Searched refs:saltlen (Results 1 - 12 of 12) sorted by relevance

/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/
H A DSOSUserKeygen.c177 size_t saltlen = SALTMAX; local
178 uint8_t salt[saltlen];
189 CFDataSetLength(result, der_sizeof_pbkdf2_params(saltlen, salt, iterations, keysize));
191 uint8_t * encode = der_encode_pbkdf2_params(saltlen, salt, iterations, keysize,
207 size_t saltlen; local
216 der = der_decode_pbkdf2_params(&saltlen, &salt, &iterations, &keysize, der, der_end);
228 if (saltlen < 4) {
230 CFSTR("Salt length not supported, requested %zd."), saltlen);
253 saltlen, salt,
270 size_t saltlen local
[all...]
H A DSOSUserKey.c24 static const size_t saltlen = 16;
70 uint8_t salt[saltlen];
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Dpkcs12.c47 const void *salt, size_t saltlen,
83 if (salt && saltlen > 0) {
85 I[i] = ((unsigned char*)salt)[i % saltlen];
46 PKCS12_key_gen(const void *key, size_t keylen, const void *salt, size_t saltlen, int id, int iteration, size_t outkeysize, void *out, const EVP_MD *md) argument
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/rdata/generic/
H A Dnsec3param_51.c147 unsigned int saltlen; local
159 /* hash(1), flags(1), iterations(2), saltlen(1) */
162 saltlen = sr.base[4];
165 if (sr.length < saltlen)
167 isc_region_consume(&sr, saltlen);
H A Dnsec3_50.c227 unsigned int saltlen, hashlen; local
241 /* hash(1), flags(1), iteration(2), saltlen(1) */
244 saltlen = sr.base[4];
247 if (sr.length < saltlen)
249 isc_region_consume(&sr, saltlen);
/macosx-10.9.5/CommonCrypto-60049/test/CommonCrypto/
H A DCommonDigest.c53 PBKDF2Test(char *password, uint8_t *salt, size_t saltlen, int rounds, CCDigestAlgorithm PRF, int dklen, char *expected) argument
63 case 0: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), (uint8_t *) salt, saltlen, 0, rounds, derivedKey->bytes, derivedKey->len); break;
64 case kCCDigestSHA1: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA1, rounds, derivedKey->bytes, derivedKey->len); break;
65 case kCCDigestSHA224: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA224, rounds, derivedKey->bytes, derivedKey->len); break;
66 case kCCDigestSHA256: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA256, rounds, derivedKey->bytes, derivedKey->len); break;
67 case kCCDigestSHA384: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA384, rounds, derivedKey->bytes, derivedKey->len); break;
68 case kCCDigestSHA512: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA512, rounds, derivedKey->bytes, derivedKey->len); break;
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/plugins/
H A Dsrp.c247 int saltlen; member in struct:context
967 static int CalculateX(context_t *text, const char *salt, int saltlen, argument
976 MakeHash(text->md, hash, &hashlen, "%o%o", saltlen, salt, hashlen, hash);
985 char *U, char *salt, int saltlen,
1006 len, Ng, U, saltlen, salt, A, B, Klen, K, I, L);
1553 BIGNUM *v, char **salt, int *saltlen)
1560 *saltlen = SRP_MAXBLOCKSIZE;
1561 *salt = (char *)text->utils->malloc(*saltlen);
1563 text->utils->rand(text->utils->rpool, *salt, *saltlen);
1565 r = CalculateX(text, *salt, *saltlen, use
984 CalculateM1(context_t *text, BIGNUM *N, BIGNUM *g, char *U, char *salt, int saltlen, BIGNUM *A, BIGNUM *B, char *K, int Klen, char *I, char *L, char *M1, int *M1len) argument
1549 CalculateV(context_t *text, BIGNUM *N, BIGNUM *g, const char *user, const char *pass, unsigned passlen, BIGNUM *v, char **salt, int *saltlen) argument
1669 ParseUserSecret(const sasl_utils_t *utils, char *secret, size_t seclen, char **mda, BIGNUM *v, char **salt, int *saltlen) argument
2238 int saltlen; local
2491 ClientCalculateK(context_t *text, char *salt, int saltlen, char *user, char *pass, int passlen, BIGNUM *N, BIGNUM *g, BIGNUM *a, BIGNUM *A, BIGNUM *B, char *K, int *Klen) argument
[all...]
/macosx-10.9.5/bind9-45.100/bind9/contrib/zkt/
H A Dmisc.c1003 int saltlen = 0; /* current length of salt in hex nibbles */ local
1010 saltlen = saltbits / 4;
1011 if ( saltlen+1 > saltsize )
1014 for ( i = 0; i < saltlen; i++ )
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dtest_enctypes.c57 int saltlen; member in struct:__anon876
213 if (keys[i].saltlen == -1)
216 salt.saltvalue.length = keys[i].saltlen;
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dcrypto.c2835 int iter, saltlen, ret; local
2854 saltlen = p12params.salt.length;
2856 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2862 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/open_ssl/openssl/
H A Devp.h681 unsigned char *salt, int saltlen, int iter,
H A Dx509.h1109 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen);
1111 unsigned char *salt, int saltlen);

Completed in 228 milliseconds