Searched refs:salt (Results 1 - 25 of 247) sorted by path

12345678910

/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/
H A DAuthDBI.pm567 my ($salt, @passwds_to_check);
588 $salt = $Attr->{encryption_salt} eq 'userid' ?
590 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent
592 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt);
1456 selected from the database as salt. Setting this parameter to 'userid',
1457 the module uses the userid as salt.
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/
H A DAuthDBI.pm566 my ($salt, @passwds_to_check);
587 $salt = $Attr->{encryption_salt} eq 'userid' ?
589 #Bug Fix in v0.94 (marked as 0.93 in file. salt was NOT being sent
591 push @passwds_to_check, crypt($params{'passwd_sent'}, $salt);
1453 selected from the database as salt. Setting this parameter to 'userid',
1454 the module uses the userid as salt.
/macosx-10.9.5/CPANInternal-140/Tree-Simple-1.18/lib/Tree/
H A DSimple.pm1180 with a grain of salt, and keep in mind, I wrote B<Tree::Simple> because I
/macosx-10.9.5/CPANInternal-140/Tree-Simple/lib/Tree/
H A DSimple.pm1180 with a grain of salt, and keep in mind, I wrote B<Tree::Simple> because I
/macosx-10.9.5/CommonCrypto-60049/include/
H A DCommonKeyDerivation.h76 @param salt The salt byte values used as input to the derivation
78 @param saltLen The length of the salt in bytes.
95 @result kCCParamError can result from bad values for the password, salt,
103 const uint8_t *salt, size_t saltLen,
119 @param saltLen The length of the salt in bytes.
/macosx-10.9.5/CommonCrypto-60049/lib/
H A DCommonKeyDerivation.c36 const uint8_t *salt, size_t saltLen,
52 if(!password || !salt || !derivedKey || (derivedKeyLen == 0) || (rounds == 0)) return -1;
54 ccpbkdf2_hmac(di, passwordLen, password, saltLen, salt, rounds, derivedKeyLen, derivedKey);
86 uint8_t *salt = NULL; local
100 if((salt = malloc(saltLen)) == NULL) goto error;
101 for(i=0; i<saltLen; i++) salt[i] = i%256;
106 if(CCKeyDerivationPBKDF(algorithm, password, passwordLen, salt, saltLen, prf, ROUNDMEASURE, derivedKey, derivedKeyLen)) goto error;
116 if(salt) free(salt);
35 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen, const uint8_t *salt, size_t saltLen, CCPseudoRandomAlgorithm prf, uint rounds, uint8_t *derivedKey, size_t derivedKeyLen) argument
/macosx-10.9.5/CommonCrypto-60049/test/CommonCrypto/
H A DCommonDigest.c53 PBKDF2Test(char *password, uint8_t *salt, size_t saltlen, int rounds, CCDigestAlgorithm PRF, int dklen, char *expected) argument
63 case 0: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), (uint8_t *) salt, saltlen, 0, rounds, derivedKey->bytes, derivedKey->len); break;
64 case kCCDigestSHA1: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA1, rounds, derivedKey->bytes, derivedKey->len); break;
65 case kCCDigestSHA224: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA224, rounds, derivedKey->bytes, derivedKey->len); break;
66 case kCCDigestSHA256: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA256, rounds, derivedKey->bytes, derivedKey->len); break;
67 case kCCDigestSHA384: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA384, rounds, derivedKey->bytes, derivedKey->len); break;
68 case kCCDigestSHA512: CCKeyDerivationPBKDF(kCCPBKDF2, password, strlen(password), salt, saltlen, kCCPRFHmacAlgSHA512, rounds, derivedKey->bytes, derivedKey->len); break;
459 accum |= PBKDF2Test("password", (uint8_t *) "salt", 4, 1, kCCDigestSHA1, 20, "0c60c80f961f0e71f3a9b524af6012062fe037a6");
460 accum |= PBKDF2Test("password", (uint8_t *) "salt", 4, 2, kCCDigestSHA1, 20, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957");
461 accum |= PBKDF2Test("password", (uint8_t *) "salt",
[all...]
/macosx-10.9.5/Heimdal-323.92.1/admin/
H A Dadd.c147 krb5_salt salt; local
150 salt.salttype = KRB5_PW_SALT;
151 salt.saltvalue.data = NULL;
152 salt.saltvalue.length = 0;
155 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/
H A Drsaencpwd.c456 char *salt, *p; local
461 salt = pwd->pw_passwd;
462 else salt = "xx";
464 p = crypt(passwd, salt);
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dget.c109 * return 0 iff `salt' actually is the same as the current salt in `k'
113 cmp_salt (const krb5_salt *salt, const krb5_key_data *k) argument
115 if (salt->salttype != (size_t)k->key_data_type[1])
117 if (salt->saltvalue.length != (size_t)k->key_data_length[1])
119 return memcmp (salt->saltvalue.data, k->key_data_contents[1],
120 salt->saltvalue.length);
H A Dload.c204 key->salt = calloc(1, sizeof(*key->salt));
205 if (key->salt == NULL)
207 key->salt->type = type;
211 ret = krb5_data_copy(&key->salt->salt, p + 1, p_len - 2);
