Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 335) sorted by relevance

12345678910>>...14

/freebsd/crypto/heimdal/lib/hdb/
H A Dkeys.c49 if (keys[i].salt != NULL) { in hdb_free_keys()
50 free_Salt(keys[i].salt); in hdb_free_keys()
51 free(keys[i].salt); in hdb_free_keys()
52 keys[i].salt = NULL; in hdb_free_keys()
85 krb5_salt *salt, krb5_principal principal) in parse_key_set() argument
105 salt->saltvalue.data = NULL; in parse_key_set()
106 salt->saltvalue.length = 0; in parse_key_set()
130 if(salt->salttype == 0) { in parse_key_set()
140 salt->salttype = KRB5_PW_SALT; in parse_key_set()
146 salt->salttype = KRB5_AFS3_SALT; in parse_key_set()
[all …]
H A Dhdb-mitdb.c134 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() local
136 switch((int)salt->type) { in fix_salt()
138 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
141 krb5_data_free(&salt->salt); in fix_salt()
142 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
153 ret = krb5_data_alloc (&salt->salt, len); in fix_salt()
156 p = salt->salt.data; in fix_salt()
164 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
168 krb5_data_free(&salt->salt); in fix_salt()
169 ret = krb5_data_copy(&salt->salt, in fix_salt()
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_pbkdf2.txt19 Ctrl.salt = salt:salt
27 Ctrl.salt = salt:salt
35 Ctrl.salt = salt:salt
43 Ctrl.salt = salt:salt
51 Ctrl.salt = salt:salt
59 Ctrl.salt = salt:salt
67 Ctrl.salt = salt:salt
75 Ctrl.salt = salt:salt
83 Ctrl.salt = salt:salt
90 Ctrl.salt = salt:saltSALTsaltSALTsaltSALTsaltSALTsalt
[all …]
H A Devpkdf_pbkdf1.txt19 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:saltsalt
35 Ctrl.salt = salt:saltsalt
43 Ctrl.salt = salt:saltsalt
51 Ctrl.salt = salt:saltsalt
59 Ctrl.salt = salt:saltsalt
67 Ctrl.salt = salt:saltsalt
75 Ctrl.salt = salt:saltsalt
83 Ctrl.salt = salt:saltsalt
91 Ctrl.salt = salt:saltSALT
[all …]
H A Devppkey_kdf_hkdf.txt19 Ctrl.salt = hexsalt:000102030405060708090a0b0c
27 Ctrl.salt = hexsalt:000102030405060708090a0b0c
40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
83 Ctrl.salt = hexsalt:000102030405060708090a0b0c
91 Ctrl.salt = hexsalt:000102030405060708090a0b0c
104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
[all …]
H A Devpkdf_hkdf.txt19 Ctrl.salt = hexsalt:000102030405060708090a0b0c
27 Ctrl.salt = hexsalt:000102030405060708090a0b0c
40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
83 Ctrl.salt = hexsalt:000102030405060708090a0b0c
91 Ctrl.salt = hexsalt:000102030405060708090a0b0c
104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868…
[all …]
H A Devppbe_pbkdf2.txt18 Salt = "salt"
25 Salt = "salt"
32 Salt = "salt"
39 Salt = "salt"
46 Salt = "salt"
53 Salt = "salt"
60 Salt = "salt"
67 Salt = "salt"
74 Salt = "salt"
125 Salt = "salt"
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_passwd.t22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=10$roundstoolow',
42 salt => 'saltstring',
46 salt => 'rounds=10000$saltstringsaltstring',
50 salt => 'rounds=5000$toolongsaltstring',
54 salt => 'rounds=1400$anotherlongsaltstring',
58 salt => 'rounds=10$roundstoolow',
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dkeys.c60 keys[i].salt = NULL; in _kadm5_init_keys()
77 if ((keys1[i].salt != NULL && keys2[j].salt == NULL) in _kadm5_exists_keys()
78 || (keys1[i].salt == NULL && keys2[j].salt != NULL)) in _kadm5_exists_keys()
81 if (keys1[i].salt != NULL) { in _kadm5_exists_keys()
82 if (keys1[i].salt->type != keys2[j].salt->type) in _kadm5_exists_keys()
84 if (keys1[i].salt->salt.length != keys2[j].salt->salt.length) in _kadm5_exists_keys()
86 if (memcmp (keys1[i].salt->salt.data, keys2[j].salt->salt.data, in _kadm5_exists_keys()
87 keys1[i].salt->salt.length) != 0) in _kadm5_exists_keys()
H A Drename_s.c66 Salt salt; in kadm5_s_rename_principal() local
68 memset(&salt, 0, sizeof(salt)); in kadm5_s_rename_principal()
72 salt.type = hdb_pw_salt; in kadm5_s_rename_principal()
73 salt.salt = salt2.saltvalue; in kadm5_s_rename_principal()
75 if(ent.entry.keys.val[i].salt == NULL){ in kadm5_s_rename_principal()
76 ent.entry.keys.val[i].salt = in kadm5_s_rename_principal()
