigned char *salt, int saltlen, int iter,
186 int passlen, unsigned char *salt,
192 unsigned char *salt, int saltlen, int iter,
218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
229 unsigned char *salt, int saltlen, int iter,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
H A Dp12_add.c105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
168 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
H A Dp12_key.c77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
132 h__dump(salt, saltlen);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
H A Dp12_asn.c76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
H A Dp12_npas.c222 *psaltlen = pbe->salt->length;
/barrelfish-2018-10-04/usr/skb/testapps/
H A Daesevpexample.c28 char *salt = "1234"; local
42 PKCS5_PBKDF2_HMAC_SHA1(pass, strlen(pass), salt, strlen(salt), ic, 128, key_material);
43 printf("PKCS5_PBKDF2_HMAC_SHA1(\"%s\", \"%s\", %d)=\n", pass, salt, ic);
H A Dcryptotest.c19 * Create an 256 bit key and IV using the supplied key_data. salt can be added for taste.
22 static int aes_init(unsigned char *key_data, int key_data_len, unsigned char *salt, EVP_CIPHER_CTX *e_ctx, argument
33 i = EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha1(), salt, key_data, key_data_len, nrounds, key, iv);
124 /* 8 bytes to salt the key_data during key generation. This is an example of
125 compiled in salt. We just read the bit pattern created by these two 4 byte
126 integers on the stack as 64 bits of contigous salt material -
128 unsigned int salt[] = {12345, 54321}; local
144 if (aes_init(key_data, key_data_len, (unsigned char *)&salt, &en, &de)) {
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/
H A Dfcrypt.c27 /* Added more values to handle illegal salt values the way normal
61 char *DES_crypt(const char *buf, const char *salt) argument
66 return(DES_fcrypt(buf,salt,buff));
72 /* Copy at most 2 chars of salt */
73 if ((e_salt[0] = salt[0]) != '\0')
74 e_salt[1] = salt[1];
99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument
119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]);
121 x=ret[1]=((salt[
[all...]
H A Ddes_old.c190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument
192 return DES_fcrypt(buf, salt, ret);
194 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument
196 return DES_crypt(buf, salt);
198 char *_ossl_old_crypt(const char *buf,const char *salt) argument
200 return DES_crypt(buf, salt);
H A Ddes.h207 char *DES_fcrypt(const char *buf,const char *salt, char *ret);
208 char *DES_crypt(const char *buf,const char *salt);
H A DDES.xs20 des_crypt(buf,salt)
22 char * salt
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/
H A Dp5_crpt2.c80 const unsigned char *salt, int saltlen, int iter,
114 HMAC_Update(&hctx, salt, saltlen);
134 h__dump (salt, saltlen);
143 const unsigned char *salt, int saltlen, int iter,
146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
154 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
155 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
171 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
268 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
275 salt
79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
142 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]
H A Dp5_crpt.c82 unsigned char *salt; local
101 salt = pbe->salt->data;
102 saltlen = pbe->salt->length;
110 EVP_DigestUpdate(&ctx, salt, saltlen);
H A Devp_key.c116 const unsigned char *salt, const unsigned char *data, int datal,
139 if (salt != NULL)
140 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN);
115 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
/barrelfish-2018-10-04/lib/libc/gen/
H A Dcrypt.c67 des_cipher(const char *in, char *out, long salt __unused, int num_iter __unused)
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa_pss.c90 * -2 salt length is autorecovered from signature
179 unsigned char *H, *salt = NULL, *p; local
188 * -2 salt length is maximized
218 salt = OPENSSL_malloc(sLen);
219 if (!salt)
225 if (RAND_bytes(salt, sLen) <= 0)
235 EVP_DigestUpdate(&ctx, salt, sLen);
254 *p++ ^= salt[i];
266 if (salt)
267 OPENSSL_free(salt);
[all...]
/barrelfish-2018-10-04/include/openssl/
H A Dpkcs12.h101 ASN1_OCTET_STRING *salt; member in struct:__anon239
183 unsigned char *salt, int saltlen, int iter,
186 int passlen, unsigned char *salt,
192 unsigned char *salt, int saltlen, int iter,
218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
229 unsigned char *salt, int saltlen, int iter,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
H A Ddes.h207 char *DES_fcrypt(const char *buf,const char *salt, char *ret);
208 char *DES_crypt(const char *buf,const char *salt);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/
H A Denc.c112 unsigned char salt[PKCS5_SALT_LEN]; local
199 else if (strcmp(*argv,"-salt") == 0)
306 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
504 * line, so we get no salt in that case. Is this a bug?
508 /* Salt handling: if encrypting generate a salt and
509 * write to output BIO. If decrypting read salt from
517 if(!set_hex(hsalt,salt,sizeof salt)) {
519 "invalid hex salt value\n");
522 } else if (RAND_pseudo_bytes(salt, sizeo
[all...]
H A Dpasswd.c49 * -salt string - salt
66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local
105 else if (strcmp(argv[i], "-salt") == 0)
107 if ((argv[i+1] != NULL) && (salt == NULL))
110 salt = argv[++i];
180 BIO_printf(bio_err, "-salt string use provided salt\n");
245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
274 if (!do_passwd(passed_salt, &salt,
310 md5crypt(const char *passwd, const char *magic, const char *salt) argument
[all...]

Completed in 246 milliseconds

12