/freebsd-11-stable/lib/libcrypt/ |
H A D | crypt-sha256.c | 69 size_t salt_len, key_len, cnt, rounds; local 99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); 111 SHA256_Update(&ctx, salt, salt_len); 121 SHA256_Update(&alt_ctx, salt, salt_len); 168 SHA256_Update(&alt_ctx, salt, salt_len); 174 cp = s_bytes = alloca(salt_len); 175 for (cnt = salt_len; cnt >= 32; cnt -= 32) { 195 SHA256_Update(&ctx, s_bytes, salt_len); 224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len)); 225 buflen -= MIN((size_t)MAX(0, buflen), salt_len); [all...] |
H A D | crypt-sha512.c | 69 size_t salt_len, key_len, cnt, rounds; local 99 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); 111 SHA512_Update(&ctx, salt, salt_len); 121 SHA512_Update(&alt_ctx, salt, salt_len); 168 SHA512_Update(&alt_ctx, salt, salt_len); 174 cp = s_bytes = alloca(salt_len); 175 for (cnt = salt_len; cnt >= 64; cnt -= 64) { 195 SHA512_Update(&ctx, s_bytes, salt_len); 224 cp = stpncpy(cp, salt, MIN((size_t)MAX(0, buflen), salt_len)); 225 buflen -= MIN((size_t)MAX(0, buflen), salt_len); [all...] |
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, 124 salt_len, salt, derived_key_len, derived_key); 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, round 50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument [all...] |
H A D | archive_cryptor_private.h | 150 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\ 151 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len) 173 size_t salt_len, unsigned rounds, uint8_t *derived_key,
|
H A D | archive_write_set_format_zip.c | 1609 size_t key_len, salt_len; local 1621 salt_len = 8; 1625 salt_len = 16; 1628 if (archive_random(salt, salt_len) != ARCHIVE_OK) { 1634 salt, salt_len, 1000, derived_key, key_len * 2 + 2); 1652 salt[salt_len] = derived_key[key_len * 2]; 1653 salt[salt_len + 1] = derived_key[key_len * 2 + 1]; 1656 ret = __archive_write_output(a, salt, salt_len + 2); 1659 zip->written_bytes += salt_len + 2; 1660 zip->entry_compressed_written += salt_len 1668 size_t key_len, salt_len; local [all...] |
H A D | archive_read_support_format_zip.c | 2717 size_t key_len, salt_len; local 2726 case 1: salt_len = 8; key_len = 16; break; 2727 case 2: salt_len = 12; key_len = 24; break; 2728 case 3: salt_len = 16; key_len = 32; break; 2731 p = __archive_read_ahead(a, salt_len + 2, NULL); 2748 p, salt_len, 1000, derived_key, key_len * 2 + 2); 2757 pv = ((const uint8_t *)p) + salt_len; 2783 __archive_read_consume(a, salt_len + 2); 2784 zip->entry_bytes_remaining -= salt_len + 2 + AUTH_CODE_SIZE; 2788 zip->entry_compressed_bytes_read += salt_len [all...] |
/freebsd-11-stable/contrib/apr-util/include/ |
H A D | apr_md5.h | 147 * @param salt_len The size of the salt data (must be >= 16) 154 apr_size_t salt_len,
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 27 size_t salt_len; member in struct:pkcs5_params 187 params->salt_len = hdr.length; 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); 348 params->salt_len = hdr.length; 350 params->salt, params->salt_len); 395 params->salt, params->salt_len); 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, 423 size_t salt_len, u8 id, unsigned int iter, 441 S_len = v * ((salt_len + v - 1) / v); 447 if (salt_len) { 422 pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, size_t salt_len, u8 id, unsigned int iter, size_t out_len, u8 *out) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ local 431 salt_len = *ptr++; 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); 448 salt_pwd_len[1] = salt_len; 454 (int) salt_len); 455 ptr += salt_len; 468 salt_len = *ptr++; 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); [all...] |
/freebsd-11-stable/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 145 u_int8_t salt_len, logr, minr; local 208 salt_len = BCRYPT_MAXSALT; 224 Blowfish_expandstate(&state, csalt, salt_len, 228 Blowfish_expand0state(&state, csalt, salt_len);
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | passwd.c | 303 size_t passwd_len, salt_len; local 314 salt_len = strlen(salt_out); 315 assert(salt_len <= 8); 323 EVP_DigestUpdate(&md, salt_out, salt_len); 328 EVP_DigestUpdate(&md2, salt_out, salt_len); 348 EVP_DigestUpdate(&md2, salt_out, salt_len); 375 output = salt_out + salt_len;
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_pwd.c | 31 size_t salt_len; member in struct:eap_pwd_data 121 data->salt_len = sm->user->salt_len; 122 if (data->salt_len) { 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); 156 bin_clear_free(data->salt, data->salt_len); 194 if (data->salt_len) 196 data->salt, data->salt_len); 202 if (data->salt_len) { 283 (data->salt ? 1 + data->salt_len [all...] |
H A D | eap.h | 35 size_t salt_len; member in struct:eap_user
|
H A D | eap_server.c | 1820 bin_clear_free(user->salt, user->salt_len);
|
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | apr_passwd.c | 190 apr_size_t salt_len, 195 salt_len, setting, sizeof(setting)) == NULL)
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | authsrv.c | 80 if (eap_user->salt && eap_user->salt_len) { 82 eap_user->salt_len); 85 user->salt_len = eap_user->salt_len;
|
H A D | ap_config.h | 170 size_t salt_len; /* non-zero when password is salted */ member in struct:hostapd_eap_user
|
H A D | ieee802_1x.c | 2273 if (eap_user->salt && eap_user->salt_len) { 2275 eap_user->salt_len); 2278 user->salt_len = eap_user->salt_len;
|
H A D | ap_config.c | 567 bin_clear_free(user->salt, user->salt_len);
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 725 krb5_salttype salttype, void *salt_string, size_t salt_len, 730 paid->salt.saltvalue.data = malloc(salt_len + 1); 735 memcpy(paid->salt.saltvalue.data, salt_string, salt_len); 736 ((char *)paid->salt.saltvalue.data)[salt_len] = '\0'; 737 paid->salt.saltvalue.length = salt_len; 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
|
/freebsd-11-stable/contrib/unbound/sldns/ |
H A D | wire2str.c | 1304 size_t salt_len; local 1307 salt_len = (size_t)(*d)[0]; 1308 if(*dl < 1+salt_len) return -1; 1311 if(salt_len == 0) { 1314 w = print_hex_buf(s, sl, *d, salt_len); 1315 (*dl)-=salt_len; 1316 (*d)+=salt_len;
|
/freebsd-11-stable/crypto/openssh/ |
H A D | hostfile.c | 73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) argument 104 ret = __b64_pton(b64salt, salt, salt_len);
|
/freebsd-11-stable/contrib/wpa/hostapd/ |
H A D | config_file.c | 274 user->salt_len = (pos2 - *pos) / 2; 275 user->salt = os_malloc(user->salt_len); 283 if (hexstr2bin(*pos, user->salt, user->salt_len) < 0) {
|