/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | keys.c | 60 keys[i].salt = NULL; 79 if ((keys1[i].salt != NULL && keys2[j].salt == NULL) 80 || (keys1[i].salt == NULL && keys2[j].salt != NULL)) 83 if (keys1[i].salt != NULL) { 84 if (keys1[i].salt->type != keys2[j].salt->type) 86 if (keys1[i].salt->salt [all...] |
H A D | default_keys.c | 58 if (keys[i].salt) { 59 printf(" salt: "); 61 switch (keys[i].salt->type) { 63 printf("pw-salt:"); 66 printf("afs3-salt:"); 69 printf("unknown salt: %d", keys[i].salt->type); 72 if (keys[i].salt->salt.length) 73 printf("%.*s", (int)keys[i].salt [all...] |
H A D | rename_s.c | 67 /* fix salt */ 69 Salt salt; local 71 memset(&salt, 0, sizeof(salt)); 73 salt.type = hdb_pw_salt; 74 salt.salt = salt2.saltvalue; 76 if(ent.entry.keys.val[i].salt == NULL){ 77 ent.entry.keys.val[i].salt = 78 malloc(sizeof(*ent.entry.keys.val[i].salt)); [all...] |
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) argument 66 if (is_md5_salt(salt)) 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt);
|
H A D | port-uw.c | 56 char *salt; local 66 /* Encrypt the candidate password using the proper salt. */ 67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkcs5.c | 13 * PKCS5.pbkdf2_hmac(pass, salt, iter, keylen, digest) => string 17 * * +salt+ - string - should be at least 8 bytes long. 27 ossl_pkcs5_pbkdf2_hmac(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen, VALUE digest) argument 34 StringValue(salt); 40 (unsigned char *)RSTRING_PTR(salt), RSTRING_LENINT(salt), 55 * PKCS5.pbkdf2_hmac_sha1(pass, salt, iter, keylen) => string 59 * * +salt+ - string - should be at least 8 bytes long. 68 ossl_pkcs5_pbkdf2_hmac_sha1(VALUE self, VALUE pass, VALUE salt, VALUE iter, VALUE keylen) argument 74 StringValue(salt); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | keys.c | 48 if (keys[i].salt != NULL) { 49 free_Salt(keys[i].salt); 50 free(keys[i].salt); 51 keys[i].salt = NULL; 60 * of etype:salttype:salt, syntax of this if something like: 61 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it 64 * v5 == pw-salt, and 65 * v4 == des:pw-salt: 66 * afs or afs3 == des:afs3-salt 84 krb5_salt *salt, krb5_principa 82 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument 382 add_enctype_to_key_set(Key **key_set, size_t *nkeyset, krb5_enctype enctype, krb5_salt *salt) argument 514 krb5_salt salt; local 614 krb5_salt salt; local [all...] |
H A D | mit_dump.c | 62 foreach version 0 to key data version - 1 (a key or a salt) 154 Salt *salt = ent->keys.val[key_num].salt; local 155 /* fix salt type */ 156 switch((int)salt->type) { 158 salt->type = KRB5_PADATA_PW_SALT; 161 krb5_data_free(&salt->salt); 162 salt->type = KRB5_PADATA_PW_SALT; 173 ret = krb5_data_alloc (&salt [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, 94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) { 98 pbe->salt->length = saltlen; 99 if (salt) memcpy (pbe->salt->data, salt, saltlen); 100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | nsec3param_51.h | 35 unsigned char *salt; member in struct:dns_rdata_nsec3param
|
/macosx-10.10/system_cmds-643.1.1/makekey.tproj/ |
H A D | makekey.c | 83 char *r, key[9], salt[3]; local 86 get(salt, sizeof(salt) - 1); 87 len = strlen(r = crypt(key, salt));
|
/macosx-10.10/vim-55/src/proto/ |
H A D | sha256.pro | 5 char_u *sha256_key __ARGS((char_u *buf, char_u *salt, int salt_len)); 7 void sha2_seed __ARGS((char_u *header, int header_len, char_u *salt, int salt_len));
