/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 78 const unsigned char *salt, int saltlen) 95 if (!saltlen) 96 saltlen = PKCS5_SALT_LEN; 97 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) { 103 memcpy(sstr, salt, saltlen); 104 else if (RAND_bytes(sstr, saltlen) <= 0) 129 const unsigned char *salt, int saltlen) 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
H A D | p5_pbev2.c | 91 unsigned char *salt, int saltlen, 157 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 215 if (!saltlen) 216 saltlen = PKCS5_SALT_LEN; 217 if (!(osalt->data = OPENSSL_malloc(saltlen))) 220 osalt->length = saltlen; 223 memcpy(osalt->data, salt, saltlen); [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 75 int saltlen, iter; local 84 saltlen = p12->mac->salt->length; 96 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 135 unsigned char *salt, int saltlen, int iter, 143 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) { 159 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 177 if (!saltlen) 178 saltlen = PKCS12_SALT_LEN; 179 if ((p12->mac->salt->data = OPENSSL_malloc(saltlen)) == NULL) { 183 p12->mac->salt->length = saltlen; 134 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_crpt.c | 75 int saltlen, iter, ret; local 101 saltlen = pbe->salt->length; 102 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 108 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_p8e.c | 66 unsigned char *salt, int saltlen, int iter, 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid); 83 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 64 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_key.c | 81 int saltlen, int id, int iter, int n, 95 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 107 int saltlen, int id, int iter, int n, 134 fprintf(stderr, "Salt (length %d):\n", saltlen); 135 h__dump(salt, saltlen); 144 Slen = v * ((saltlen + v - 1) / v); 159 *p++ = salt[i % saltlen]; 80 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument 106 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument
|
H A D | pkcs12.h | 186 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8); 189 int saltlen, int iter, 194 unsigned char *salt, int saltlen, int iter, 226 int saltlen, int id, int iter, int n, 229 int saltlen, int id, int iter, int n, 238 unsigned char *salt, int saltlen, int iter, 241 int saltlen, const EVP_MD *md_type);
|
H A D | p12_add.c | 111 int saltlen, int iter, 131 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 180 unsigned char *salt, int saltlen, int iter, 199 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 201 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 109 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument 179 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, argument 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || 127 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) 129 if ((countsalt = calloc(1, saltlen + 4)) == NULL) 134 memcpy(countsalt, salt, saltlen); 141 countsalt[saltlen + 0] = (count >> 24) & 0xff; 142 countsalt[saltlen + 1] = (count >> 16) & 0xff; 143 countsalt[saltlen + 2] = (count >> 8) & 0xff; 144 countsalt[saltlen + 3] = count & 0xff; 147 crypto_hash_sha512(sha2salt, countsalt, saltlen [all...] |
/freebsd-11-stable/tests/sys/geom/class/eli/ |
H A D | hmac_test.c | 12 size_t saltlen; member in struct:__anon8591 29 (uint8_t *)testdata[i].salt, testdata[i].saltlen,
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 83 const unsigned char *salt, int saltlen, int iter, 123 if (!HMAC_Update(&hctx, salt, saltlen) 156 h__dump(salt, saltlen); 165 const unsigned char *salt, int saltlen, int iter, 168 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 253 int saltlen, iter, plen; local 314 saltlen = kdf->salt->value.octet_string->length; 316 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, 82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 164 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
|
H A D | p5_crpt.c | 83 int saltlen, iter; local 108 saltlen = pbe->salt->length; 119 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
H A D | evp.h | 1024 const unsigned char *salt, int saltlen, int iter, 1027 const unsigned char *salt, int saltlen, int iter,
