/freebsd/contrib/bearssl/src/rsa/ |
H A D | rsa_pss_sig_pad.c | 31 const unsigned char *hash, size_t salt_len, in br_rsa_pss_sig_pad() argument 56 if (hash_len > xlen || salt_len > xlen in br_rsa_pss_sig_pad() 57 || (hash_len + salt_len + 2) > xlen) in br_rsa_pss_sig_pad() 65 salt = x + xlen - hash_len - salt_len - 1; in br_rsa_pss_sig_pad() 66 if (salt_len != 0) { in br_rsa_pss_sig_pad() 67 (*rng)->generate(rng, salt, salt_len); in br_rsa_pss_sig_pad() 78 hf_data->update(&hc.vtable, salt, salt_len); in br_rsa_pss_sig_pad() 85 memset(x, 0, xlen - salt_len - hash_len - 2); in br_rsa_pss_sig_pad() 86 x[xlen - salt_len - hash_len - 2] = 0x01; in br_rsa_pss_sig_pad()
|
H A D | rsa_pss_sig_unpad.c | 31 const unsigned char *hash, size_t salt_len, in br_rsa_pss_sig_unpad() argument 72 if (hash_len > xlen || salt_len > xlen in br_rsa_pss_sig_unpad() 73 || (hash_len + salt_len + 2) > xlen) in br_rsa_pss_sig_unpad() 96 for (u = 0; u < (xlen - hash_len - salt_len - 2); u ++) { in br_rsa_pss_sig_unpad() 99 r |= x[xlen - hash_len - salt_len - 2] ^ 0x01; in br_rsa_pss_sig_unpad() 104 salt = x + xlen - hash_len - salt_len - 1; in br_rsa_pss_sig_unpad() 109 hf_data->update(&hc.vtable, salt, salt_len); in br_rsa_pss_sig_unpad()
|
H A D | rsa_i32_pss_sign.c | 31 const unsigned char *hash, size_t salt_len, in br_rsa_i32_pss_sign() argument 35 salt_len, sk->n_bitlen, x)) in br_rsa_i32_pss_sign()
|
H A D | rsa_i15_pss_sign.c | 31 const unsigned char *hash, size_t salt_len, in br_rsa_i15_pss_sign() argument 35 salt_len, sk->n_bitlen, x)) in br_rsa_i15_pss_sign()
|
H A D | rsa_i31_pss_sign.c | 31 const unsigned char *hash, size_t salt_len, in br_rsa_i31_pss_sign() argument 35 salt_len, sk->n_bitlen, x)) in br_rsa_i31_pss_sign()
|
H A D | rsa_i15_pss_vrfy.c | 31 const void *hash, size_t salt_len, const br_rsa_public_key *pk) in br_rsa_i15_pss_vrfy() argument 43 hash, salt_len, pk, sig); in br_rsa_i15_pss_vrfy()
|
H A D | rsa_i31_pss_vrfy.c | 31 const void *hash, size_t salt_len, const br_rsa_public_key *pk) in br_rsa_i31_pss_vrfy() argument 43 hash, salt_len, pk, sig); in br_rsa_i31_pss_vrfy()
|
H A D | rsa_i32_pss_vrfy.c | 31 const void *hash, size_t salt_len, const br_rsa_public_key *pk) in br_rsa_i32_pss_vrfy() argument 43 hash, salt_len, pk, sig); in br_rsa_i32_pss_vrfy()
|
H A D | rsa_i62_pss_sign.c | 33 const unsigned char *hash, size_t salt_len, in br_rsa_i62_pss_sign() argument 37 salt_len, sk->n_bitlen, x)) in br_rsa_i62_pss_sign()
|
H A D | rsa_i62_pss_vrfy.c | 33 const void *hash, size_t salt_len, const br_rsa_public_key *pk) in br_rsa_i62_pss_vrfy() argument 45 hash, salt_len, pk, sig); in br_rsa_i62_pss_vrfy()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/hkdf/ |
H A D | hkdf_test.c | 35 uint_t salt_len; member 59 .salt_len = 13, 93 .salt_len = 80, 124 .salt_len = 0, 141 .salt_len = 13, 159 .salt_len = 0, 190 tv->salt_len, (uint8_t *)tv->info, tv->info_len, good, tv->okm_len); in run_test()
|
/freebsd/lib/libcrypt/ |
H A D | crypt-sha256.c | 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha256() local 96 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in crypt_sha256() 108 SHA256_Update(&ctx, salt, salt_len); in crypt_sha256() 118 SHA256_Update(&alt_ctx, salt, salt_len); in crypt_sha256() 165 SHA256_Update(&alt_ctx, salt, salt_len); in crypt_sha256() 171 cp = s_bytes = alloca(salt_len); in crypt_sha256() 172 for (cnt = salt_len; cnt >= 32; cnt -= 32) { in crypt_sha256() 192 SHA256_Update(&ctx, s_bytes, salt_len); in crypt_sha256() 215 cp = stpncpy(cp, salt, salt_len); in crypt_sha256() 240 explicit_bzero(s_bytes, salt_len); in crypt_sha256()
|
H A D | crypt-sha512.c | 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha512() local 96 salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); in crypt_sha512() 108 SHA512_Update(&ctx, salt, salt_len); in crypt_sha512() 118 SHA512_Update(&alt_ctx, salt, salt_len); in crypt_sha512() 165 SHA512_Update(&alt_ctx, salt, salt_len); in crypt_sha512() 171 cp = s_bytes = alloca(salt_len); in crypt_sha512() 172 for (cnt = salt_len; cnt >= 64; cnt -= 64) { in crypt_sha512() 192 SHA512_Update(&ctx, s_bytes, salt_len); in crypt_sha512() 215 cp = stpncpy(cp, salt, salt_len); in crypt_sha512() 252 explicit_bzero(s_bytes, salt_len); in crypt_sha512()
