Searched refs:salt (Results 1 - 25 of 276) sorted by relevance

1234567891011>>

/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dkeys.c60 keys[i].salt = NULL;
79 if ((keys1[i].salt != NULL && keys2[j].salt == NULL)
80 || (keys1[i].salt == NULL && keys2[j].salt != NULL))
83 if (keys1[i].salt != NULL) {
84 if (keys1[i].salt->type != keys2[j].salt->type)
86 if (keys1[i].salt->salt
[all...]
H A Ddefault_keys.c58 if (keys[i].salt) {
59 printf(" salt: ");
61 switch (keys[i].salt->type) {
63 printf("pw-salt:");
66 printf("afs3-salt:");
69 printf("unknown salt: %d", keys[i].salt->type);
72 if (keys[i].salt->salt.length)
73 printf("%.*s", (int)keys[i].salt
[all...]
H A Drename_s.c67 /* fix salt */
69 Salt salt; local
71 memset(&salt, 0, sizeof(salt));
73 salt.type = hdb_pw_salt;
74 salt.salt = salt2.saltvalue;
76 if(ent.entry.keys.val[i].salt == NULL){
77 ent.entry.keys.val[i].salt =
78 malloc(sizeof(*ent.entry.keys.val[i].salt));
[all...]
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
66 if (is_md5_salt(salt))
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
H A Dport-uw.c56 char *salt; local
66 /* Encrypt the candidate password using the proper salt. */
67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkcs5.c13 * PKCS5.pbkdf2_hmac(pass, salt, iter, keylen, digest) => string
17 * * +salt+ - string - should be at least 8 bytes long.
27 ossl_pkcs5_pbkdf2_hmac(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen, VALUE digest) argument
34 StringValue(salt);
40 (unsigned char *)RSTRING_PTR(salt), RSTRING_LENINT(salt),
55 * PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, keylen) => string
59 * * +salt+ - string - should be at least 8 bytes long.
68 ossl_pkcs5_pbkdf2_hmac_sha1(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen) argument
74 StringValue(salt);
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dkeys.c48 if (keys[i].salt != NULL) {
49 free_Salt(keys[i].salt);
50 free(keys[i].salt);
51 keys[i].salt = NULL;
60 * of etype:salttype:salt, syntax of this if something like:
61 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it
64 * v5 == pw-salt, and
65 * v4 == des:pw-salt:
66 * afs or afs3 == des:afs3-salt
84 krb5_salt *salt, krb5_principa
82 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument
382 add_enctype_to_key_set(Key **key_set, size_t *nkeyset, krb5_enctype enctype, krb5_salt *salt) argument
514 krb5_salt salt; local
614 krb5_salt salt; local
[all...]
H A Dmit_dump.c62 foreach version 0 to key data version - 1 (a key or a salt)
154 Salt *salt = ent->keys.val[key_num].salt; local
155 /* fix salt type */
156 switch((int)salt->type) {
158 salt->type = KRB5_PADATA_PW_SALT;
161 krb5_data_free(&salt->salt);
162 salt->type = KRB5_PADATA_PW_SALT;
173 ret = krb5_data_alloc (&salt
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt,
94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) {
98 pbe->salt->length = saltlen;
99 if (salt) memcpy (pbe->salt->data, salt, saltlen);
100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Dnsec3param_51.h35 unsigned char *salt; member in struct:dns_rdata_nsec3param
/macosx-10.10/system_cmds-643.1.1/makekey.tproj/
H A Dmakekey.c83 char *r, key[9], salt[3]; local
86 get(salt, sizeof(salt) - 1);
87 len = strlen(r = crypt(key, salt));
/macosx-10.10/vim-55/src/proto/
H A Dsha256.pro5 char_u *sha256_key __ARGS((char_u *buf, char_u *salt, int salt_len));
7 void sha2_seed __ARGS((char_u *header, int header_len, char_u *salt, int salt_len));
/macosx-10.10/xnu-2782.1.97/EXTERNAL_HEADERS/corecrypto/
H A Dccpbkdf2.h18 @discussion This performs a standard PBKDF2 transformation of password and salt through
23 The salt used should be at least 8 bytes long. Each session should use it's own salt.
29 @param saltLen length of the salt
30 @param salt salt to be used in pbkdf
38 unsigned long saltLen, const void *salt,
/macosx-10.10/bind9-45.101/bind9/lib/isc/
H A Diterated_hash.c29 const unsigned char *salt, int saltlength,
41 isc_sha1_update(&ctx, salt, saltlength);
27 isc_iterated_hash(unsigned char out[ISC_SHA1_DIGESTLENGTH], unsigned int hashalg, int iterations, const unsigned char *salt, int saltlength, const unsigned char *in, int inlength) argument
/macosx-10.10/ntp-92/lib/isc/
H A Diterated_hash.c29 const unsigned char *salt, int saltlength,
41 isc_sha1_update(&ctx, salt, saltlength);
27 isc_iterated_hash(unsigned char out[ISC_SHA1_DIGESTLENGTH], unsigned int hashalg, int iterations, const unsigned char *salt, int saltlength, const unsigned char *in, int inlength) argument
/macosx-10.10/ruby-106/ruby/sample/openssl/
H A Dcipher.rb4 def crypt_by_password(alg, pass, salt, text)
9 puts %(salt: "#{salt}")
15 enc.pkcs5_keyivgen(pass, salt)
24 dec.pkcs5_keyivgen(pass, salt)
51 salt = "8 octets" # or nil
54 crypt_by_password(alg, pass, salt, text)
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dstring2key.c74 krb5_salt salt,
82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key);
102 krb5_salt salt; local
167 krb5_get_pw_salt(context, princ, &salt);
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
