Searched refs:salt_len (Results 1 - 23 of 23) sorted by relevance

/freebsd-11-stable/lib/libcrypt/
H A Dcrypt-sha256.c69 size_t salt_len, key_len, cnt, rounds; local
99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
111 SHA256_Update(&ctx, salt, salt_len);
121 SHA256_Update(&alt_ctx, salt, salt_len);
168 SHA256_Update(&alt_ctx, salt, salt_len);
174 cp = s_bytes = alloca(salt_len);
175 for (cnt = salt_len; cnt >= 32; cnt -= 32) {
195 SHA256_Update(&ctx, s_bytes, salt_len);
224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len));
225 buflen -= MIN((size_t)MAX(0, buflen), salt_len);
[all...]
H A Dcrypt-sha512.c69 size_t salt_len, key_len, cnt, rounds; local
99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX);
111 SHA512_Update(&ctx, salt, salt_len);
121 SHA512_Update(&alt_ctx, salt, salt_len);
168 SHA512_Update(&alt_ctx, salt, salt_len);
174 cp = s_bytes = alloca(salt_len);
175 for (cnt = salt_len; cnt >= 64; cnt -= 64) {
195 SHA512_Update(&ctx, s_bytes, salt_len);
224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len));
225 buflen -= MIN((size_t)MAX(0, buflen), salt_len);
[all...]
/freebsd-11-stable/contrib/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key,
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds,
67 size_t salt_len, unsigned rounds, uint8_t *derived_key,
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds,
92 size_t salt_len, unsigned rounds, uint8_t *derived_key,
111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key);
121 size_t salt_len, unsigned rounds, uint8_t *derived_key,
124 salt_len, salt, derived_key_len, derived_key);
132 size_t salt_len, unsigned rounds, uint8_t *derived_key,
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, round
50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
[all...]
H A Darchive_cryptor_private.h150 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\
151 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)
173 size_t salt_len, unsigned rounds, uint8_t *derived_key,
H A Darchive_write_set_format_zip.c1609 size_t key_len, salt_len; local
1621 salt_len = 8;
1625 salt_len = 16;
1628 if (archive_random(salt, salt_len) != ARCHIVE_OK) {
1634 salt, salt_len, 1000, derived_key, key_len * 2 + 2);
1652 salt[salt_len] = derived_key[key_len * 2];
1653 salt[salt_len + 1] = derived_key[key_len * 2 + 1];
1656 ret = __archive_write_output(a, salt, salt_len + 2);
1659 zip->written_bytes += salt_len + 2;
1660 zip->entry_compressed_written += salt_len
1668 size_t key_len, salt_len; local
[all...]
H A Darchive_read_support_format_zip.c2717 size_t key_len, salt_len; local
2726 case 1: salt_len = 8; key_len = 16; break;
2727 case 2: salt_len = 12; key_len = 24; break;
2728 case 3: salt_len = 16; key_len = 32; break;
2731 p = __archive_read_ahead(a, salt_len + 2, NULL);
2748 p, salt_len, 1000, derived_key, key_len * 2 + 2);
2757 pv = ((const uint8_t *)p) + salt_len;
2783 __archive_read_consume(a, salt_len + 2);
2784 zip->entry_bytes_remaining -= salt_len + 2 + AUTH_CODE_SIZE;
2788 zip->entry_compressed_bytes_read += salt_len
[all...]
/freebsd-11-stable/contrib/apr-util/include/
H A Dapr_md5.h147 * @param salt_len The size of the salt data (must be >= 16)
154 apr_size_t salt_len,
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dpkcs5.c27 size_t salt_len; member in struct:pkcs5_params
187 params->salt_len = hdr.length;
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
348 params->salt_len = hdr.length;
350 params->salt, params->salt_len);
395 params->salt, params->salt_len);
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
423 size_t salt_len, u8 id, unsigned int iter,
441 S_len = v * ((salt_len + v - 1) / v);
447 if (salt_len) {
422 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_pwd.c368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local
431 salt_len = *ptr++;
432 exp_len = 1 + salt_len + 2 * prime_len + order_len;
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
448 salt_pwd_len[1] = salt_len;
454 (int) salt_len);
455 ptr += salt_len;
468 salt_len = *ptr++;
469 exp_len = 1 + salt_len + 2 * prime_len + order_len;
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len);
[all...]
/freebsd-11-stable/secure/lib/libcrypt/
H A Dcrypt-blowfish.c145 u_int8_t salt_len, logr, minr; local
208 salt_len = BCRYPT_MAXSALT;
224 Blowfish_expandstate(&state, csalt, salt_len,
228 Blowfish_expand0state(&state, csalt, salt_len);
/freebsd-11-stable/crypto/openssl/apps/
H A Dpasswd.c303 size_t passwd_len, salt_len; local
314 salt_len = strlen(salt_out);
315 assert(salt_len <= 8);
323 EVP_DigestUpdate(&md, salt_out, salt_len);
328 EVP_DigestUpdate(&md2, salt_out, salt_len);
348 EVP_DigestUpdate(&md2, salt_out, salt_len);
375 output = salt_out + salt_len;
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_pwd.c31 size_t salt_len; member in struct:eap_pwd_data
121 data->salt_len = sm->user->salt_len;
122 if (data->salt_len) {
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len);
156 bin_clear_free(data->salt, data->salt_len);
194 if (data->salt_len)
196 data->salt, data->salt_len);
202 if (data->salt_len) {
283 (data->salt ? 1 + data->salt_len
[all...]
H A Deap.h35 size_t salt_len; member in struct:eap_user
H A Deap_server.c1820 bin_clear_free(user->salt, user->salt_len);
/freebsd-11-stable/contrib/apr-util/crypto/
H A Dapr_passwd.c190 apr_size_t salt_len,
195 salt_len, setting, sizeof(setting)) == NULL)
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dauthsrv.c80 if (eap_user->salt && eap_user->salt_len) {
82 eap_user->salt_len);
85 user->salt_len = eap_user->salt_len;
H A Dap_config.h170 size_t salt_len; /* non-zero when password is salted */ member in struct:hostapd_eap_user
H A Dieee802_1x.c2273 if (eap_user->salt && eap_user->salt_len) {
2275 eap_user->salt_len);
2278 user->salt_len = eap_user->salt_len;
H A Dap_config.c567 bin_clear_free(user->salt, user->salt_len);
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dinit_creds_pw.c725 krb5_salttype salttype, void *salt_string, size_t salt_len,
730 paid->salt.saltvalue.data = malloc(salt_len + 1);
735 memcpy(paid->salt.saltvalue.data, salt_string, salt_len);
736 ((char *)paid->salt.saltvalue.data)[salt_len] = '\0';
737 paid->salt.saltvalue.length = salt_len;
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
/freebsd-11-stable/contrib/unbound/sldns/
H A Dwire2str.c1304 size_t salt_len; local
1307 salt_len = (size_t)(*d)[0];
1308 if(*dl < 1+salt_len) return -1;
1311 if(salt_len == 0) {
1314 w = print_hex_buf(s, sl, *d, salt_len);
1315 (*dl)-=salt_len;
1316 (*d)+=salt_len;
/freebsd-11-stable/crypto/openssh/
H A Dhostfile.c73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument
104 ret = __b64_pton(b64salt, salt, salt_len);
/freebsd-11-stable/contrib/wpa/hostapd/
H A Dconfig_file.c274 user->salt_len = (pos2 - *pos) / 2;
275 user->salt = os_malloc(user->salt_len);
283 if (hexstr2bin(*pos, user->salt, user->salt_len) < 0) {

Completed in 164 milliseconds