/freebsd/crypto/heimdal/lib/hdb/ |
H A D | keys.c | 49 if (keys[i].salt != NULL) { in hdb_free_keys() 50 free_Salt(keys[i].salt); in hdb_free_keys() 51 free(keys[i].salt); in hdb_free_keys() 52 keys[i].salt = NULL; in hdb_free_keys() 85 krb5_salt *salt, krb5_principal principal) in parse_key_set() argument 105 salt->saltvalue.data = NULL; in parse_key_set() 106 salt->saltvalue.length = 0; in parse_key_set() 130 if(salt->salttype == 0) { in parse_key_set() 140 salt->salttype = KRB5_PW_SALT; in parse_key_set() 146 salt->salttype = KRB5_AFS3_SALT; in parse_key_set() [all …]
|
H A D | hdb-mitdb.c | 134 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() local 136 switch((int)salt->type) { in fix_salt() 138 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 141 krb5_data_free(&salt->salt); in fix_salt() 142 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 153 ret = krb5_data_alloc (&salt->salt, len); in fix_salt() 156 p = salt->salt.data; in fix_salt() 164 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 168 krb5_data_free(&salt->salt); in fix_salt() 169 ret = krb5_data_copy(&salt->salt, in fix_salt() [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_pbkdf2.txt | 19 Ctrl.salt = salt:salt 27 Ctrl.salt = salt:salt 35 Ctrl.salt = salt:salt 43 Ctrl.salt = salt:salt 51 Ctrl.salt = salt:salt 59 Ctrl.salt = salt:salt 67 Ctrl.salt = salt:salt 75 Ctrl.salt = salt:salt 83 Ctrl.salt = salt:salt 90 Ctrl.salt = salt:saltSALTsaltSALTsaltSALTsaltSALTsalt [all …]
|
H A D | evpkdf_pbkdf1.txt | 19 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:saltsalt 35 Ctrl.salt = salt:saltsalt 43 Ctrl.salt = salt:saltsalt 51 Ctrl.salt = salt:saltsalt 59 Ctrl.salt = salt:saltsalt 67 Ctrl.salt = salt:saltsalt 75 Ctrl.salt = salt:saltsalt 83 Ctrl.salt = salt:saltsalt 91 Ctrl.salt = salt:saltSALT [all …]
|
H A D | evppkey_kdf_hkdf.txt | 19 Ctrl.salt = hexsalt:000102030405060708090a0b0c 27 Ctrl.salt = hexsalt:000102030405060708090a0b0c 40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 83 Ctrl.salt = hexsalt:000102030405060708090a0b0c 91 Ctrl.salt = hexsalt:000102030405060708090a0b0c 104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… [all …]
|
H A D | evpkdf_hkdf.txt | 19 Ctrl.salt = hexsalt:000102030405060708090a0b0c 27 Ctrl.salt = hexsalt:000102030405060708090a0b0c 40 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 48 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 83 Ctrl.salt = hexsalt:000102030405060708090a0b0c 91 Ctrl.salt = hexsalt:000102030405060708090a0b0c 104 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… 112 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868… [all …]
|
H A D | evppbe_pbkdf2.txt | 18 Salt = "salt" 25 Salt = "salt" 32 Salt = "salt" 39 Salt = "salt" 46 Salt = "salt" 53 Salt = "salt" 60 Salt = "salt" 67 Salt = "salt" 74 Salt = "salt" 125 Salt = "salt" [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=10$roundstoolow', 42 salt => 'saltstring', 46 salt => 'rounds=10000$saltstringsaltstring', 50 salt => 'rounds=5000$toolongsaltstring', 54 salt => 'rounds=1400$anotherlongsaltstring', 58 salt => 'rounds=10$roundstoolow', [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | keys.c | 60 keys[i].salt = NULL; in _kadm5_init_keys() 77 if ((keys1[i].salt != NULL && keys2[j].salt == NULL) in _kadm5_exists_keys() 78 || (keys1[i].salt == NULL && keys2[j].salt != NULL)) in _kadm5_exists_keys() 81 if (keys1[i].salt != NULL) { in _kadm5_exists_keys() 82 if (keys1[i].salt->type != keys2[j].salt->type) in _kadm5_exists_keys() 84 if (keys1[i].salt->salt.length != keys2[j].salt->salt.length) in _kadm5_exists_keys() 86 if (memcmp (keys1[i].salt->salt.data, keys2[j].salt->salt.data, in _kadm5_exists_keys() 87 keys1[i].salt->salt.length) != 0) in _kadm5_exists_keys()
|
H A D | rename_s.c | 66 Salt salt; in kadm5_s_rename_principal() local 68 memset(&salt, 0, sizeof(salt)); in kadm5_s_rename_principal() 72 salt.type = hdb_pw_salt; in kadm5_s_rename_principal() 73 salt.salt = salt2.saltvalue; in kadm5_s_rename_principal() 75 if(ent.entry.keys.val[i].salt == NULL){ in kadm5_s_rename_principal() 76 ent.entry.keys.val[i].salt = in kadm5_s_rename_principal() 77 malloc(sizeof(*ent.entry.keys.val[i].salt)); in kadm5_s_rename_principal() 78 if(ent.entry.keys.val[i].salt == NULL) in kadm5_s_rename_principal() 80 ret = copy_Salt(&salt, ent.entry.keys.val[i].salt); in kadm5_s_rename_principal()
