/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/ |
H A D | AuthDBI.pm | 567 my ($salt, @passwds_to_check); 588 $salt = $Attr->{encryption_salt} eq 'userid' ? 590 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent 592 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt); 1456 selected from the database as salt. Setting this parameter to 'userid', 1457 the module uses the userid as salt.
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/ |
H A D | AuthDBI.pm | 566 my ($salt, @passwds_to_check); 587 $salt = $Attr->{encryption_salt} eq 'userid' ? 589 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent 591 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt); 1453 selected from the database as salt. Setting this parameter to 'userid', 1454 the module uses the userid as salt.
|
/macosx-10.9.5/CPANInternal-140/Tree-Simple-1.18/lib/Tree/ |
H A D | Simple.pm | 1180 with a grain of salt, and keep in mind, I wrote B<Tree::Simple> because I
|
/macosx-10.9.5/CPANInternal-140/Tree-Simple/lib/Tree/ |
H A D | Simple.pm | 1180 with a grain of salt, and keep in mind, I wrote B<Tree::Simple> because I
|
/macosx-10.9.5/CommonCrypto-60049/include/ |
H A D | CommonKeyDerivation.h | 76 @param salt The salt byte values used as input to the derivation 78 @param saltLen The length of the salt in bytes. 95 @result kCCParamError can result from bad values for the password, salt, 103 const uint8_t *salt, size_t saltLen, 119 @param saltLen The length of the salt in bytes.
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | CommonKeyDerivation.c | 36 const uint8_t *salt, size_t saltLen, 52 if(!password || !salt || !derivedKey || (derivedKeyLen == 0) || (rounds == 0)) return -1; 54 ccpbkdf2_hmac(di, passwordLen, password, saltLen, salt, rounds, derivedKeyLen, derivedKey); 86 uint8_t *salt = NULL; local 100 if((salt = malloc(saltLen)) == NULL) goto error; 101 for(i=0; i<saltLen; i++) salt[i] = i%256; 106 if(CCKeyDerivationPBKDF(algorithm, password, passwordLen, salt, saltLen, prf, ROUNDMEASURE, derivedKey, derivedKeyLen)) goto error; 116 if(salt) free(salt); 35 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen, const uint8_t *salt, size_t saltLen, CCPseudoRandomAlgorithm prf, uint rounds, uint8_t *derivedKey, size_t derivedKeyLen) argument
|
/macosx-10.9.5/CommonCrypto-60049/test/CommonCrypto/ |
H A D | CommonDigest.c | 53 PBKDF2Test(char *password, uint8_t *salt, size_t saltlen, int rounds, CCDigestAlgorithm PRF, int dklen, char *expected) argument 63 case 0: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), (uint8_t *) salt, saltlen, 0, rounds, derivedKey->bytes, derivedKey->len); break; 64 case kCCDigestSHA1: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA1, rounds, derivedKey->bytes, derivedKey->len); break; 65 case kCCDigestSHA224: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA224, rounds, derivedKey->bytes, derivedKey->len); break; 66 case kCCDigestSHA256: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA256, rounds, derivedKey->bytes, derivedKey->len); break; 67 case kCCDigestSHA384: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA384, rounds, derivedKey->bytes, derivedKey->len); break; 68 case kCCDigestSHA512: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA512, rounds, derivedKey->bytes, derivedKey->len); break; 459 accum |= PBKDF2Test("password", (uint8_t *) "salt", 4, 1, kCCDigestSHA1, 20, "0c60c80f961f0e71f3a9b524af6012062fe037a6"); 460 accum |= PBKDF2Test("password", (uint8_t *) "salt", 4, 2, kCCDigestSHA1, 20, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957"); 461 accum |= PBKDF2Test("password", (uint8_t *) "salt", [all...] |
/macosx-10.9.5/Heimdal-323.92.1/admin/ |
H A D | add.c | 147 krb5_salt salt; local 150 salt.salttype = KRB5_PW_SALT; 151 salt.saltvalue.data = NULL; 152 salt.saltvalue.length = 0; 155 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
|
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 456 char *salt, *p; local 461 salt = pwd->pw_passwd; 462 else salt = "xx"; 464 p = crypt(passwd, salt);
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | get.c | 109 * return 0 iff `salt' actually is the same as the current salt in `k' 113 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument 115 if (salt->salttype != (size_t)k->key_data_type[1]) 117 if (salt->saltvalue.length != (size_t)k->key_data_length[1]) 119 return memcmp (salt->saltvalue.data, k->key_data_contents[1], 120 salt->saltvalue.length);
|
