HomeSort by: relevance | last modified time | path
    Searched refs:saltlen (Results 1 - 14 of 14) sorted by relevancy

  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/
crypto_scrypt-common.c 146 size_t saltlen; local in function:escrypt_r
163 saltlen = src - salt;
165 saltlen = strlen((char *) salt);
167 need = prefixlen + saltlen + 1 +
169 if (need > buflen || need < saltlen) {
178 if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, N, r, p, hash,
183 memcpy(dst, setting, prefixlen + saltlen);
184 dst += prefixlen + saltlen;
204 size_t saltlen = BYTES2CHARS(srclen); local in function:escrypt_gensalt_r
207 need = prefixlen + saltlen + 1
    [all...]
pbkdf2-sha256.c 42 * PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, c, buf, dkLen):
48 size_t saltlen, uint64_t c, uint8_t *buf, size_t dkLen)
67 crypto_auth_hmacsha256_update(&PShctx, salt, saltlen);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/
argon2.c 88 const void *salt, const size_t saltlen, void *hash,
104 if (saltlen > ARGON2_MAX_SALT_LENGTH) {
118 context.saltlen = (uint32_t) saltlen;
162 const size_t saltlen, const size_t hashlen, char *encoded,
165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen,
172 const size_t pwdlen, const void *salt, const size_t saltlen,
175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen,
183 const size_t saltlen, const size_t hashlen, char *encoded,
186 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen,
    [all...]
argon2.h 171 uint32_t saltlen; /* salt length */ member in struct:Argon2_Context
205 * @param saltlen Salt size in bytes
215 const size_t saltlen, const size_t hashlen,
226 * @param saltlen Salt size in bytes
236 const size_t saltlen, const size_t hashlen,
247 * @param saltlen Salt size in bytes
256 const size_t saltlen, void *hash, const size_t hashlen);
266 * @param saltlen Salt size in bytes
275 const size_t saltlen, void *hash, const size_t hashlen);
280 const size_t pwdlen, const void *salt, const size_t saltlen,
    [all...]
argon2-encoding.c 155 size_t maxsaltlen = ctx->saltlen;
160 ctx->saltlen = 0;
193 BIN(ctx->salt, maxsaltlen, ctx->saltlen);
296 SB(ctx->salt, ctx->saltlen);
argon2-core.c 280 if (0 != context->saltlen) {
285 if (ARGON2_MIN_SALT_LENGTH > context->saltlen) {
289 if (ARGON2_MAX_SALT_LENGTH < context->saltlen) {
437 STORE32_LE(value, context->saltlen);
442 &BlakeHash, (const uint8_t *) context->salt, context->saltlen);
pwhash_argon2i.c 261 ctx.outlen = ctx.pwdlen = ctx.saltlen = (uint32_t) fodder_len;
  /src/sbin/cgdconfig/
argon2_utils.c 81 argon2id_calibrate(size_t keylen, size_t saltlen,
96 salt = emalloc(saltlen);
99 arc4random_buf(salt, saltlen);
117 salt, saltlen,
148 salt, saltlen,
  /src/sys/external/isc/libsodium/dist/src/libsodium/include/sodium/
crypto_pwhash_scryptsalsa208sha256.h 105 const uint8_t * salt, size_t saltlen,
  /src/lib/libcrypt/
crypt-argon2.c 350 sl = ctx->saltlen;
357 ctx->saltlen = sl;
407 ctx.saltlen = sizeof(saltbuf);
422 ctx.threads, pw, strlen(pw), ctx.salt, ctx.saltlen,
bcrypt.c 153 __gensalt_blowfish(char *salt, size_t saltlen, const char *option)
161 if (saltlen < BCRYPT_MAXSALTLEN) {
pw_gensalt.c 293 pw_gensalt(char *salt, size_t saltlen, const char *type, const char *option)
299 return (*sp->gensalt)(salt, saltlen, option);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/
pwhash_scryptsalsa208sha256_nosse.c 282 * escrypt_kdf(local, passwd, passwdlen, salt, saltlen,
284 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
293 size_t passwdlen, const uint8_t *salt, size_t saltlen,
362 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/
pwhash_scryptsalsa208sha256_sse.c 299 * escrypt_kdf(local, passwd, passwdlen, salt, saltlen,
301 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
310 const uint8_t *salt, size_t saltlen, uint64_t N, uint32_t _r,
386 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size);

Completed in 17 milliseconds