|
H A D | default_keys.c | 58 if (keys[i].salt) { in print_keys() 61 switch (keys[i].salt->type) { in print_keys() 69 printf("unknown salt: %d", keys[i].salt->type); in print_keys() 72 if (keys[i].salt->salt.length) in print_keys() 73 printf("%.*s", (int)keys[i].salt->salt.length, in print_keys() 74 (char *)keys[i].salt->salt.data); in print_keys()
|
/freebsd/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 135 crypt_blowfish(const char *key, const char *salt, char *buffer) in crypt_blowfish() argument 152 if (*salt == '$') { in crypt_blowfish() 154 salt++; in crypt_blowfish() 156 if (*salt > BCRYPT_VERSION) in crypt_blowfish() 160 if (salt[1] != '$') { in crypt_blowfish() 161 switch (salt[1]) { in crypt_blowfish() 167 minr = salt[1]; in crypt_blowfish() 168 salt++; in crypt_blowfish() 177 salt += 2; in crypt_blowfish() 179 if (salt[2] != '$') in crypt_blowfish() [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | xcrypt.c | 76 static char salt[32]; in pick_salt() local 78 if (salt[0] != '\0') in pick_salt() 79 return salt; in pick_salt() 80 strlcpy(salt, "xx", sizeof(salt)); in pick_salt() 87 strlcpy(salt, passwd, MINIMUM(typelen, sizeof(salt))); in pick_salt() 94 return salt; in pick_salt() 98 xcrypt(const char *password, const char *salt) in xcrypt() argument 106 if (salt == NULL) in xcrypt() 107 salt = pick_salt(); in xcrypt() 111 crypted = bigcrypt(password, salt); in xcrypt() [all …]
|
/freebsd/crypto/heimdal/kdc/ |
H A D | mit_dump.c | 155 Salt *salt = ent->keys.val[key_num].salt; in fix_salt() local 157 switch((int)salt->type) { in fix_salt() 159 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 162 krb5_data_free(&salt->salt); in fix_salt() 163 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 174 ret = krb5_data_alloc (&salt->salt, len); in fix_salt() 177 p = salt->salt.data; in fix_salt() 185 salt->type = KRB5_PADATA_PW_SALT; in fix_salt() 189 krb5_data_free(&salt->salt); in fix_salt() 190 ret = krb5_data_copy(&salt->salt, in fix_salt() [all …]
|
H A D | string2key.c | 74 krb5_salt salt, in tokey() argument 82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key); in tokey() 102 krb5_salt salt; in main() local 167 krb5_get_pw_salt(context, princ, &salt); in main() 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); in main() 169 krb5_free_salt(context, salt); in main() 172 salt.salttype = KRB5_PW_SALT; in main() 173 salt.saltvalue.length = 0; in main() 174 salt.saltvalue.data = NULL; in main() 175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerberos 4"); in main() [all …]
|
/freebsd/contrib/libfido2/tools/ |
H A D | test.sh | 54 dd if=/dev/urandom bs=32 count=1 | base64 > hmac-salt 148 get_assert no.tld "-h" wrap-cred hmac-salt wrap-assert 151 get_assert no.tld "-h -t pin=true" wrap-cred hmac-salt wrap-assert 155 get_assert no.tld "-h -t pin=false" wrap-cred hmac-salt wrap-assert 158 get_assert no.tld "-h -t up=true" wrap-cred hmac-salt wrap-assert 162 get_assert no.tld "-h -t up=true -t pin=true" wrap-cred hmac-salt wrap-assert 168 get_assert no.tld "-h -t up=true -t pin=false" wrap-cred hmac-salt wrap-assert 172 ! get_assert no.tld "-h -t up=false" wrap-cred hmac-salt wrap-assert 173 ! get_assert no.tld "-h -t up=false -t pin=true" wrap-cred hmac-salt wrap-assert 174 ! get_assert no.tld "-h -t up=false -t pin=false" wrap-cred hmac-salt wrap-assert [all …]
|
/freebsd/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 56 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 79 unsigned char *salt, int slen, in pkcs12_gen_mac() argument 88 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 106 salt = p12->mac->salt->data; in pkcs12_gen_mac() 107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 153 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() [all …]
|
