| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evpkdf_pvkkdf.txt | 20 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:salt 34 Ctrl.salt = salt:saltsalt
|
| evpkdf_pbkdf1.txt | 19 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:saltsalt 35 Ctrl.salt = salt:saltsalt 43 Ctrl.salt = salt:saltsalt 51 Ctrl.salt = salt:saltsal [all...] |
| evpkdf_pbkdf2.txt | 20 Ctrl.salt = salt:salt 29 Ctrl.salt = salt:salt 38 Ctrl.salt = salt:salt 47 Ctrl.salt = salt:sal [all...] |
| evpkdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChlorid [all...] |
| evppkey_kdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChlorid [all...] |
| /src/external/mpl/bind/dist/tests/bench/ |
| iterated_hash.c | 28 time_it(const int count, const int iterations, const unsigned char *salt, 33 printf("%d iterations, %d salt length, %d input length: ", iterations, 41 isc_iterated_hash(out, 1, iterations, salt, saltlen, in, inlen); 53 uint8_t salt[DNS_NAME_MAXWIRE]; local 55 size_t saltlen = sizeof(salt); 58 isc_random_buf(salt, saltlen); 61 time_it(10000, 150, salt, saltlen, in, inlen); 62 time_it(10000, 15, salt, saltlen, in, inlen); 63 time_it(10000, 0, salt, saltlen, in, inlen); 68 time_it(10000, 150, salt, 32, in, inlen) [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evpkdf_pbkdf2.txt | 19 Ctrl.salt = salt:salt 27 Ctrl.salt = salt:salt 35 Ctrl.salt = salt:salt 43 Ctrl.salt = salt:sal [all...] |
| evpkdf_pbkdf1.txt | 19 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:saltsalt 35 Ctrl.salt = salt:saltsalt 43 Ctrl.salt = salt:saltsalt 51 Ctrl.salt = salt:saltsal [all...] |
| evpkdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChlorid [all...] |
| evppkey_kdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChlorid [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=10$roundstoolow', 42 salt => 'saltstring', 46 salt => 'rounds=10000$saltstringsaltstring', 50 salt => 'rounds=5000$toolongsaltstring', 54 salt => 'rounds=1400$anotherlongsaltstring', 58 salt => 'rounds=10$roundstoolow' [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=10$roundstoolow', 42 salt => 'saltstring', 46 salt => 'rounds=10000$saltstringsaltstring', 50 salt => 'rounds=5000$toolongsaltstring', 54 salt => 'rounds=1400$anotherlongsaltstring', 58 salt => 'rounds=10$roundstoolow' [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=77777$short', 39 key => 'we have a short salt string but not a short password', 42 salt => 'rounds=123456$asaltof16chars..', 46 salt => 'rounds=10$roundstoolow', 50 salt => 'saltstring', 54 salt => 'rounds=10000$saltstringsaltstring' [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| keys.c | 62 keys[i].salt = NULL; 81 if ((keys1[i].salt != NULL && keys2[j].salt == NULL) 82 || (keys1[i].salt == NULL && keys2[j].salt != NULL)) 85 if (keys1[i].salt != NULL) { 86 if (keys1[i].salt->type != keys2[j].salt->type) 88 if (keys1[i].salt->salt.length != keys2[j].salt->salt.length [all...] |
| default_keys.c | 60 if (keys[i].salt) { 61 printf(" salt: "); 63 switch (keys[i].salt->type) { 65 printf("pw-salt:"); 68 printf("afs3-salt:"); 71 printf("unknown salt: %d", keys[i].salt->type); 74 if (keys[i].salt->salt.length) 75 printf("%.*s", (int)keys[i].salt->salt.length [all...] |
| rename_s.c | 72 /* fix salt */ 74 Salt salt; local 76 memset(&salt, 0, sizeof(salt)); 78 salt.type = hdb_pw_salt; 79 salt.salt = salt2.saltvalue; 81 if(ent.entry.keys.val[i].salt == NULL){ 82 ent.entry.keys.val[i].salt [all...] |
| /src/lib/libcrypt/ |
| pw_gensalt.c | 86 __gensalt_old(char *salt, size_t saltsiz, const char *option) 92 __crypt_to64(&salt[0], arc4random(), 2); 93 salt[2] = '\0'; 99 __gensalt_new(char *salt, size_t saltsiz, const char* option) 116 salt[0] = _PASSWORD_EFMT1; 117 __crypt_to64(&salt[1], (uint32_t)nrounds, 4); 118 __crypt_to64(&salt[5], arc4random(), 4); 119 salt[9] = '\0'; 125 __gensalt_md5(char *salt, size_t saltsiz, const char *option) 127 if (saltsiz < 13) { /* $1$8salt$\0 * [all...] |
| crypt-sha1.c | 54 * Support a reasonably? long salt. 90 * $<tag>$<iterations>$<salt>$<digest> 99 * <salt> up to 64 bytes of random data, 8 bytes is 110 __crypt_sha1 (const char *pw, const char *salt) 128 * Salt format is 129 * $<tag>$<iterations>$salt[$] 134 if (!strncmp(salt, magic, strlen(magic))) { 135 salt += strlen(magic); 137 iterations = strtoul(salt, &ep, 10); 140 salt = ep + 1; /* skip over the '$' * [all...] |
| bcrypt.c | 35 * 2. state := ExpandKey (state, salt, password) 3. 37 * state := ExpandKey (state, 0, salt) 42 * 6. RETURN Concatenate (salt, ctext); 68 #define BCRYPT_MINROUNDS 16 /* we have log2(rounds) in salt */ 137 encode_salt(char *salt, u_int8_t *csalt, u_int16_t clen, u_int8_t logr) 139 salt[0] = '$'; 140 salt[1] = BCRYPT_VERSION; 141 salt[2] = 'a'; 142 salt[3] = '$'; 144 snprintf(salt + 4, 4, "%2.2u$", logr) [all...] |
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/ |
| kdf_blake2b.c | 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local 41 STORE64_LE(salt, subkey_id); 42 memset(salt + 8, 0, (sizeof salt) - 8); 51 salt, ctx_padded);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_crpt.c | 26 unsigned char *salt; local 29 unsigned char *salt, int slen, 51 salt = pbe->salt->data; 52 saltlen = pbe->salt->length; 53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| keys.c | 65 if (keys[i].salt != NULL) { 66 free_Salt(keys[i].salt); 67 free(keys[i].salt); 68 keys[i].salt = NULL; 77 * of etype:salttype:salt, syntax of this if something like: 78 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it 81 * v5 == pw-salt, and 82 * v4 == des:pw-salt: 83 * afs or afs3 == des:afs3-salt 101 krb5_salt *salt, krb5_principal principal 674 krb5_salt salt; local 793 krb5_salt salt; local [all...] |
| /src/libexec/makekey/ |
| makekey.c | 56 char *r, key[9], salt[3]; local 59 get(salt, sizeof(salt) - 1); 60 len = strlen(r = crypt(key, salt));
|
| /src/external/bsd/nsd/dist/ |
| iterated_hash.h | 19 const unsigned char *salt,int saltlength,
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/ |
| apr1-atol.pl | 17 ($_,$_,$salt,$hash) = split(/\$/, $hash);
24 $hash .= $salt;
|