/freebsd-10.0-release/lib/libcrypt/ |
H A D | crypt-sha256.c | 69 size_t salt_len, key_len, cnt, rounds; local 99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); 111 SHA256_Update(&ctx, salt, salt_len); 121 SHA256_Update(&alt_ctx, salt, salt_len); 168 SHA256_Update(&alt_ctx, salt, salt_len); 174 cp = s_bytes = alloca(salt_len); 175 for (cnt = salt_len; cnt >= 32; cnt -= 32) { 195 SHA256_Update(&ctx, s_bytes, salt_len); 224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len)); 225 buflen -= MIN((size_t)MAX(0, buflen), salt_len); [all...] |
H A D | crypt-sha512.c | 69 size_t salt_len, key_len, cnt, rounds; local 99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); 111 SHA512_Update(&ctx, salt, salt_len); 121 SHA512_Update(&alt_ctx, salt, salt_len); 168 SHA512_Update(&alt_ctx, salt, salt_len); 174 cp = s_bytes = alloca(salt_len); 175 for (cnt = salt_len; cnt >= 64; cnt -= 64) { 195 SHA512_Update(&ctx, s_bytes, salt_len); 224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len)); 225 buflen -= MIN((size_t)MAX(0, buflen), salt_len); [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-jpake.c | 277 u_int secret_len, salt_len; local 293 salt_len = 3 + 2 + 1 + 22 + 1; 294 *salt = xmalloc(salt_len); 295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 303 salt_len = 4 + 2 + 1 + 22 + 1; 304 *salt = xmalloc(salt_len); 305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 315 salt_len = (cp - authctxt->pw->pw_passwd) + 1; 316 *salt = xmalloc(salt_len); 318 salt_len); [all...] |
H A D | hostfile.c | 67 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument 98 ret = __b64_pton(b64salt, salt, salt_len);
|
/freebsd-10.0-release/contrib/apr-util/include/ |
H A D | apr_md5.h | 147 * @param salt_len The size of the salt data (must be >= 16) 154 apr_size_t salt_len,
|
/freebsd-10.0-release/contrib/apr-util/crypto/ |
H A D | apr_passwd.c | 184 apr_size_t salt_len, 189 salt_len, setting, sizeof(setting)) == NULL)
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/freebsd-10.0-release/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 141 u_int8_t key_len, salt_len, logr, minr; local 200 salt_len = BCRYPT_MAXSALT; 205 Blowfish_expandstate(&state, csalt, salt_len, 209 Blowfish_expand0state(&state, csalt, salt_len);
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | passwd.c | 318 size_t passwd_len, salt_len; local 329 salt_len = strlen(salt_out); 330 assert(salt_len <= 8); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 343 EVP_DigestUpdate(&md2, salt_out, salt_len); 365 EVP_DigestUpdate(&md2, salt_out, salt_len); 390 output = salt_out + salt_len;
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 725 krb5_salttype salttype, void *salt_string, size_t salt_len, 730 paid->salt.saltvalue.data = malloc(salt_len + 1); 735 memcpy(paid->salt.saltvalue.data, salt_string, salt_len); 736 ((char *)paid->salt.saltvalue.data)[salt_len] = '\0'; 737 paid->salt.saltvalue.length = salt_len; 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
|