H A D | load.c | 204 key->salt = calloc(1, sizeof(*key->salt)); 205 if (key->salt == NULL) 207 key->salt->type = type; 211 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2); 215 ret = krb5_data_alloc(&key->salt->salt, 222 ((u_char*)key->salt->salt 534 Salt salt; local [all...] |
H A D | stash.c | 80 krb5_salt salt; local 81 salt.salttype = KRB5_PW_SALT; 83 salt.saltvalue.data = NULL; 84 salt.saltvalue.length = 0; 106 (void)krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | protocol.c | 2420 * salt: krb5_data 2436 krb5_data salt, c1, s1, c2noproof; local 2452 krb5_data_zero(&salt); 2473 ret = krb5_ret_data(request, &salt); 2489 ret = heim_scram_stored_key(method, c->u.password, iterations, &salt, 2530 krb5_data_free(&salt);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | kerberos5.c | 63 set_salt_padata(METHOD_DATA *md, Salt *salt) argument 65 if (salt) { 67 md->val[md->len - 1].padata_type = salt->type; 68 der_copy_octet_string(&salt->salt, 112 if (key->salt == NULL) 114 if (default_salt->salttype != key->salt->type) 116 if (krb5_data_cmp(&default_salt->saltvalue, &key->salt->salt)) 124 * one, but preferring one that has default salt [all...] |
H A D | kstash.c | 103 krb5_salt salt; local 104 salt.salttype = KRB5_PW_SALT; 106 salt.saltvalue.data = NULL; 107 salt.saltvalue.length = 0; 126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
H A D | string2key.c | 74 krb5_salt salt, 82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key); 102 krb5_salt salt; local 167 krb5_get_pw_salt(context, princ, &salt); 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 169 krb5_free_salt(context, salt); 172 salt.salttype = KRB5_PW_SALT; 173 salt.saltvalue.length = 0; 174 salt.saltvalue.data = NULL; 175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerbero 71 tokey(krb5_context context, krb5_enctype enctype, const char *pw, krb5_salt salt, const char *label) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/akadmin/ |
H A D | HeimODAdmin.c | 1079 krb5_salt salt; 1081 krb5_get_pw_salt(context, princ, &salt); 1091 salt, 1095 /* Now set salt */ 1096 key.keys.val[key.keys.len].salt = calloc(1, sizeof(*key.keys.val[key.keys.len].salt)); 1097 if (key.keys.val[key.keys.len].salt == NULL) 1100 key.keys.val[key.keys.len].salt->type = salt.salttype; 1101 krb5_data_zero(&key.keys.val[key.keys.len].salt [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/digest/ |
H A D | init_sec_context.c | 40 heim_scram_data *salt, 67 ret = krb5_store_data(request, *salt); 37 calculate(void *ptr, heim_scram_method method, unsigned int iterations, heim_scram_data *salt, const heim_scram_data *c1, const heim_scram_data *s1, const heim_scram_data *c2noproof, heim_scram_data *proof, heim_scram_data *server, heim_scram_data *sessionKey) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/netlogon/ |
H A D | crypto.c | 191 uint8_t *salt, 200 CCHmac(kCCHmacAlgMD5, tmpData, sizeof(tmpData), salt, saltLength, derivedKey); 190 _netlogon_derive_rc4_hmac_key(uint8_t key[16], uint8_t *salt, size_t saltLength, EVP_CIPHER_CTX *rc4Key, int enc) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/ |
H A D | test_gssscram.c | 59 .data = rk_UNCONST("salt"), 66 heim_scram_data *salt, 75 salt->data = malloc(gsalt.length); 76 memcpy(salt->data, gsalt.data, gsalt.length); 77 salt->length = gsalt.length; 64 param(void *ctx, const heim_scram_data *user, heim_scram_data *salt, unsigned int *iteration, heim_scram_data *servernonce) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | destest.c | 223 s2k(char *password, const char *salt, char akey[8]) argument 226 size_t l = strlen(password) + strlen(salt); 229 strcat(pw, salt);
|
H A D | evp.c | 1344 * @param salt salt salt string, should be an binary 8 byte buffer. 1359 const void *salt, 1395 if (salt) 1396 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN); 1357 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
|
H A D | md5crypt_test.c | 42 const char *salt; member in struct:test 58 c = crypt (t->str, t->salt);
|
H A D | pkcs12.c | 47 const void *salt, size_t saltlen, 83 if (salt && saltlen > 0) { 85 I[i] = ((unsigned char*)salt)[i % saltlen]; 46 PKCS12_key_gen(const void *key, size_t keylen, const void *salt, size_t saltlen, int id, int iteration, size_t outkeysize, void *out, const EVP_MD *md) argument
|
H A D | pkcs5.c | 53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key. 57 * @param salt Salt 58 * @param salt_len Length of salt. 70 const void * salt, size_t salt_len, 76 salt, salt_len, 101 memcpy(data, salt, salt_len); 69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void *key) argument
|