/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 78 const unsigned char *salt, int saltlen) 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 104 sstr = ASN1_STRING_data(pbe->salt); 105 if (salt) 106 memcpy(sstr, salt, saltlen); 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
H A D | p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 90 unsigned char *salt, int saltlen, 154 if (salt) memcpy (osalt->data, salt, saltlen); 160 /* Now include salt in kdf structure */ 161 kdf->salt->value.octet_string = osalt; 162 kdf->salt->type = V_ASN1_OCTET_STRING; 232 unsigned char *salt, int saltlen) 234 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_crpt.c | 74 unsigned char *salt; local 93 salt = pbe->salt->data; 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 129 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 135 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 152 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 167 p12->mac->salt->length = saltlen; 168 if (!(p12->mac->salt 128 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon1271 183 unsigned char *salt, int saltlen, int iter, 186 int passlen, unsigned char *salt, 192 unsigned char *salt, int saltlen, int iter, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
H A D | p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 169 unsigned char *salt, int saltlen, int iter, 188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument 168 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
|
H A D | p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 132 h__dump(salt, saltlen); 152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
H A D | p12_asn.c | 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
|
H A D | p12_npas.c | 222 *psaltlen = pbe->salt->length;
|
/barrelfish-2018-10-04/usr/skb/testapps/ |
H A D | aesevpexample.c | 28 char *salt = "1234"; local 42 PKCS5_PBKDF2_HMAC_SHA1(pass, strlen(pass), salt, strlen(salt), ic, 128, key_material); 43 printf("PKCS5_PBKDF2_HMAC_SHA1(\"%s\", \"%s\", %d)=\n", pass, salt, ic);
|
H A D | cryptotest.c | 19 * Create an 256 bit key and IV using the supplied key_data. salt can be added for taste. 22 static int aes_init(unsigned char *key_data, int key_data_len, unsigned char *salt, EVP_CIPHER_CTX *e_ctx, argument 33 i = EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha1(), salt, key_data, key_data_len, nrounds, key, iv); 124 /* 8 bytes to salt the key_data during key generation. This is an example of 125 compiled in salt. We just read the bit pattern created by these two 4 byte 126 integers on the stack as 64 bits of contigous salt material - 128 unsigned int salt[] = {12345, 54321}; local 144 if (aes_init(key_data, key_data_len, (unsigned char *)&salt, &en, &de)) {
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | fcrypt.c | 27 /* Added more values to handle illegal salt values the way normal 61 char *DES_crypt(const char *buf, const char *salt) argument 66 return(DES_fcrypt(buf,salt,buff)); 72 /* Copy at most 2 chars of salt */ 73 if ((e_salt[0] = salt[0]) != '\0') 74 e_salt[1] = salt[1]; 99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument 119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); 121 x=ret[1]=((salt[ [all...] |
H A D | des_old.c | 190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument 192 return DES_fcrypt(buf, salt, ret); 194 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument 196 return DES_crypt(buf, salt); 198 char *_ossl_old_crypt(const char *buf,const char *salt) argument 200 return DES_crypt(buf, salt);
|
H A D | des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
H A D | DES.xs | 20 des_crypt(buf,salt) 22 char * salt
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 114 HMAC_Update(&hctx, salt, saltlen); 134 h__dump (salt, saltlen); 143 const unsigned char *salt, int saltlen, int iter, 146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 154 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 155 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 171 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 268 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 275 salt 79 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 142 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | p5_crpt.c | 82 unsigned char *salt; local 101 salt = pbe->salt->data; 102 saltlen = pbe->salt->length; 110 EVP_DigestUpdate(&ctx, salt, saltlen);
|
H A D | evp_key.c | 116 const unsigned char *salt, const unsigned char *data, int datal, 139 if (salt != NULL) 140 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); 115 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
|
/barrelfish-2018-10-04/lib/libc/gen/ |
H A D | crypt.c | 67 des_cipher(const char *in, char *out, long salt __unused, int num_iter __unused)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_pss.c | 90 * -2 salt length is autorecovered from signature 179 unsigned char *H, *salt = NULL, *p; local 188 * -2 salt length is maximized 218 salt = OPENSSL_malloc(sLen); 219 if (!salt) 225 if (RAND_bytes(salt, sLen) <= 0) 235 EVP_DigestUpdate(&ctx, salt, sLen); 254 *p++ ^= salt[i]; 266 if (salt) 267 OPENSSL_free(salt); [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon239 183 unsigned char *salt, int saltlen, int iter, 186 int passlen, unsigned char *salt, 192 unsigned char *salt, int saltlen, int iter, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
H A D | des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | enc.c | 112 unsigned char salt[PKCS5_SALT_LEN]; local 199 else if (strcmp(*argv,"-salt") == 0) 306 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S"); 504 * line, so we get no salt in that case. Is this a bug? 508 /* Salt handling: if encrypting generate a salt and 509 * write to output BIO. If decrypting read salt from 517 if(!set_hex(hsalt,salt,sizeof salt)) { 519 "invalid hex salt value\n"); 522 } else if (RAND_pseudo_bytes(salt, sizeo [all...] |
H A D | passwd.c | 49 * -salt string - salt 66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local 105 else if (strcmp(argv[i], "-salt") == 0) 107 if ((argv[i+1] != NULL) && (salt == NULL)) 110 salt = argv[++i]; 180 BIO_printf(bio_err, "-salt string use provided salt\n"); 245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, 274 if (!do_passwd(passed_salt, &salt, 310 md5crypt(const char *passwd, const char *magic, const char *salt) argument [all...] |