HomeSort by: relevance | last modified time | path
    Searched defs:salt (Results 1 - 25 of 174) sorted by relevancy

1 2 3 4 5 6 7

  /src/libexec/makekey/
makekey.c 56 char *r, key[9], salt[3]; local
59 get(salt, sizeof(salt) - 1);
60 len = strlen(r = crypt(key, salt));
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/
kdf_blake2b.c 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local
41 STORE64_LE(salt, subkey_id);
42 memset(salt + 8, 0, (sizeof salt) - 8);
51 salt, ctx_padded);
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
md5crypt_test.c 42 const char *salt; member in struct:test
58 c = crypt (t->str, t->salt);
test_pkcs12.c 45 void *salt; member in struct:tests
113 t->salt, t->saltsize,
test_pkcs5.c 44 const char *salt; member in struct:tests
113 t->salt, strlen(t->salt),
125 t->salt, strlen(t->salt),
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
rename_s.c 72 /* fix salt */
74 Salt salt; local
76 memset(&salt, 0, sizeof(salt));
78 salt.type = hdb_pw_salt;
79 salt.salt = salt2.saltvalue;
81 if(ent.entry.keys.val[i].salt == NULL){
82 ent.entry.keys.val[i].salt
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_crpt.c 26 unsigned char *salt; local
29 unsigned char *salt, int slen,
51 salt = pbe->salt->data;
52 saltlen = pbe->salt->length;
53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
  /src/external/bsd/openldap/dist/libraries/liblutil/
ptest.c 67 struct berval *salt; local
77 &passwd, &salt, hash[i] );
93 rc = lutil_authpasswd( &pw[j], passwd, salt, NULL );
103 rc = lutil_authpasswd( passwd, salt, &bad, NULL );
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
nsec3param_51.h 30 unsigned char *salt; member in struct:dns_rdata_nsec3param
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
nsec3param_51.h 31 unsigned char *salt; member in struct:dns_rdata_nsec3param
  /src/sys/external/isc/libsodium/dist/test/default/
generichash3.c 10 unsigned char salt[crypto_generichash_blake2b_SALTBYTES] local
32 1 + i % crypto_generichash_blake2b_BYTES_MAX, salt, personal);
44 &st, k, 0U, crypto_generichash_blake2b_BYTES_MAX, salt, personal);
55 &st, NULL, 1U, crypto_generichash_blake2b_BYTES_MAX, salt, personal);
79 crypto_generichash_blake2b_BYTES_MAX, salt, NULL);
91 k, 0U, salt, personal);
100 NULL, 0U, salt, personal);
109 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, personal);
127 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, NULL);
156 salt, NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/crmf/
crmf_pbm.c 44 unsigned char *salt = NULL; local
50 * salt contains a randomly generated value used in computing the key
51 * of the MAC process. The salt SHOULD be at least 8 octets (64
54 if ((salt = OPENSSL_malloc(slen)) == NULL)
56 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) {
60 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen))
107 OPENSSL_free(salt);
110 OPENSSL_free(salt);
117 * |pbmp| identifies the algorithms, salt to us
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/
p12_crpt.c 30 unsigned char *salt; local
49 salt = pbe->salt->data;
50 saltlen = pbe->salt->length;
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID,
  /src/crypto/external/bsd/heimdal/dist/admin/
add.c 129 krb5_salt salt; local
132 salt.salttype = KRB5_PW_SALT;
133 salt.saltvalue.data = NULL;
134 salt.saltvalue.length = 0;
137 ret = krb5_string_to_key_data_salt(context, enctype, pw, salt,
  /src/crypto/external/bsd/heimdal/dist/kadmin/
stash.c 84 krb5_salt salt; local
85 salt.salttype = KRB5_PW_SALT;
87 salt.saltvalue.data = NULL;
88 salt.saltvalue.length = 0;
110 ret = krb5_string_to_key_salt(context, enctype, buf, salt, &key);
  /src/crypto/external/bsd/openssl/dist/crypto/crmf/
crmf_pbm.c 46 unsigned char *salt = NULL; local
52 * salt contains a randomly generated value used in computing the key
53 * of the MAC process. The salt SHOULD be at least 8 octets (64
56 if ((salt = OPENSSL_malloc(slen)) == NULL)
58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) {
62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen))
109 OPENSSL_free(salt);
112 OPENSSL_free(salt);
119 * |pbmp| identifies the algorithms, salt to us
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
p12_crpt.c 30 unsigned char *salt; local
49 salt = pbe->salt->data;
50 saltlen = pbe->salt->length;
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID,
  /src/crypto/external/bsd/openssl.old/dist/crypto/evp/
p5_crpt.c 34 unsigned char *salt; local
68 salt = pbe->salt->data;
69 saltlen = pbe->salt->length;
86 if (!EVP_DigestUpdate(ctx, salt, saltlen))
  /src/external/gpl3/gcc/dist/libgcc/config/aarch64/
aarch64-unwind.h 72 _Unwind_Word salt = (_Unwind_Word) context->cfa; local
74 return __builtin_aarch64_autib1716 (addr, salt);
75 return __builtin_aarch64_autia1716 (addr, salt);
  /src/external/gpl3/gcc.old/dist/libgcc/config/aarch64/
aarch64-unwind.h 64 _Unwind_Word salt = (_Unwind_Word) context->cfa; local
66 return __builtin_aarch64_autib1716 (addr, salt);
67 return __builtin_aarch64_autia1716 (addr, salt);
  /src/external/mpl/bind/dist/tests/bench/
iterated_hash.c 28 time_it(const int count, const int iterations, const unsigned char *salt,
33 printf("%d iterations, %d salt length, %d input length: ", iterations,
41 isc_iterated_hash(out, 1, iterations, salt, saltlen, in, inlen);
53 uint8_t salt[DNS_NAME_MAXWIRE]; local
55 size_t saltlen = sizeof(salt);
58 isc_random_buf(salt, saltlen);
61 time_it(10000, 150, salt, saltlen, in, inlen);
62 time_it(10000, 15, salt, saltlen, in, inlen);
63 time_it(10000, 0, salt, saltlen, in, inlen);
68 time_it(10000, 150, salt, 32, in, inlen)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
p5_crpt.c 36 unsigned char *salt; local
71 salt = pbe->salt->data;
72 saltlen = pbe->salt->length;
91 salt, saltlen);
  /src/crypto/external/apache2/openssl/dist/demos/kdf/
argon2.c 37 * The salt is better not being hard coded too. Each password should have a
38 * different salt if possible. The salt is not considered secret information
41 static unsigned char salt[] = { variable
121 /* Set salt */
122 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT, salt, sizeof(salt));
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
p5_crpt.c 36 unsigned char *salt; local
72 salt = pbe->salt->data;
73 saltlen = pbe->salt->length;
92 salt, saltlen);
  /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/
rsa_pss.c 56 * -2 salt length is autorecovered from signature
57 * -3 salt length is maximized
153 unsigned char *H, *salt = NULL, *p; local
165 * -2 salt length is maximized
197 salt = OPENSSL_malloc(sLen);
198 if (salt == NULL) {
203 if (RAND_bytes(salt, sLen) <= 0)
215 if (sLen && !EVP_DigestUpdate(ctx, salt, sLen))
234 *p++ ^= salt[i];
247 OPENSSL_clear_free(salt, (size_t)sLen); /* salt != NULL implies sLen > 0 *
    [all...]

Completed in 44 milliseconds

1 2 3 4 5 6 7