| /src/libexec/makekey/ |
| makekey.c | 56 char *r, key[9], salt[3]; local 59 get(salt, sizeof(salt) - 1); 60 len = strlen(r = crypt(key, salt));
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/ |
| kdf_blake2b.c | 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local 41 STORE64_LE(salt, subkey_id); 42 memset(salt + 8, 0, (sizeof salt) - 8); 51 salt, ctx_padded);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| md5crypt_test.c | 42 const char *salt; member in struct:test 58 c = crypt (t->str, t->salt);
|
| test_pkcs12.c | 45 void *salt; member in struct:tests 113 t->salt, t->saltsize,
|
| test_pkcs5.c | 44 const char *salt; member in struct:tests 113 t->salt, strlen(t->salt), 125 t->salt, strlen(t->salt),
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| rename_s.c | 72 /* fix salt */ 74 Salt salt; local 76 memset(&salt, 0, sizeof(salt)); 78 salt.type = hdb_pw_salt; 79 salt.salt = salt2.saltvalue; 81 if(ent.entry.keys.val[i].salt == NULL){ 82 ent.entry.keys.val[i].salt [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_crpt.c | 26 unsigned char *salt; local 29 unsigned char *salt, int slen, 51 salt = pbe->salt->data; 52 saltlen = pbe->salt->length; 53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
| /src/external/bsd/openldap/dist/libraries/liblutil/ |
| ptest.c | 67 struct berval *salt; local 77 &passwd, &salt, hash[i] ); 93 rc = lutil_authpasswd( &pw[j], passwd, salt, NULL ); 103 rc = lutil_authpasswd( passwd, salt, &bad, NULL );
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| nsec3param_51.h | 30 unsigned char *salt; member in struct:dns_rdata_nsec3param
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| nsec3param_51.h | 31 unsigned char *salt; member in struct:dns_rdata_nsec3param
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| generichash3.c | 10 unsigned char salt[crypto_generichash_blake2b_SALTBYTES] local 32 1 + i % crypto_generichash_blake2b_BYTES_MAX, salt, personal); 44 &st, k, 0U, crypto_generichash_blake2b_BYTES_MAX, salt, personal); 55 &st, NULL, 1U, crypto_generichash_blake2b_BYTES_MAX, salt, personal); 79 crypto_generichash_blake2b_BYTES_MAX, salt, NULL); 91 k, 0U, salt, personal); 100 NULL, 0U, salt, personal); 109 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, personal); 127 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, NULL); 156 salt, NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/crmf/ |
| crmf_pbm.c | 44 unsigned char *salt = NULL; local 50 * salt contains a randomly generated value used in computing the key 51 * of the MAC process. The salt SHOULD be at least 8 octets (64 54 if ((salt = OPENSSL_malloc(slen)) == NULL) 56 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { 60 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) 107 OPENSSL_free(salt); 110 OPENSSL_free(salt); 117 * |pbmp| identifies the algorithms, salt to us [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_crpt.c | 30 unsigned char *salt; local 49 salt = pbe->salt->data; 50 saltlen = pbe->salt->length; 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| add.c | 129 krb5_salt salt; local 132 salt.salttype = KRB5_PW_SALT; 133 salt.saltvalue.data = NULL; 134 salt.saltvalue.length = 0; 137 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| stash.c | 84 krb5_salt salt; local 85 salt.salttype = KRB5_PW_SALT; 87 salt.saltvalue.data = NULL; 88 salt.saltvalue.length = 0; 110 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
|
| /src/crypto/external/bsd/openssl/dist/crypto/crmf/ |
| crmf_pbm.c | 46 unsigned char *salt = NULL; local 52 * salt contains a randomly generated value used in computing the key 53 * of the MAC process. The salt SHOULD be at least 8 octets (64 56 if ((salt = OPENSSL_malloc(slen)) == NULL) 58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { 62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) 109 OPENSSL_free(salt); 112 OPENSSL_free(salt); 119 * |pbmp| identifies the algorithms, salt to us [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_crpt.c | 30 unsigned char *salt; local 49 salt = pbe->salt->data; 50 saltlen = pbe->salt->length; 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| p5_crpt.c | 34 unsigned char *salt; local 68 salt = pbe->salt->data; 69 saltlen = pbe->salt->length; 86 if (!EVP_DigestUpdate(ctx, salt, saltlen))
|
| /src/external/gpl3/gcc/dist/libgcc/config/aarch64/ |
| aarch64-unwind.h | 72 _Unwind_Word salt = (_Unwind_Word) context->cfa; local 74 return __builtin_aarch64_autib1716 (addr, salt); 75 return __builtin_aarch64_autia1716 (addr, salt);
|
| /src/external/gpl3/gcc.old/dist/libgcc/config/aarch64/ |
| aarch64-unwind.h | 64 _Unwind_Word salt = (_Unwind_Word) context->cfa; local 66 return __builtin_aarch64_autib1716 (addr, salt); 67 return __builtin_aarch64_autia1716 (addr, salt);
|
| /src/external/mpl/bind/dist/tests/bench/ |
| iterated_hash.c | 28 time_it(const int count, const int iterations, const unsigned char *salt, 33 printf("%d iterations, %d salt length, %d input length: ", iterations, 41 isc_iterated_hash(out, 1, iterations, salt, saltlen, in, inlen); 53 uint8_t salt[DNS_NAME_MAXWIRE]; local 55 size_t saltlen = sizeof(salt); 58 isc_random_buf(salt, saltlen); 61 time_it(10000, 150, salt, saltlen, in, inlen); 62 time_it(10000, 15, salt, saltlen, in, inlen); 63 time_it(10000, 0, salt, saltlen, in, inlen); 68 time_it(10000, 150, salt, 32, in, inlen) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p5_crpt.c | 36 unsigned char *salt; local 71 salt = pbe->salt->data; 72 saltlen = pbe->salt->length; 91 salt, saltlen);
|
| /src/crypto/external/apache2/openssl/dist/demos/kdf/ |
| argon2.c | 37 * The salt is better not being hard coded too. Each password should have a 38 * different salt if possible. The salt is not considered secret information 41 static unsigned char salt[] = { variable 121 /* Set salt */ 122 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT, salt, sizeof(salt));
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| p5_crpt.c | 36 unsigned char *salt; local 72 salt = pbe->salt->data; 73 saltlen = pbe->salt->length; 92 salt, saltlen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_pss.c | 56 * -2 salt length is autorecovered from signature 57 * -3 salt length is maximized 153 unsigned char *H, *salt = NULL, *p; local 165 * -2 salt length is maximized 197 salt = OPENSSL_malloc(sLen); 198 if (salt == NULL) { 203 if (RAND_bytes(salt, sLen) <= 0) 215 if (sLen && !EVP_DigestUpdate(ctx, salt, sLen)) 234 *p++ ^= salt[i]; 247 OPENSSL_clear_free(salt, (size_t)sLen); /* salt != NULL implies sLen > 0 * [all...] |