169 krb5_free_salt(context, salt);
172 salt.salttype = KRB5_PW_SALT;
173 salt.saltvalue.length = 0;
174 salt.saltvalue.data = NULL;
175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerbero
71 tokey(krb5_context context, krb5_enctype enctype, const char *pw, krb5_salt salt, const char *label) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
81 salt = p12->mac->salt->data;
82 saltlen = p12->mac->salt->length;
90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
163 p12->mac->salt->length = saltlen;
164 if (!(p12->mac->salt
124 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/crypto/
H A Dpbkdf2-00-hmac-sha1.c30 const uint8_t *salt, size_t salt_length,
38 salt, salt_length, iterations, key_out, key_length, temp_data);
60 const char *salt = "salt"; local
72 pbkdf2_hmac_sha1_deriviation((const uint8_t*) password, strlen(password), (const uint8_t*) salt, strlen(salt), iterations, actual, resultSize);
79 const char *salt = "salt"; local
91 pbkdf2_hmac_sha1_deriviation((const uint8_t*) password, strlen(password), (const uint8_t*) salt, strlen(salt), iteration
29 pbkdf2_hmac_sha1_deriviation(const uint8_t *passphrase, size_t passphrase_length, const uint8_t *salt, size_t salt_length, size_t iterations, uint8_t *key_out, size_t key_length) argument
98 const char *salt = "salt"; local
119 const char *salt = "salt"; local
[all...]
/macosx-10.10/tcl-105/tcl_ext/trf/trf/generic/
H A Dcrypt.c65 * crypt <passwd> <salt>
73 const char* salt;
78 "wrong # args: should be \"crypt passwd salt\"",
84 salt = Tcl_GetStringFromObj (objv [2], NULL);
90 res = Tcl_NewStringObj ((char*) crypt (passwd, salt), -1);
124 * md5crypt <passwd> <salt>
128 const char* salt;
138 "wrong # args: should be \"md5crypt passwd salt\"",
144 salt = Tcl_GetStringFromObj (objv [2], NULL);
147 * Manipulate salt, ad
126 const char* salt; local
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/passwd/
H A Dapr1.c56 const struct berval *salt,
67 lutil_MD5Update(&ctx, (const unsigned char *) salt->bv_val, salt->bv_len);
71 lutil_MD5Update(&ctx1, (const unsigned char *) salt->bv_val, salt->bv_len);
100 (const unsigned char *) salt->bv_val, salt->bv_len);
123 struct berval salt; local
143 salt.bv_val = (char *) &orig_pass[sizeof(digest)];
144 salt
54 do_phk_hash( const struct berval *passwd, const struct berval *salt, const struct berval *magic, unsigned char *digest) argument
185 struct berval salt; local
[all...]
/macosx-10.10/CommonCrypto-60061/lib/
H A DCommonKeyDerivation.c36 const uint8_t *salt, size_t saltLen,
52 if(!password || !salt || !derivedKey || (derivedKeyLen == 0) || (rounds == 0)) return -1;
54 ccpbkdf2_hmac(di, passwordLen, password, saltLen, salt, rounds, derivedKeyLen, derivedKey);
86 uint8_t *salt = NULL; local
100 if((salt = malloc(saltLen)) == NULL) goto error;
101 for(i=0; i<saltLen; i++) salt[i] = i%256;
106 if(CCKeyDerivationPBKDF(algorithm, password, passwordLen, salt, saltLen, prf, ROUNDMEASURE, derivedKey, derivedKeyLen)) goto error;
116 if(salt) free(salt);
35 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen, const uint8_t *salt, size_t saltLen, CCPseudoRandomAlgorithm prf, uint rounds, uint8_t *derivedKey, size_t derivedKeyLen) argument
H A DCommonKeyDerivationSPI.c35 const void *salt, size_t saltLen, // for PBKDF or HKDF
57 if(!salt) {
59 salt = "";
62 saltLen, salt, rounds,
79 cc_retval = cchkdf(di, keyDerivationKeyLen, keyDerivationKey, saltLen, salt,
29 CCKeyDerivationHMac(CCKDFAlgorithm algorithm, CCDigestAlgorithm digest, uint rounds, const void *keyDerivationKey, size_t keyDerivationKeyLen, const void *label, size_t labelLen, const void *context, size_t contextLen, const void *iv, size_t ivLen, const void *salt, size_t saltLen, void *derivedKey, size_t derivedKeyLen) argument
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/
H A DCommonKeyDerivation.c24 char *salt; member in struct:KDFVector_t
34 { "password", "salt", 1, kCCDigestSHA1, 20, "0c60c80f961f0e71f3a9b524af6012062fe037a6", 0 },
35 { "password", "salt", 2, kCCDigestSHA1, 20, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957", 0 },
36 { "password", "salt", 4096, kCCDigestSHA1, 20, "4b007901b765489abead49d926f721d065a429c1", 0 },
37 { "password", "salt", 1, 0, 20, NULL, -1} // This crashed
50 static int testOriginalKDF(char *password, char *salt, int rounds, CCDigestAlgorithm alg, int dklen, byteBuffer expected, int expected_failure) { argument
55 int retval = CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), (uint8_t *) salt, strlen(salt), prf, rounds, derivedKey->bytes, derivedKey->len);
64 static int testNewKDF(char *password, char *salt, int rounds, CCDigestAlgorithm alg, int dklen, byteBuffer expected, int expected_failure) { argument
68 CCStatus retval = CCKeyDerivationHMac(kCCKDFAlgorithmPBKDF2_HMAC, alg, rounds, password, strlen(password), NULL, 0, NULL, 0, NULL, 0, salt, strle
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Dtest_pkcs5.c47 const char *salt; member in struct:tests
116 t->salt, strlen(t->salt),
128 t->salt, strlen(t->salt),

Completed in 510 milliseconds

1234567891011>>