Searched refs:saltlen (Results 1 - 22 of 22) sorted by relevance

/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dp5_pbe.c78 const unsigned char *salt, int saltlen)
95 if (!saltlen)
96 saltlen = PKCS5_SALT_LEN;
97 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) {
103 memcpy(sstr, salt, saltlen);
104 else if (RAND_bytes(sstr, saltlen) <= 0)
129 const unsigned char *salt, int saltlen)
138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
H A Dp5_pbev2.c91 unsigned char *salt, int saltlen,
157 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen)
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
215 if (!saltlen)
216 saltlen = PKCS5_SALT_LEN;
217 if (!(osalt->data = OPENSSL_malloc(saltlen)))
220 osalt->length = saltlen;
223 memcpy(osalt->data, salt, saltlen);
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c75 int saltlen, iter; local
84 saltlen = p12->mac->salt->length;
96 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
135 unsigned char *salt, int saltlen, int iter,
143 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) {
159 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
177 if (!saltlen)
178 saltlen = PKCS12_SALT_LEN;
179 if ((p12->mac->salt->data = OPENSSL_malloc(saltlen)) == NULL) {
183 p12->mac->salt->length = saltlen;
134 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_crpt.c75 int saltlen, iter, ret; local
101 saltlen = pbe->salt->length;
102 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
108 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_p8e.c66 unsigned char *salt, int saltlen, int iter,
78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid);
83 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
64 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_key.c81 int saltlen, int id, int iter, int n,
95 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
107 int saltlen, int id, int iter, int n,
134 fprintf(stderr, "Salt (length %d):\n", saltlen);
135 h__dump(salt, saltlen);
144 Slen = v * ((saltlen + v - 1) / v);
159 *p++ = salt[i % saltlen];
80 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
106 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
H A Dpkcs12.h186 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8);
189 int saltlen, int iter,
194 unsigned char *salt, int saltlen, int iter,
226 int saltlen, int id, int iter, int n,
229 int saltlen, int id, int iter, int n,
238 unsigned char *salt, int saltlen, int iter,
241 int saltlen, const EVP_MD *md_type);
H A Dp12_add.c111 int saltlen, int iter,
131 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
180 unsigned char *salt, int saltlen, int iter,
199 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
201 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
109 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument
179 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
/freebsd-11-stable/crypto/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, argument
126 if (passlen == 0 || saltlen == 0 || keylen == 0 ||
127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20)
129 if ((countsalt = calloc(1, saltlen + 4)) == NULL)
134 memcpy(countsalt, salt, saltlen);
141 countsalt[saltlen + 0] = (count >> 24) & 0xff;
142 countsalt[saltlen + 1] = (count >> 16) & 0xff;
143 countsalt[saltlen + 2] = (count >> 8) & 0xff;
144 countsalt[saltlen + 3] = count & 0xff;
147 crypto_hash_sha512(sha2salt, countsalt, saltlen
[all...]
/freebsd-11-stable/tests/sys/geom/class/eli/
H A Dhmac_test.c12 size_t saltlen; member in struct:__anon8591
29 (uint8_t *)testdata[i].salt, testdata[i].saltlen,
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Dp5_crpt2.c83 const unsigned char *salt, int saltlen, int iter,
123 if (!HMAC_Update(&hctx, salt, saltlen)
156 h__dump(salt, saltlen);
165 const unsigned char *salt, int saltlen, int iter,
168 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
253 int saltlen, iter, plen; local
314 saltlen = kdf->salt->value.octet_string->length;
316 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
164 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
H A Dp5_crpt.c83 int saltlen, iter; local
108 saltlen = pbe->salt->length;
119 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
H A Devp.h1024 const unsigned char *salt, int saltlen, int iter,
1027 const unsigned char *salt, int saltlen, int iter,
/freebsd-11-stable/contrib/unbound/validator/
H A Dval_nsec3.h316 * @param saltlen: length of salt.
320 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen);
330 * @param saltlen: length of salt.
