/src/libexec/makekey/ |
makekey.c | 56 char *r, key[9], salt[3]; local in function:main 59 get(salt, sizeof(salt) - 1); 60 len = strlen(r = crypt(key, salt));
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_kdf/blake2b/ |
kdf_blake2b.c | 37 unsigned char salt[crypto_generichash_blake2b_SALTBYTES]; local in function:crypto_kdf_blake2b_derive_from_key 41 STORE64_LE(salt, subkey_id); 42 memset(salt + 8, 0, (sizeof salt) - 8); 51 salt, ctx_padded);
|
/src/sys/external/isc/libsodium/dist/test/default/ |
generichash3.c | 10 unsigned char salt[crypto_generichash_blake2b_SALTBYTES] local in function:main 32 1 + i % crypto_generichash_blake2b_BYTES_MAX, salt, personal); 44 &st, k, 0U, crypto_generichash_blake2b_BYTES_MAX, salt, personal); 55 &st, NULL, 1U, crypto_generichash_blake2b_BYTES_MAX, salt, personal); 79 crypto_generichash_blake2b_BYTES_MAX, salt, NULL); 91 k, 0U, salt, personal); 100 NULL, 0U, salt, personal); 109 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, personal); 127 k, crypto_generichash_blake2b_KEYBYTES_MAX, salt, NULL); 156 salt, NULL) [all...] |
pwhash_argon2i.c | 82 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv 91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 94 tests[i].passwd_len, (const unsigned char *) salt, 134 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv2 143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 146 tests[i].passwd_len, (const unsigned char *) salt, 156 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, 160 if (crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, 3 234 char *salt; local in function:str_tests [all...] |
pwhash_argon2id.c | 82 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv 91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 94 tests[i].passwd_len, (const unsigned char *) salt, 134 unsigned char salt[crypto_pwhash_SALTBYTES]; local in function:tv2 143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 146 tests[i].passwd_len, (const unsigned char *) salt, 156 if (crypto_pwhash_argon2id(out, sizeof out, "password", strlen("password"), salt, 3, 160 if (crypto_pwhash_argon2id(out, sizeof out, "password", strlen("password"), salt, 3 230 char *salt; local in function:str_tests [all...] |
pwhash_scrypt.c | 94 unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; local in function:tv 103 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 107 tests[i].passwdlen, (const unsigned char *) salt, 143 unsigned char salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; local in function:tv2 152 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, 156 tests[i].passwdlen, (const unsigned char *) salt, 302 char *salt; local in function:str_tests 305 salt = (char *) sodium_malloc(crypto_pwhash_scryptsalsa208sha256_SALTBYTES) [all...] |
/src/sbin/cgdconfig/ |
argon2_utils.c | 91 uint8_t *key = NULL, *salt = NULL; local in function:argon2id_calibrate 96 salt = emalloc(saltlen); 99 arc4random_buf(salt, saltlen); 117 salt, saltlen, 148 salt, saltlen, 168 free(salt);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
pwhash_argon2id.c | 138 const unsigned char *const salt, 165 (uint32_t) 1U, passwd, (size_t) passwdlen, salt, 183 unsigned char salt[crypto_pwhash_argon2id_SALTBYTES]; local in function:crypto_pwhash_argon2id_str 198 randombytes_buf(salt, sizeof salt); 200 (uint32_t) 1U, passwd, (size_t) passwdlen, salt, 201 sizeof salt, STR_HASHBYTES, out,
|
pwhash_argon2i.c | 142 const unsigned char *const salt, 169 (uint32_t) 1U, passwd, (size_t) passwdlen, salt, 187 unsigned char salt[crypto_pwhash_argon2i_SALTBYTES]; local in function:crypto_pwhash_argon2i_str 202 randombytes_buf(salt, sizeof salt); 204 (uint32_t) 1U, passwd, (size_t) passwdlen, salt, 205 sizeof salt, STR_HASHBYTES, out, 260 ctx.out = ctx.pwd = ctx.salt = fodder;
|