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_rsa.h | 330 const void *hash, size_t salt_len, const br_rsa_public_key *pk); 482 const unsigned char *hash_value, size_t salt_len, 608 const void *hash, size_t salt_len, const br_rsa_public_key *pk); 654 const unsigned char *hash_value, size_t salt_len, 709 const void *hash, size_t salt_len, const br_rsa_public_key *pk); 755 const unsigned char *hash_value, size_t salt_len, 822 const void *hash, size_t salt_len, const br_rsa_public_key *pk); 880 const unsigned char *hash_value, size_t salt_len, 999 const void *hash, size_t salt_len, const br_rsa_public_key *pk); 1045 const unsigned char *hash_value, size_t salt_len,
|
/freebsd/crypto/openssl/apps/ |
H A D | passwd.c | 326 size_t passwd_len, salt_len, magic_len; in md5crypt() local 340 salt_len = strlen(ascii_salt); in md5crypt() 342 ebcdic2ascii(ascii_salt, ascii_salt, salt_len); in md5crypt() 372 if (salt_len > 8) in md5crypt() 387 if (!EVP_DigestUpdate(md, ascii_salt, salt_len)) in md5crypt() 394 || !EVP_DigestUpdate(md2, ascii_salt, salt_len) in md5crypt() 423 if (!EVP_DigestUpdate(md2, ascii_salt, salt_len)) in md5crypt() 459 output = salt_out + salt_len; in md5crypt() 520 size_t passwd_len, salt_len, magic_len; in shacrypt() local 573 salt_len = strlen(ascii_salt); in shacrypt() [all …]
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); in pbkdf2_sha1() 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, in pbkdf2_sha1() [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 27 size_t salt_len; member 179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 327 params->salt_len = hdr.length; in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 425 if (salt_len) { in pkcs12_key_gen() [all …]
|
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | hkdf.c | 26 hkdf_sha512_extract(uint8_t *salt, uint_t salt_len, uint8_t *key_material, in hkdf_sha512_extract() argument 32 key.ck_length = CRYPTO_BYTES2BITS(salt_len); in hkdf_sha512_extract() 83 uint_t salt_len, uint8_t *info, uint_t info_len, uint8_t *output_key, in hkdf_sha512() argument 89 ret = hkdf_sha512_extract(salt, salt_len, key_material, km_len, in hkdf_sha512()
|
/freebsd/contrib/bearssl/src/kdf/ |
H A D | hkdf.c | 32 const void *salt, size_t salt_len) in br_hkdf_init() argument 39 salt_len = br_digest_size(digest_vtable); in br_hkdf_init() 40 memset(tmp, 0, salt_len); in br_hkdf_init() 42 br_hmac_key_init(&kc, digest_vtable, salt, salt_len); in br_hkdf_init()
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 50 const unsigned char *salt, size_t salt_len, 55 const unsigned char *salt, size_t salt_len, 77 size_t salt_len; member 176 return HKDF(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 180 return HKDF_Extract(libctx, md, ctx->salt, ctx->salt_len, in kdf_hkdf_derive() 240 &ctx->salt_len)) in hkdf_common_set_ctx_params() 404 const unsigned char *salt, size_t salt_len, in HKDF() argument 420 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 455 const unsigned char *salt, size_t salt_len, in HKDF_Extract() argument 470 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() [all …]
|
H A D | sskdf.c | 63 size_t salt_len; member 215 const unsigned char *salt, size_t salt_len, in SSKDF_mac_kdm() argument 239 if (!EVP_MAC_init(ctx_init, salt, salt_len, NULL)) in SSKDF_mac_kdm() 308 OPENSSL_clear_free(ctx->salt, ctx->salt_len); in sskdf_reset() 394 if (ctx->salt == NULL || ctx->salt_len <= 0) { in sskdf_derive() 400 ctx->salt_len = default_salt_len; in sskdf_derive() 404 ctx->salt, ctx->salt_len, in sskdf_derive() 484 if (!sskdf_set_buffer(&ctx->salt, &ctx->salt_len, p)) in sskdf_set_ctx_params()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | hkdf.c | 25 hkdf_sha512_extract(uint8_t *salt, uint_t salt_len, uint8_t *key_material, in hkdf_sha512_extract() argument 39 key.ck_length = CRYPTO_BYTES2BITS(salt_len); in hkdf_sha512_extract() 152 uint_t salt_len, uint8_t *info, uint_t info_len, uint8_t *output_key, in hkdf_sha512() argument 158 ret = hkdf_sha512_extract(salt, salt_len, key_material, km_len, in hkdf_sha512()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
/freebsd/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 141 u_int8_t salt_len, logr, minr; in crypt_blowfish() local 202 salt_len = BCRYPT_MAXSALT; in crypt_blowfish() 218 Blowfish_expandstate(&state, csalt, salt_len, in crypt_blowfish() 222 Blowfish_expand0state(&state, csalt, salt_len); in crypt_blowfish()
|