Searched refs:salt_len (Results 1 - 10 of 10) sorted by relevance

/freebsd-10.0-release/lib/libcrypt/
H A Dcrypt-sha256.c69 size_t salt_len, key_len, cnt, rounds; local
99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
111 SHA256_Update(&ctx, salt, salt_len);
121 SHA256_Update(&alt_ctx, salt, salt_len);
168 SHA256_Update(&alt_ctx, salt, salt_len);
174 cp = s_bytes = alloca(salt_len);
175 for (cnt = salt_len; cnt >= 32; cnt -= 32) {
195 SHA256_Update(&ctx, s_bytes, salt_len);
224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len));
225 buflen -= MIN((size_t)MAX(0, buflen), salt_len);
[all...]
H A Dcrypt-sha512.c69 size_t salt_len, key_len, cnt, rounds; local
99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
111 SHA512_Update(&ctx, salt, salt_len);
121 SHA512_Update(&alt_ctx, salt, salt_len);
168 SHA512_Update(&alt_ctx, salt, salt_len);
174 cp = s_bytes = alloca(salt_len);
175 for (cnt = salt_len; cnt >= 64; cnt -= 64) {
195 SHA512_Update(&ctx, s_bytes, salt_len);
224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len));
225 buflen -= MIN((size_t)MAX(0, buflen), salt_len);
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dauth2-jpake.c277 u_int secret_len, salt_len; local
293 salt_len = 3 + 2 + 1 + 22 + 1;
294 *salt = xmalloc(salt_len);
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
303 salt_len = 4 + 2 + 1 + 22 + 1;
304 *salt = xmalloc(salt_len);
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
315 salt_len = (cp - authctxt->pw->pw_passwd) + 1;
316 *salt = xmalloc(salt_len);
318 salt_len);
[all...]
H A Dhostfile.c67 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument
98 ret = __b64_pton(b64salt, salt, salt_len);
/freebsd-10.0-release/contrib/apr-util/include/
H A Dapr_md5.h147 * @param salt_len The size of the salt data (must be >= 16)
154 apr_size_t salt_len,
/freebsd-10.0-release/contrib/apr-util/crypto/
H A Dapr_passwd.c184 apr_size_t salt_len,
189 salt_len, setting, sizeof(setting)) == NULL)
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dpkcs5.c24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
/freebsd-10.0-release/secure/lib/libcrypt/
H A Dcrypt-blowfish.c141 u_int8_t key_len, salt_len, logr, minr; local
200 salt_len = BCRYPT_MAXSALT;
205 Blowfish_expandstate(&state, csalt, salt_len,
209 Blowfish_expand0state(&state, csalt, salt_len);
/freebsd-10.0-release/crypto/openssl/apps/
H A Dpasswd.c318 size_t passwd_len, salt_len; local
329 salt_len = strlen(salt_out);
330 assert(salt_len <= 8);
338 EVP_DigestUpdate(&md, salt_out, salt_len);
343 EVP_DigestUpdate(&md2, salt_out, salt_len);
365 EVP_DigestUpdate(&md2, salt_out, salt_len);
390 output = salt_out + salt_len;
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dinit_creds_pw.c725 krb5_salttype salttype, void *salt_string, size_t salt_len,
730 paid->salt.saltvalue.data = malloc(salt_len + 1);
735 memcpy(paid->salt.saltvalue.data, salt_string, salt_len);
736 ((char *)paid->salt.saltvalue.data)[salt_len] = '\0';
737 paid->salt.saltvalue.length = salt_len;
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument

Completed in 188 milliseconds