/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
crypto_scrypt-common.c | 146 size_t saltlen; local in function:escrypt_r 163 saltlen = src - salt; 165 saltlen = strlen((char *) salt); 167 need = prefixlen + saltlen + 1 + 169 if (need > buflen || need < saltlen) { 178 if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, N, r, p, hash, 183 memcpy(dst, setting, prefixlen + saltlen); 184 dst += prefixlen + saltlen; 204 size_t saltlen = BYTES2CHARS(srclen); local in function:escrypt_gensalt_r 207 need = prefixlen + saltlen + 1 [all...] |
pbkdf2-sha256.c | 42 * PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, c, buf, dkLen): 48 size_t saltlen, uint64_t c, uint8_t *buf, size_t dkLen) 67 crypto_auth_hmacsha256_update(&PShctx, salt, saltlen);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
argon2.c | 88 const void *salt, const size_t saltlen, void *hash, 104 if (saltlen > ARGON2_MAX_SALT_LENGTH) { 118 context.saltlen = (uint32_t) saltlen; 162 const size_t saltlen, const size_t hashlen, char *encoded, 165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, 172 const size_t pwdlen, const void *salt, const size_t saltlen, 175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, 183 const size_t saltlen, const size_t hashlen, char *encoded, 186 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, [all...] |
argon2.h | 171 uint32_t saltlen; /* salt length */ member in struct:Argon2_Context 205 * @param saltlen Salt size in bytes 215 const size_t saltlen, const size_t hashlen, 226 * @param saltlen Salt size in bytes 236 const size_t saltlen, const size_t hashlen, 247 * @param saltlen Salt size in bytes 256 const size_t saltlen, void *hash, const size_t hashlen); 266 * @param saltlen Salt size in bytes 275 const size_t saltlen, void *hash, const size_t hashlen); 280 const size_t pwdlen, const void *salt, const size_t saltlen, [all...] |
argon2-encoding.c | 155 size_t maxsaltlen = ctx->saltlen; 160 ctx->saltlen = 0; 193 BIN(ctx->salt, maxsaltlen, ctx->saltlen); 296 SB(ctx->salt, ctx->saltlen);
|
argon2-core.c | 280 if (0 != context->saltlen) { 285 if (ARGON2_MIN_SALT_LENGTH > context->saltlen) { 289 if (ARGON2_MAX_SALT_LENGTH < context->saltlen) { 437 STORE32_LE(value, context->saltlen); 442 &BlakeHash, (const uint8_t *) context->salt, context->saltlen);
|
pwhash_argon2i.c | 261 ctx.outlen = ctx.pwdlen = ctx.saltlen = (uint32_t) fodder_len;
|
/src/sbin/cgdconfig/ |
argon2_utils.c | 81 argon2id_calibrate(size_t keylen, size_t saltlen, 96 salt = emalloc(saltlen); 99 arc4random_buf(salt, saltlen); 117 salt, saltlen, 148 salt, saltlen,
|
/src/sys/external/isc/libsodium/dist/src/libsodium/include/sodium/ |
crypto_pwhash_scryptsalsa208sha256.h | 105 const uint8_t * salt, size_t saltlen,
|
/src/lib/libcrypt/ |
crypt-argon2.c | 350 sl = ctx->saltlen; 357 ctx->saltlen = sl; 407 ctx.saltlen = sizeof(saltbuf); 422 ctx.threads, pw, strlen(pw), ctx.salt, ctx.saltlen,
|
bcrypt.c | 153 __gensalt_blowfish(char *salt, size_t saltlen, const char *option) 161 if (saltlen < BCRYPT_MAXSALTLEN) {
|
pw_gensalt.c | 293 pw_gensalt(char *salt, size_t saltlen, const char *type, const char *option) 299 return (*sp->gensalt)(salt, saltlen, option);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/ |
pwhash_scryptsalsa208sha256_nosse.c | 282 * escrypt_kdf(local, passwd, passwdlen, salt, saltlen, 284 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 293 size_t passwdlen, const uint8_t *salt, size_t saltlen, 362 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/ |
pwhash_scryptsalsa208sha256_sse.c | 299 * escrypt_kdf(local, passwd, passwdlen, salt, saltlen, 301 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 310 const uint8_t *salt, size_t saltlen, uint64_t N, uint32_t _r, 386 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size);
|