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_nsec3.h | 316 * @param saltlen: length of salt. 320 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 330 * @param saltlen: length of salt. 336 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
H A D | val_nsec3.c | 189 uint8_t** salt, size_t* saltlen) 196 *saltlen = 0; 199 *saltlen = (size_t)d->rr_data[r][2+4]; 200 if(d->rr_len[r] < 2+5+(size_t)*saltlen) { 202 *saltlen = 0; 210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) 214 if(!nsec3_get_salt(rrset, r, salt, saltlen)) 225 size_t saltlen; local 234 saltlen = (size_t)d->rr_data[r][2+4]; 235 if(d->rr_len[r] < 2+5+saltlen 188 nsec3_get_salt(struct ub_packed_rrset_key* rrset, int r, uint8_t** salt, size_t* saltlen) argument 209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument 536 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res, size_t max) argument 577 size_t saltlen, i; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 92 int saltlen; member in struct:__anon3889 113 rctx->saltlen = -2; 235 rctx->saltlen, mgf1md, sig, &slen); 277 md, mgf1md, rctx->saltlen)) 363 rctx->saltlen, mgf1md, sig, siglen); 386 rctx->tbuf, rctx->saltlen); 523 *(int *)p2 = rctx->saltlen; 527 rctx->saltlen = p1; 663 int saltlen; local 664 saltlen [all...] |
H A D | rsa_ameth.c | 539 int saltlen, rv = 0; local 544 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 546 if (saltlen == -1) 547 saltlen = EVP_MD_size(sigmd); 548 else if (saltlen == -2) { 549 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 551 saltlen--; 556 if (saltlen != 20) { 560 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) 591 int saltlen; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 673 const unsigned char *salt, unsigned int saltlen, 680 || !EVP_DigestUpdate(&mctx, salt, saltlen) 690 unsigned int saltlen, unsigned int keylen, 699 if (saltlen) { 716 if (!derive_pvk_key(keybuf, p, saltlen, 719 p += saltlen; 759 if (enctmp && saltlen) 770 unsigned int saltlen, keylen; local 777 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 779 buflen = (int)keylen + saltlen; 672 derive_pvk_key(unsigned char *key, const unsigned char *salt, unsigned int saltlen, const unsigned char *pass, int passlen) argument 689 do_PVK_body(const unsigned char **in, unsigned int saltlen, unsigned int keylen, pem_password_cb *cb, void *u) argument [all...] |
/freebsd-11-stable/contrib/unbound/services/ |
H A D | authzone.c | 2587 size_t* saltlen) 2612 *saltlen = rdata[4]; 2613 if(*saltlen == 0) 2626 int algo, size_t iter, uint8_t* salt, size_t saltlen) 2629 /* buffer has domain name, nsec3hash, and 256 is for max saltlen 2633 if(nmlen+saltlen > sizeof(p) || hlen+saltlen > sizeof(p)) 2640 if(salt && saltlen > 0) 2641 memmove(p+nmlen, salt, saltlen); 2642 (void)secalgo_nsec3_hash(algo, p, nmlen+saltlen, (unsigne 2586 az_nsec3_param(struct auth_zone* z, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument 2625 az_nsec3_hash(uint8_t* buf, size_t buflen, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument 2656 az_nsec3_hashname(struct auth_zone* z, uint8_t* hashname, size_t* hashnmlen, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument 2710 az_nsec3_find_cover(struct auth_zone* z, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument 2736 az_nsec3_find_exact(struct auth_zone* z, uint8_t* nm, size_t nmlen, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument 2770 az_nsec3_find_ce(struct auth_zone* z, uint8_t** cenm, size_t* cenmlen, int* no_exact_ce, int algo, size_t iter, uint8_t* salt, size_t saltlen) argument 2820 size_t iter, saltlen; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 57 int saltlen; member in struct:__anon6005 213 if (keys[i].saltlen == -1) 216 salt.saltvalue.length = keys[i].saltlen;
|
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509.h | 1185 const unsigned char *salt, int saltlen); 1188 const unsigned char *salt, int saltlen); 1190 unsigned char *salt, int saltlen); 1192 unsigned char *salt, int saltlen, 1195 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2750 int iter, saltlen, ret; local 2769 saltlen = p12params.salt.length; 2771 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, 2777 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
|