215 ret = krb5_data_alloc(&key->salt->salt,
222 ((u_char*)key->salt->salt
534 Salt salt; local
[all...]
H A Dstash.c80 krb5_salt salt; local
81 salt.salttype = KRB5_PW_SALT;
83 salt.saltvalue.data = NULL;
84 salt.saltvalue.length = 0;
106 (void)krb5_string_to_key_salt(context, enctype, buf, salt, &key);
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dprotocol.c2420 * salt: krb5_data
2436 krb5_data salt, c1, s1, c2noproof; local
2452 krb5_data_zero(&salt);
2473 ret = krb5_ret_data(request, &salt);
2489 ret = heim_scram_stored_key(method, c->u.password, iterations, &salt,
2530 krb5_data_free(&salt);
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Dkerberos5.c63 set_salt_padata(METHOD_DATA *md, Salt *salt) argument
65 if (salt) {
67 md->val[md->len - 1].padata_type = salt->type;
68 der_copy_octet_string(&salt->salt,
112 if (key->salt == NULL)
114 if (default_salt->salttype != key->salt->type)
116 if (krb5_data_cmp(&default_salt->saltvalue, &key->salt->salt))
124 * one, but preferring one that has default salt
[all...]
H A Dkstash.c103 krb5_salt salt; local
104 salt.salttype = KRB5_PW_SALT;
106 salt.saltvalue.data = NULL;
107 salt.saltvalue.length = 0;
126 krb5_string_to_key_salt(context, enctype, buf, salt, &key);
H A Dstring2key.c74 krb5_salt salt,
82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key);
102 krb5_salt salt; local
167 krb5_get_pw_salt(context, princ, &salt);
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
169 krb5_free_salt(context, salt);
172 salt.salttype = KRB5_PW_SALT;
173 salt.saltvalue.length = 0;
174 salt.saltvalue.data = NULL;
175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerbero
71 tokey(krb5_context context, krb5_enctype enctype, const char *pw, krb5_salt salt, const char *label) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/akadmin/
H A DHeimODAdmin.c1079 krb5_salt salt;
1081 krb5_get_pw_salt(context, princ, &salt);
1091 salt,
1095 /* Now set salt */
1096 key.keys.val[key.keys.len].salt = calloc(1, sizeof(*key.keys.val[key.keys.len].salt));
1097 if (key.keys.val[key.keys.len].salt == NULL)
1100 key.keys.val[key.keys.len].salt->type = salt.salttype;
1101 krb5_data_zero(&key.keys.val[key.keys.len].salt
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/digest/
H A Dinit_sec_context.c40 heim_scram_data *salt,
67 ret = krb5_store_data(request, *salt);
37 calculate(void *ptr, heim_scram_method method, unsigned int iterations, heim_scram_data *salt, const heim_scram_data *c1, const heim_scram_data *s1, const heim_scram_data *c2noproof, heim_scram_data *proof, heim_scram_data *server, heim_scram_data *sessionKey) argument
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/netlogon/
H A Dcrypto.c191 uint8_t *salt,
200 CCHmac(kCCHmacAlgMD5, tmpData, sizeof(tmpData), salt, saltLength, derivedKey);
190 _netlogon_derive_rc4_hmac_key(uint8_t key[16], uint8_t *salt, size_t saltLength, EVP_CIPHER_CTX *rc4Key, int enc) argument
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/
H A Dtest_gssscram.c59 .data = rk_UNCONST("salt"),
66 heim_scram_data *salt,
75 salt->data = malloc(gsalt.length);
76 memcpy(salt->data, gsalt.data, gsalt.length);
77 salt->length = gsalt.length;
64 param(void *ctx, const heim_scram_data *user, heim_scram_data *salt, unsigned int *iteration, heim_scram_data *servernonce) argument
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Ddestest.c223 s2k(char *password, const char *salt, char akey[8]) argument
226 size_t l = strlen(password) + strlen(salt);
229 strcat(pw, salt);
H A Devp.c1344 * @param salt salt salt string, should be an binary 8 byte buffer.
1359 const void *salt,
1395 if (salt)
1396 EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN);
1357 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const void *salt, const void *data, size_t datalen, unsigned int count, void *keydata, void *ivdata) argument
H A Dmd5crypt_test.c42 const char *salt; member in struct:test
58 c = crypt (t->str, t->salt);
H A Dpkcs12.c47 const void *salt, size_t saltlen,
83 if (salt && saltlen > 0) {
85 I[i] = ((unsigned char*)salt)[i % saltlen];
46 PKCS12_key_gen(const void *key, size_t keylen, const void *salt, size_t saltlen, int id, int iteration, size_t outkeysize, void *out, const EVP_MD *md) argument
H A Dpkcs5.c53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key.
57 * @param salt Salt
58 * @param salt_len Length of salt.
70 const void * salt, size_t salt_len,
76 salt, salt_len,
101 memcpy(data, salt, salt_len);
69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void *key) argument

Completed in 336 milliseconds

12345678910