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 106 salt, saltlen); in PKCS12_key_gen_uni_ex() [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 19 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 28 const unsigned char *salt, int saltlen, 56 if (salt) 57 memcpy(sstr, salt, saltlen); 61 ASN1_STRING_set0(pbe->salt, sstr, saltlen); 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument 101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument [all …]
|
H A D | p5_pbev2.c | 28 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 43 unsigned char *salt, int saltlen, 112 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen, 149 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument 152 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv() 157 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument 159 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set() 164 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument 177 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex() 178 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex() [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | salt.c | 103 krb5_salt *salt) in krb5_get_pw_salt() argument 110 salt->salttype = KRB5_PW_SALT; in krb5_get_pw_salt() 114 ret = krb5_data_alloc (&salt->saltvalue, len); in krb5_get_pw_salt() 117 p = salt->saltvalue.data; in krb5_get_pw_salt() 131 krb5_salt salt) in krb5_free_salt() argument 133 krb5_data_free(&salt.saltvalue); in krb5_free_salt() 145 krb5_salt salt; in krb5_string_to_key_data() local 147 ret = krb5_get_pw_salt(context, principal, &salt); in krb5_string_to_key_data() 150 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); in krb5_string_to_key_data() 151 krb5_free_salt(context, salt); in krb5_string_to_key_data() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2.c | 88 const void *salt, const size_t saltlen, void *hash, in argon2_hash() argument 117 context.salt = (uint8_t *) salt; in argon2_hash() 161 const size_t pwdlen, const void *salt, in argon2i_hash_encoded() argument 165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_encoded() 172 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2i_hash_raw() argument 175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_raw() 182 const size_t pwdlen, const void *salt, in argon2id_hash_encoded() argument 186 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2id_hash_encoded() 193 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2id_hash_raw() argument 196 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2id_hash_raw() [all …]
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | pwhash_argon2i.c | 82 unsigned char salt[crypto_pwhash_SALTBYTES]; in tv() local 91 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, in tv() 94 tests[i].passwd_len, (const unsigned char *) salt, in tv() 134 unsigned char salt[crypto_pwhash_SALTBYTES]; in tv2() local 143 sodium_hex2bin(salt, sizeof salt, tests[i].salt_hex, in tv2() 146 tests[i].passwd_len, (const unsigned char *) salt, in tv2() 156 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2() 160 if (crypto_pwhash_argon2i(out, sizeof out, "password", strlen("password"), salt, 3, in tv2() 164 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2() 168 if (crypto_pwhash(out, sizeof out, "password", strlen("password"), salt, 3, in tv2() [all …]
|
/freebsd/lib/libcrypt/ |
H A D | crypt.c | 105 crypt_r(const char *passwd, const char *salt, struct crypt_data *data) in crypt_r() argument 114 if (cf->magic != NULL && strstr(salt, cf->magic) == salt) { in crypt_r() 119 len = strlen(salt); in crypt_r() 120 if ((len == 13 || len == 2) && strspn(salt, DES_SALT_ALPHABET) == len) { in crypt_r() 127 if (func(passwd, salt, data->__buf) != 0) in crypt_r() 133 crypt(const char *passwd, const char *salt) in crypt() argument 137 return (crypt_r(passwd, salt, &data)); in crypt()
|
/freebsd/crypto/openssl/crypto/des/ |
H A D | fcrypt.c | 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt() 79 e_salt[0] = salt[0]; in DES_crypt() 80 e_salt[1] = salt[1]; in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 108 x = ret[0] = salt[0]; in DES_fcrypt() 112 x = ret[1] = salt[1]; in DES_fcrypt()
|