|
/macosx-10.10/xnu-2782.1.97/EXTERNAL_HEADERS/corecrypto/ |
H A D | ccpbkdf2.h | 18 @discussion This performs a standard PBKDF2 transformation of password and salt through 23 The salt used should be at least 8 bytes long. Each session should use it's own salt. 29 @param saltLen length of the salt 30 @param salt salt to be used in pbkdf 38 unsigned long saltLen, const void *salt,
|
/macosx-10.10/bind9-45.101/bind9/lib/isc/ |
H A D | iterated_hash.c | 29 const unsigned char *salt, int saltlength, 41 isc_sha1_update(&ctx, salt, saltlength); 27 isc_iterated_hash(unsigned char out[ISC_SHA1_DIGESTLENGTH], unsigned int hashalg, int iterations, const unsigned char *salt, int saltlength, const unsigned char *in, int inlength) argument
|
/macosx-10.10/ntp-92/lib/isc/ |
H A D | iterated_hash.c | 29 const unsigned char *salt, int saltlength, 41 isc_sha1_update(&ctx, salt, saltlength); 27 isc_iterated_hash(unsigned char out[ISC_SHA1_DIGESTLENGTH], unsigned int hashalg, int iterations, const unsigned char *salt, int saltlength, const unsigned char *in, int inlength) argument
|
/macosx-10.10/ruby-106/ruby/sample/openssl/ |
H A D | cipher.rb | 4 def crypt_by_password(alg, pass, salt, text) 9 puts %(salt: "#{salt}") 15 enc.pkcs5_keyivgen(pass, salt) 24 dec.pkcs5_keyivgen(pass, salt) 51 salt = "8 octets" # or nil 54 crypt_by_password(alg, pass, salt, text)
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | string2key.c | 74 krb5_salt salt, 82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key); 102 krb5_salt salt; local 167 krb5_get_pw_salt(context, princ, &salt); 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 169 krb5_free_salt(context, salt); 172 salt.salttype = KRB5_PW_SALT; 173 salt.saltvalue.length = 0; 174 salt.saltvalue.data = NULL; 175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerbero 71 tokey(krb5_context context, krb5_enctype enctype, const char *pw, krb5_salt salt, const char *label) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 81 salt = p12->mac->salt->data; 82 saltlen = p12->mac->salt->length; 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 163 p12->mac->salt->length = saltlen; 164 if (!(p12->mac->salt 124 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/crypto/ |
H A D | pbkdf2-00-hmac-sha1.c | 30 const uint8_t *salt, size_t salt_length, 38 salt, salt_length, iterations, key_out, key_length, temp_data); 60 const char *salt = "salt"; local 72 pbkdf2_hmac_sha1_deriviation((const uint8_t*) password, strlen(password), (const uint8_t*) salt, strlen(salt), iterations, actual, resultSize); 79 const char *salt = "salt"; local 91 pbkdf2_hmac_sha1_deriviation((const uint8_t*) password, strlen(password), (const uint8_t*) salt, strlen(salt), iteration 29 pbkdf2_hmac_sha1_deriviation(const uint8_t *passphrase, size_t passphrase_length, const uint8_t *salt, size_t salt_length, size_t iterations, uint8_t *key_out, size_t key_length) argument 98 const char *salt = "salt"; local 119 const char *salt = "salt"; local [all...] |
/macosx-10.10/tcl-105/tcl_ext/trf/trf/generic/ |
H A D | crypt.c | 65 * crypt <passwd> <salt> 73 const char* salt; 78 "wrong # args: should be \"crypt passwd salt\"", 84 salt = Tcl_GetStringFromObj (objv [2], NULL); 90 res = Tcl_NewStringObj ((char*) crypt (passwd, salt), -1); 124 * md5crypt <passwd> <salt> 128 const char* salt; 138 "wrong # args: should be \"md5crypt passwd salt\"", 144 salt = Tcl_GetStringFromObj (objv [2], NULL); 147 * Manipulate salt, ad 126 const char* salt; local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/passwd/ |
