HomeSort by: relevance | last modified time | path
    Searched defs:salt (Results 1 - 21 of 21) sorted by relevancy

  /src/libexec/makekey/
makekey.c 56 char *r, key[9], salt[3]; local in function:main
59 get(salt, sizeof(salt) - 1);
60 len = strlen(r = crypt(key, salt));
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/
kdf_blake2b.c 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local in function:crypto_kdf_blake2b_derive_from_key
41 STORE64_LE(salt, subkey_id);
42 memset(salt + 8, 0, (sizeof salt) - 8);
51 salt, ctx_padded);
  /src/sys/external/isc/libsodium/dist/test/default/
generichash3.c 10 unsigned char salt[crypto_generichash_blake2b_SALTBYTES] local in function:main
32 1 + i % crypto_generichash_blake2b_BYTES_MAX, salt, personal);
44 &st, k, 0U, crypto_generichash_blake2b_BYTES_MAX, salt, personal);
55 &st, NULL, 1U, crypto_generichash_blake2b_BYTES_MAX, salt, personal);
79 crypto_generichash_blake2b_BYTES_MAX, salt, NULL);
91 k, 0U, salt, personal);
100 NULL, 0U, salt, personal);
109 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, personal);
127 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, NULL);
156 salt, NULL)
    [all...]
pwhash_argon2i.c 82 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv
91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
94 tests[i].passwd_len, (const unsigned char *) salt,
134 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv2
143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
146 tests[i].passwd_len, (const unsigned char *) salt,
156 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3,
160 if (crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, 3
234 char *salt; local in function:str_tests
    [all...]
pwhash_argon2id.c 82 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv
91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
94 tests[i].passwd_len, (const unsigned char *) salt,
134 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv2
143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
146 tests[i].passwd_len, (const unsigned char *) salt,
156 if (crypto_pwhash_argon2id(out, sizeof out, "password", strlen("password"), salt, 3,
160 if (crypto_pwhash_argon2id(out, sizeof out, "password", strlen("password"), salt, 3
230 char *salt; local in function:str_tests
    [all...]
pwhash_scrypt.c 94 unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; local in function:tv
103 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
107 tests[i].passwdlen, (const unsigned char *) salt,
143 unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; local in function:tv2
152 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex,
156 tests[i].passwdlen, (const unsigned char *) salt,
302 char *salt; local in function:str_tests
305 salt = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_SALTBYTES)
    [all...]
  /src/sbin/cgdconfig/
argon2_utils.c 91 uint8_t *key = NULL, *salt = NULL; local in function:argon2id_calibrate
96 salt = emalloc(saltlen);
99 arc4random_buf(salt, saltlen);
117 salt, saltlen,
148 salt, saltlen,
168 free(salt);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/
pwhash_argon2id.c 138 const unsigned char *const salt,
165 (uint32_t) 1U, passwd, (size_t) passwdlen, salt,
183 unsigned char salt[crypto_pwhash_argon2id_SALTBYTES]; local in function:crypto_pwhash_argon2id_str
198 randombytes_buf(salt, sizeof salt);
200 (uint32_t) 1U, passwd, (size_t) passwdlen, salt,
201 sizeof salt, STR_HASHBYTES, out,
pwhash_argon2i.c 142 const unsigned char *const salt,
169 (uint32_t) 1U, passwd, (size_t) passwdlen, salt,
187 unsigned char salt[crypto_pwhash_argon2i_SALTBYTES]; local in function:crypto_pwhash_argon2i_str
202 randombytes_buf(salt, sizeof salt);
204 (uint32_t) 1U, passwd, (size_t) passwdlen, salt,
205 sizeof salt, STR_HASHBYTES, out,
260 ctx.out = ctx.pwd = ctx.salt = fodder;
argon2.h 61 /* Minimum and maximum salt length in bytes */
141 * salt and its length,
153 * pwd[32], salt is stored in salt[16], you do not have keys nor associated
161 * Argon2_Context(out,8,pwd,32,salt,16,NULL,0,NULL,0,5,1<<20,4,4,NULL,NULL,true,false,false,false).
