HomeSort by: relevance | last modified time | path
    Searched refs:salt (Results 1 - 25 of 416) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evpkdf_pvkkdf.txt 20 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:salt
34 Ctrl.salt = salt:saltsalt
evpkdf_pbkdf1.txt 19 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:saltsalt
35 Ctrl.salt = salt:saltsalt
43 Ctrl.salt = salt:saltsalt
51 Ctrl.salt = salt:saltsal
    [all...]
evpkdf_pbkdf2.txt 20 Ctrl.salt = salt:salt
29 Ctrl.salt = salt:salt
38 Ctrl.salt = salt:salt
47 Ctrl.salt = salt:sal
    [all...]
evpkdf_scrypt.txt 18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChlorid
    [all...]
evppkey_kdf_scrypt.txt 18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChlorid
    [all...]
  /src/external/mpl/bind/dist/tests/bench/
iterated_hash.c 28 time_it(const int count, const int iterations, const unsigned char *salt,
33 printf("%d iterations, %d salt length, %d input length: ", iterations,
41 isc_iterated_hash(out, 1, iterations, salt, saltlen, in, inlen);
53 uint8_t salt[DNS_NAME_MAXWIRE]; local
55 size_t saltlen = sizeof(salt);
58 isc_random_buf(salt, saltlen);
61 time_it(10000, 150, salt, saltlen, in, inlen);
62 time_it(10000, 15, salt, saltlen, in, inlen);
63 time_it(10000, 0, salt, saltlen, in, inlen);
68 time_it(10000, 150, salt, 32, in, inlen)
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evpkdf_pbkdf2.txt 19 Ctrl.salt = salt:salt
27 Ctrl.salt = salt:salt
35 Ctrl.salt = salt:salt
43 Ctrl.salt = salt:sal
    [all...]
evpkdf_pbkdf1.txt 19 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:saltsalt
35 Ctrl.salt = salt:saltsalt
43 Ctrl.salt = salt:saltsalt
51 Ctrl.salt = salt:saltsal
    [all...]
evpkdf_scrypt.txt 18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChlorid
    [all...]
evppkey_kdf_scrypt.txt 18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChlorid
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/recipes/
20-test_passwd.t 22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=10$roundstoolow',
42 salt => 'saltstring',
46 salt => 'rounds=10000$saltstringsaltstring',
50 salt => 'rounds=5000$toolongsaltstring',
54 salt => 'rounds=1400$anotherlongsaltstring',
58 salt => 'rounds=10$roundstoolow'
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
20-test_passwd.t 22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=10$roundstoolow',
42 salt => 'saltstring',
46 salt => 'rounds=10000$saltstringsaltstring',
50 salt => 'rounds=5000$toolongsaltstring',
54 salt => 'rounds=1400$anotherlongsaltstring',
58 salt => 'rounds=10$roundstoolow'
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
20-test_passwd.t 22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=77777$short',
39 key => 'we have a short salt string but not a short password',
42 salt => 'rounds=123456$asaltof16chars..',
46 salt => 'rounds=10$roundstoolow',
50 salt => 'saltstring',
54 salt => 'rounds=10000$saltstringsaltstring'
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
keys.c 62 keys[i].salt = NULL;
81 if ((keys1[i].salt != NULL && keys2[j].salt == NULL)
82 || (keys1[i].salt == NULL && keys2[j].salt != NULL))
85 if (keys1[i].salt != NULL) {
86 if (keys1[i].salt->type != keys2[j].salt->type)
88 if (keys1[i].salt->salt.length != keys2[j].salt->salt.length
    [all...]
default_keys.c 60 if (keys[i].salt) {
61 printf(" salt: ");
63 switch (keys[i].salt->type) {
65 printf("pw-salt:");
68 printf("afs3-salt:");
71 printf("unknown salt: %d", keys[i].salt->type);
74 if (keys[i].salt->salt.length)
75 printf("%.*s", (int)keys[i].salt->salt.length
    [all...]
rename_s.c 72 /* fix salt */
74 Salt salt; local
76 memset(&salt, 0, sizeof(salt));
78 salt.type = hdb_pw_salt;
79 salt.salt = salt2.saltvalue;
81 if(ent.entry.keys.val[i].salt == NULL){
82 ent.entry.keys.val[i].salt
    [all...]
  /src/lib/libcrypt/
pw_gensalt.c 86 __gensalt_old(char *salt, size_t saltsiz, const char *option)
92 __crypt_to64(&salt[0], arc4random(), 2);
93 salt[2] = '\0';
99 __gensalt_new(char *salt, size_t saltsiz, const char* option)
116 salt[0] = _PASSWORD_EFMT1;
117 __crypt_to64(&salt[1], (uint32_t)nrounds, 4);
118 __crypt_to64(&salt[5], arc4random(), 4);
119 salt[9] = '\0';
125 __gensalt_md5(char *salt, size_t saltsiz, const char *option)
127 if (saltsiz < 13) { /* $1$8salt$\0 *
    [all...]
crypt-sha1.c 54 * Support a reasonably? long salt.
90 * $<tag>$<iterations>$<salt>$<digest>
99 * <salt> up to 64 bytes of random data, 8 bytes is
110 __crypt_sha1 (const char *pw, const char *salt)
128 * Salt format is
129 * $<tag>$<iterations>$salt[$]
134 if (!strncmp(salt, magic, strlen(magic))) {
135 salt += strlen(magic);
137 iterations = strtoul(salt, &ep, 10);
140 salt = ep + 1; /* skip over the '$' *
    [all...]
bcrypt.c 35 * 2. state := ExpandKey (state, salt, password) 3.
37 * state := ExpandKey (state, 0, salt)
42 * 6. RETURN Concatenate (salt, ctext);
68 #define BCRYPT_MINROUNDS 16 /* we have log2(rounds) in salt */
137 encode_salt(char *salt, u_int8_t *csalt, u_int16_t clen, u_int8_t logr)
139 salt[0] = '$';
140 salt[1] = BCRYPT_VERSION;
141 salt[2] = 'a';
142 salt[3] = '$';
144 snprintf(salt + 4, 4, "%2.2u$", logr)
    [all...]
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/
kdf_blake2b.c 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local
41 STORE64_LE(salt, subkey_id);
42 memset(salt + 8, 0, (sizeof salt) - 8);
51 salt, ctx_padded);
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_crpt.c 26 unsigned char *salt; local
29 unsigned char *salt, int slen,
51 salt = pbe->salt->data;
52 saltlen = pbe->salt->length;
53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
  /src/crypto/external/bsd/heimdal/dist/lib/hdb/
keys.c 65 if (keys[i].salt != NULL) {
66 free_Salt(keys[i].salt);
67 free(keys[i].salt);
68 keys[i].salt = NULL;
77 * of etype:salttype:salt, syntax of this if something like:
78 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it
81 * v5 == pw-salt, and
82 * v4 == des:pw-salt:
83 * afs or afs3 == des:afs3-salt
101 krb5_salt *salt, krb5_principal principal
674 krb5_salt salt; local
793 krb5_salt salt; local
    [all...]
  /src/libexec/makekey/
makekey.c 56 char *r, key[9], salt[3]; local
59 get(salt, sizeof(salt) - 1);
60 len = strlen(r = crypt(key, salt));
  /src/external/bsd/nsd/dist/
iterated_hash.h 19 const unsigned char *salt,int saltlength,
  /src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/
apr1-atol.pl 17 ($_,$_,$salt,$hash) = split(/\$/, $hash);
24 $hash .= $salt;

Completed in 52 milliseconds

1 2 3 4 5 6 7 8 91011>>