77 malloc(sizeof(*ent.entry.keys.val[i].salt)); in kadm5_s_rename_principal()
78 if(ent.entry.keys.val[i].salt == NULL) in kadm5_s_rename_principal()
80 ret = copy_Salt(&salt, ent.entry.keys.val[i].salt); in kadm5_s_rename_principal()
H A Ddefault_keys.c58 if (keys[i].salt) { in print_keys()
61 switch (keys[i].salt->type) { in print_keys()
69 printf("unknown salt: %d", keys[i].salt->type); in print_keys()
72 if (keys[i].salt->salt.length) in print_keys()
73 printf("%.*s", (int)keys[i].salt->salt.length, in print_keys()
74 (char *)keys[i].salt->salt.data); in print_keys()
/freebsd/secure/lib/libcrypt/
H A Dcrypt-blowfish.c135 crypt_blowfish(const char *key, const char *salt, char *buffer) in crypt_blowfish() argument
152 if (*salt == '$') { in crypt_blowfish()
154 salt++; in crypt_blowfish()
156 if (*salt > BCRYPT_VERSION) in crypt_blowfish()
160 if (salt[1] != '$') { in crypt_blowfish()
161 switch (salt[1]) { in crypt_blowfish()
167 minr = salt[1]; in crypt_blowfish()
168 salt++; in crypt_blowfish()
177 salt += 2; in crypt_blowfish()
179 if (salt[2] != '$') in crypt_blowfish()
[all …]
/freebsd/crypto/openssh/openbsd-compat/
H A Dxcrypt.c76 static char salt[32]; in pick_salt() local
78 if (salt[0] != '\0') in pick_salt()
79 return salt; in pick_salt()
80 strlcpy(salt, "xx", sizeof(salt)); in pick_salt()
87 strlcpy(salt, passwd, MINIMUM(typelen, sizeof(salt))); in pick_salt()
94 return salt; in pick_salt()
98 xcrypt(const char *password, const char *salt) in xcrypt() argument
106 if (salt == NULL) in xcrypt()
107 salt = pick_salt(); in xcrypt()
111 crypted = bigcrypt(password, salt); in xcrypt()
[all …]
/freebsd/crypto/heimdal/kdc/
H A Dmit_dump.c155 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() local
157 switch((int)salt->type) { in fix_salt()
159 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
162 krb5_data_free(&salt->salt); in fix_salt()
163 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
174 ret = krb5_data_alloc (&salt->salt, len); in fix_salt()
177 p = salt->salt.data; in fix_salt()
185 salt->type = KRB5_PADATA_PW_SALT; in fix_salt()
189 krb5_data_free(&salt->salt); in fix_salt()
190 ret = krb5_data_copy(&salt->salt, in fix_salt()
[all …]
H A Dstring2key.c74 krb5_salt salt, in tokey() argument
82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key); in tokey()
102 krb5_salt salt; in main() local
167 krb5_get_pw_salt(context, princ, &salt); in main()
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); in main()
169 krb5_free_salt(context, salt); in main()
172 salt.salttype = KRB5_PW_SALT; in main()
173 salt.saltvalue.length = 0; in main()
174 salt.saltvalue.data = NULL; in main()
175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerberos 4"); in main()
[all …]
/freebsd/contrib/libfido2/tools/
H A Dtest.sh54 dd if=/dev/urandom bs=32 count=1 | base64 > hmac-salt
148 get_assert no.tld "-h" wrap-cred hmac-salt wrap-assert
151 get_assert no.tld "-h -t pin=true" wrap-cred hmac-salt wrap-assert
155 get_assert no.tld "-h -t pin=false" wrap-cred hmac-salt wrap-assert
158 get_assert no.tld "-h -t up=true" wrap-cred hmac-salt wrap-assert
162 get_assert no.tld "-h -t up=true -t pin=true" wrap-cred hmac-salt wrap-assert
168 get_assert no.tld "-h -t up=true -t pin=false" wrap-cred hmac-salt wrap-assert
172 ! get_assert no.tld "-h -t up=false" wrap-cred hmac-salt wrap-assert
173 ! get_assert no.tld "-h -t up=false -t pin=true" wrap-cred hmac-salt wrap-assert
174 ! get_assert no.tld "-h -t up=false -t pin=false" wrap-cred hmac-salt wrap-assert
[all …]
/freebsd/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument
88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
106 salt = p12->mac->salt->data; in pkcs12_gen_mac()
107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
153 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
[all …]
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument
106 salt, saltlen); in PKCS12_key_gen_uni_ex()
[all …]
/freebsd/crypto/openssl/crypto/asn1/
H A Dp5_pbe.c19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
28 const unsigned char *salt, int saltlen,