170 uint8_t *salt; /* salt array */ member in struct:Argon2_Context
171 uint32_t saltlen; /* salt length */
204 * @param salt Pointer to salt
    [all...]
  /src/usr.bin/pwhash/
pwhash.c 74 "Usage: %s [-km] [-A variant[,params]] [-b rounds] [-S rounds] [-s salt] [-p | string]\n",
76 "Usage: %s [-km] [-b rounds] [-S rounds] [-s salt] [-p | string]\n",
105 const char *salt = buf; local in function:print_passwd
110 * makekey mode: parse string into separate DES key and salt.
117 salt = &string[8];
133 salt = extra;
160 err(1, "Cannot generate salt");
162 (void)fputs(crypt(string, salt), stdout);
171 const char *extra = NULL; /* Store salt or number of rounds */
  /src/usr.bin/passwd/
local_passwd.c 67 char buf[_PASSWORD_LEN+1], salt[_PASSWORD_LEN+1]; local in function:getnewpasswd
114 if(pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
115 warn("Couldn't generate salt");
118 return(crypt(buf, salt));
yp_passwd.c 89 char salt[_PASSWORD_LEN + 1]; local in function:getnewpasswd
140 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
141 warn("Couldn't generate salt");
144 result = strdup(crypt(buf, salt));
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/
blake2.h 64 uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */ member in struct:blake2b_param_
79 const void *salt, const void *personal);
84 const void *salt, const void *personal);
94 uint8_t keylen, const void *salt,
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/
crypto_scrypt-common.c 143 const uint8_t *salt; local in function:escrypt_r
160 salt = src;
161 src = (uint8_t *) strrchr((char *) salt, '$');
163 saltlen = src - salt;
165 saltlen = strlen((char *) salt);
178 if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, N, r, p, hash,
240 const uint8_t *salt, size_t saltlen,
257 retval = escrypt_kdf(&local, passwd, passwdlen, salt, saltlen, N, r, p, buf,
pwhash_scryptsalsa208sha256.c 150 const unsigned char *const salt,
169 (const uint8_t *) passwd, (size_t) passwdlen, (const uint8_t *) salt,
180 uint8_t salt[crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES]; local in function:crypto_pwhash_scryptsalsa208sha256_str
197 randombytes_buf(salt, sizeof salt);
198 if (escrypt_gensalt_r(N_log2, r, p, salt, sizeof salt, (uint8_t *) setting,
  /src/usr.bin/skeyinit/
skeyinit.c 56 const char *salt; local in function:main
104 salt = pp->pw_passwd;
164 p = crypt(pw, salt);
  /src/lib/libtelnet/
sra.c 473 char *xpasswd, *salt; local in function:check_user
487 salt = pw->pw_passwd;
488 xpasswd = crypt(cred, salt);
  /src/lib/libpam/modules/pam_unix/
pam_unix.c 411 char salt[_PASSWORD_LEN+1]; local in function:pam_sm_chauthtok
607 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
608 pam_error(pamh, "Couldn't generate salt.");
614 pwd->pw_passwd = crypt(new_pass, salt);
  /src/lib/libcrypt/
crypt.c 145 * "salt" are also converted to this 8*(6+2) format. The SPE table size is
215 * The Bell Labs "salt" (Bob Baldwin):
218 * Specifically, if bit i (1 <= i <= 24) of the salt is set then bits i and
219 * i+24 of the result are swapped. The salt is thus a 24 bit number, with
220 * 16777216 possible values. (The original salt was 12 bits and could not
223 * It is possible, but ugly, to warp the SPE table to account for the salt
555 int32_t salt; local in function:__crypt
648 salt = 0;
654 salt = (salt << 6) | value
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/
drm_dp_mst_topology.c 2643 u64 salt; local in function:drm_dp_validate_guid
2648 salt = get_jiffies_64();
2650 memcpy(&guid[0], &salt, sizeof(u64));
2651 memcpy(&guid[8], &salt, sizeof(u64));

Completed in 23 milliseconds