336 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
H A Dval_nsec3.c189 uint8_t** salt, size_t* saltlen)
196 *saltlen = 0;
199 *saltlen = (size_t)d->rr_data[r][2+4];
200 if(d->rr_len[r] < 2+5+(size_t)*saltlen) {
202 *saltlen = 0;
210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
214 if(!nsec3_get_salt(rrset, r, salt, saltlen))
225 size_t saltlen; local
234 saltlen = (size_t)d->rr_data[r][2+4];
235 if(d->rr_len[r] < 2+5+saltlen
188 nsec3_get_salt(struct ub_packed_rrset_key* rrset, int r, uint8_t** salt, size_t* saltlen) argument
209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
536 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res, size_t max) argument
577 size_t saltlen, i; local
[all...]
/freebsd-11-stable/crypto/openssl/crypto/rsa/
H A Drsa_pmeth.c92 int saltlen; member in struct:__anon3889
113 rctx->saltlen = -2;
235 rctx->saltlen, mgf1md, sig, &slen);
277 md, mgf1md, rctx->saltlen))
363 rctx->saltlen, mgf1md, sig, siglen);
386 rctx->tbuf, rctx->saltlen);
523 *(int *)p2 = rctx->saltlen;
527 rctx->saltlen = p1;
663 int saltlen; local
664 saltlen
[all...]
H A Drsa_ameth.c539 int saltlen, rv = 0; local
544 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen))
546 if (saltlen == -1)
547 saltlen = EVP_MD_size(sigmd);
548 else if (saltlen == -2) {
549 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2;
551 saltlen--;
556 if (saltlen != 20) {
560 if (!ASN1_INTEGER_set(pss->saltLength, saltlen))
591 int saltlen; local
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pem/
H A Dpvkfmt.c673 const unsigned char *salt, unsigned int saltlen,
680 || !EVP_DigestUpdate(&mctx, salt, saltlen)
690 unsigned int saltlen, unsigned int keylen,
699 if (saltlen) {
716 if (!derive_pvk_key(keybuf, p, saltlen,
719 p += saltlen;
759 if (enctmp && saltlen)
770 unsigned int saltlen, keylen; local
777 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
779 buflen = (int)keylen + saltlen;
672 derive_pvk_key(unsigned char *key, const unsigned char *salt, unsigned int saltlen, const unsigned char *pass, int passlen) argument
689 do_PVK_body(const unsigned char **in, unsigned int saltlen, unsigned int keylen, pem_password_cb *cb, void *u) argument
[all...]
/freebsd-11-stable/contrib/unbound/services/
H A Dauthzone.c2587 size_t* saltlen)
2612 *saltlen = rdata[4];
2613 if(*saltlen == 0)
2626 int algo, size_t iter, uint8_t* salt, size_t saltlen)
2629 /* buffer has domain name, nsec3hash, and 256 is for max saltlen
2633 if(nmlen+saltlen > sizeof(p) || hlen+saltlen > sizeof(p))
2640 if(salt && saltlen > 0)
2641 memmove(p+nmlen, salt, saltlen);
2642 (void)secalgo_nsec3_hash(algo, p, nmlen+saltlen, (unsigne
2586 az_nsec3_param(struct auth_zone* z, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
2625 az_nsec3_hash(uint8_t* buf, size_t buflen, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument
2656 az_nsec3_hashname(struct auth_zone* z, uint8_t* hashname, size_t* hashnmlen, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument
2710 az_nsec3_find_cover(struct auth_zone* z, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument
2736 az_nsec3_find_exact(struct auth_zone* z, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument
2770 az_nsec3_find_ce(struct auth_zone* z, uint8_t** cenm, size_t* cenmlen, int* no_exact_ce, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument
2820 size_t iter, saltlen; local
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Daes-test.c57 int saltlen; member in struct:__anon6005
213 if (keys[i].saltlen == -1)
216 salt.saltvalue.length = keys[i].saltlen;
/freebsd-11-stable/crypto/openssl/crypto/x509/
H A Dx509.h1185 const unsigned char *salt, int saltlen);
1188 const unsigned char *salt, int saltlen);
1190 unsigned char *salt, int saltlen);
1192 unsigned char *salt, int saltlen,
1195 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c2750 int iter, saltlen, ret; local
2769 saltlen = p12params.salt.length;
2771 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2777 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,

Completed in 211 milliseconds