H A D | apr1.c | 56 const struct berval *salt,
67 lutil_MD5Update(&ctx, (const unsigned char *) salt->bv_val, salt->bv_len);
71 lutil_MD5Update(&ctx1, (const unsigned char *) salt->bv_val, salt->bv_len);
100 (const unsigned char *) salt->bv_val, salt->bv_len);
123 struct berval salt;
local 143 salt.bv_val = (char *) &orig_pass[sizeof(digest)];
144 salt 54 do_phk_hash( const struct berval *passwd, const struct berval *salt, const struct berval *magic, unsigned char *digest) argument 185 struct berval salt; local [all...] |
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonKeyDerivation.c | 36 const uint8_t *salt, size_t saltLen, 52 if(!password || !salt || !derivedKey || (derivedKeyLen == 0) || (rounds == 0)) return -1; 54 ccpbkdf2_hmac(di, passwordLen, password, saltLen, salt, rounds, derivedKeyLen, derivedKey); 86 uint8_t *salt = NULL; local 100 if((salt = malloc(saltLen)) == NULL) goto error; 101 for(i=0; i<saltLen; i++) salt[i] = i%256; 106 if(CCKeyDerivationPBKDF(algorithm, password, passwordLen, salt, saltLen, prf, ROUNDMEASURE, derivedKey, derivedKeyLen)) goto error; 116 if(salt) free(salt); 35 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen, const uint8_t *salt, size_t saltLen, CCPseudoRandomAlgorithm prf, uint rounds, uint8_t *derivedKey, size_t derivedKeyLen) argument
|
H A D | CommonKeyDerivationSPI.c | 35 const void *salt, size_t saltLen, // for PBKDF or HKDF 57 if(!salt) { 59 salt = ""; 62 saltLen, salt, rounds, 79 cc_retval = cchkdf(di, keyDerivationKeyLen, keyDerivationKey, saltLen, salt, 29 CCKeyDerivationHMac(CCKDFAlgorithm algorithm, CCDigestAlgorithm digest, uint rounds, const void *keyDerivationKey, size_t keyDerivationKeyLen, const void *label, size_t labelLen, const void *context, size_t contextLen, const void *iv, size_t ivLen, const void *salt, size_t saltLen, void *derivedKey, size_t derivedKeyLen) argument
|
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/ |
H A D | CommonKeyDerivation.c | 24 char *salt; member in struct:KDFVector_t 34 { "password", "salt", 1, kCCDigestSHA1, 20, "0c60c80f961f0e71f3a9b524af6012062fe037a6", 0 }, 35 { "password", "salt", 2, kCCDigestSHA1, 20, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957", 0 }, 36 { "password", "salt", 4096, kCCDigestSHA1, 20, "4b007901b765489abead49d926f721d065a429c1", 0 }, 37 { "password", "salt", 1, 0, 20, NULL, -1} // This crashed 50 static int testOriginalKDF(char *password, char *salt, int rounds, CCDigestAlgorithm alg, int dklen, byteBuffer expected, int expected_failure) { argument 55 int retval = CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), (uint8_t *) salt, strlen(salt), prf, rounds, derivedKey->bytes, derivedKey->len); 64 static int testNewKDF(char *password, char *salt, int rounds, CCDigestAlgorithm alg, int dklen, byteBuffer expected, int expected_failure) { argument 68 CCStatus retval = CCKeyDerivationHMac(kCCKDFAlgorithmPBKDF2_HMAC, alg, rounds, password, strlen(password), NULL, 0, NULL, 0, NULL, 0, salt, strle [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | test_pkcs5.c | 47 const char *salt; member in struct:tests 116 t->salt, strlen(t->salt), 128 t->salt, strlen(t->salt),
|