argon2.h | 61 /* Minimum and maximum salt length in bytes */ 141 * salt and its length, 153 * pwd[32], salt is stored in salt[16], you do not have keys nor associated 161 * Argon2_Context(out,8,pwd,32,salt,16,NULL,0,NULL,0,5,1<<20,4,4,NULL,NULL,true,false,false,false). 170 uint8_t *salt; /* salt array */ member in struct:Argon2_Context 171 uint32_t saltlen; /* salt length */ 204 * @param salt Pointer to salt [all...] |
/src/usr.bin/pwhash/ |
pwhash.c | 74 "Usage: %s [-km] [-A variant[,params]] [-b rounds] [-S rounds] [-s salt] [-p | string]\n", 76 "Usage: %s [-km] [-b rounds] [-S rounds] [-s salt] [-p | string]\n", 105 const char *salt = buf; local in function:print_passwd 110 * makekey mode: parse string into separate DES key and salt. 117 salt = &string[8]; 133 salt = extra; 160 err(1, "Cannot generate salt"); 162 (void)fputs(crypt(string, salt), stdout); 171 const char *extra = NULL; /* Store salt or number of rounds */
|
/src/usr.bin/passwd/ |
local_passwd.c | 67 char buf[_PASSWORD_LEN+1], salt[_PASSWORD_LEN+1]; local in function:getnewpasswd 114 if(pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) { 115 warn("Couldn't generate salt"); 118 return(crypt(buf, salt));
|
yp_passwd.c | 89 char salt[_PASSWORD_LEN + 1]; local in function:getnewpasswd 140 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) { 141 warn("Couldn't generate salt"); 144 result = strdup(crypt(buf, salt));
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_generichash/blake2b/ref/ |
blake2.h | 64 uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */ member in struct:blake2b_param_ 79 const void *salt, const void *personal); 84 const void *salt, const void *personal); 94 uint8_t keylen, const void *salt,
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
crypto_scrypt-common.c | 143 const uint8_t *salt; local in function:escrypt_r 160 salt = src; 161 src = (uint8_t *) strrchr((char *) salt, '$'); 163 saltlen = src - salt; 165 saltlen = strlen((char *) salt); 178 if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, N, r, p, hash, 240 const uint8_t *salt, size_t saltlen, 257 retval = escrypt_kdf(&local, passwd, passwdlen, salt, saltlen, N, r, p, buf,
|
pwhash_scryptsalsa208sha256.c | 150 const unsigned char *const salt, 169 (const uint8_t *) passwd, (size_t) passwdlen, (const uint8_t *) salt, 180 uint8_t salt[crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES]; local in function:crypto_pwhash_scryptsalsa208sha256_str 197 randombytes_buf(salt, sizeof salt); 198 if (escrypt_gensalt_r(N_log2, r, p, salt, sizeof salt, (uint8_t *) setting,
|
/src/usr.bin/skeyinit/ |
skeyinit.c | 56 const char *salt; local in function:main 104 salt = pp->pw_passwd; 164 p = crypt(pw, salt);
|
/src/lib/libtelnet/ |
sra.c | 473 char *xpasswd, *salt; local in function:check_user 487 salt = pw->pw_passwd; 488 xpasswd = crypt(cred, salt);
|
/src/lib/libpam/modules/pam_unix/ |
pam_unix.c | 411 char salt[_PASSWORD_LEN+1]; local in function:pam_sm_chauthtok 607 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) { 608 pam_error(pamh, "Couldn't generate salt."); 614 pwd->pw_passwd = crypt(new_pass, salt);
|
/src/lib/libcrypt/ |
crypt.c | 145 * "salt" are also converted to this 8*(6+2) format. The SPE table size is 215 * The Bell Labs "salt" (Bob Baldwin): 218 * Specifically, if bit i (1 <= i <= 24) of the salt is set then bits i and 219 * i+24 of the result are swapped. The salt is thus a 24 bit number, with 220 * 16777216 possible values. (The original salt was 12 bits and could not 223 * It is possible, but ugly, to warp the SPE table to account for the salt 555 int32_t salt; local in function:__crypt 648 salt = 0; 654 salt = (salt << 6) | value [all...] |
/src/sys/external/bsd/drm2/dist/drm/ |
drm_dp_mst_topology.c | 2643 u64 salt; local in function:drm_dp_validate_guid 2648 salt = get_jiffies_64(); 2650 memcpy(&guid[0], &salt, sizeof(u64)); 2651 memcpy(&guid[8], &salt, sizeof(u64));
|