56 if (salt)
57 memcpy(sstr, salt, saltlen);
61 ASN1_STRING_set0(pbe->salt, sstr, saltlen);
83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument
85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor()
91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument
101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex()
109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
[all …]
H A Dp5_pbev2.c28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
43 unsigned char *salt, int saltlen,
112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen,
149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument
152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv()
157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set()
164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument
177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex()
178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex()
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dsalt.c103 krb5_salt *salt) in krb5_get_pw_salt() argument
110 salt->salttype = KRB5_PW_SALT; in krb5_get_pw_salt()
114 ret = krb5_data_alloc (&salt->saltvalue, len); in krb5_get_pw_salt()
117 p = salt->saltvalue.data; in krb5_get_pw_salt()
131 krb5_salt salt) in krb5_free_salt() argument
133 krb5_data_free(&salt.saltvalue); in krb5_free_salt()
145 krb5_salt salt; in krb5_string_to_key_data() local
147 ret = krb5_get_pw_salt(context, principal, &salt); in krb5_string_to_key_data()
150 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); in krb5_string_to_key_data()
151 krb5_free_salt(context, salt); in krb5_string_to_key_data()
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/
H A Dargon2.c88 const void *salt, const size_t saltlen, void *hash, in argon2_hash() argument
117 context.salt = (uint8_t *) salt; in argon2_hash()
161 const size_t pwdlen, const void *salt, in argon2i_hash_encoded() argument
165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_encoded()
172 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2i_hash_raw() argument
175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_raw()
182 const size_t pwdlen, const void *salt, in argon2id_hash_encoded() argument
186 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2id_hash_encoded()
193 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2id_hash_raw() argument
196 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2id_hash_raw()
[all …]
/freebsd/sys/contrib/libsodium/test/default/
H A Dpwhash_argon2i.c82 unsigned char salt[crypto_pwhash_SALTBYTES]; in tv() local
91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, in tv()
94 tests[i].passwd_len, (const unsigned char *) salt, in tv()
134 unsigned char salt[crypto_pwhash_SALTBYTES]; in tv2() local
143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, in tv2()
146 tests[i].passwd_len, (const unsigned char *) salt, in tv2()
156 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2()
160 if (crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, 3, in tv2()
164 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2()
168 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2()
[all …]
/freebsd/lib/libcrypt/
H A Dcrypt.c105 crypt_r(const char *passwd, const char *salt, struct crypt_data *data) in crypt_r() argument
114 if (cf->magic != NULL && strstr(salt, cf->magic) == salt) { in crypt_r()
119 len = strlen(salt); in crypt_r()
120 if ((len == 13 || len == 2) && strspn(salt, DES_SALT_ALPHABET) == len) { in crypt_r()
127 if (func(passwd, salt, data->__buf) != 0) in crypt_r()
133 crypt(const char *passwd, const char *salt) in crypt() argument
137 return (crypt_r(passwd, salt, &data)); in crypt()
/freebsd/crypto/openssl/crypto/des/
H A Dfcrypt.c64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
69 return DES_fcrypt(buf, salt, buff); in DES_crypt()
75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt()
79 e_salt[0] = salt[0]; in DES_crypt()
80 e_salt[1] = salt[1]; in DES_crypt()
97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
108 x = ret[0] = salt[0]; in DES_fcrypt()
112 x = ret[1] = salt[1]; in DES_fcrypt()

12345678910>>...14