| /freebsd/crypto/openssl/crypto/asn1/ |
| H A D | p5_pbe.c | 29 const unsigned char *salt, int saltlen, 48 if (!saltlen) 49 saltlen = PKCS5_DEFAULT_PBE1_SALT_LEN; 50 if (saltlen < 0) 53 sstr = OPENSSL_malloc(saltlen); 57 memcpy(sstr, salt, saltlen); 58 else if (RAND_bytes_ex(ctx, sstr, saltlen, 0) <= 0) 61 ASN1_STRING_set0(pbe->salt, sstr, saltlen); 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor() [all …]
|
| H A D | p5_pbev2.c | 52 unsigned char *salt, int saltlen, 126 pbe2->keyfunc = PKCS5_pbkdf2_set_ex(iter, salt, saltlen, prf_nid, keylen, 166 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument 169 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv() 174 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument 176 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set() 180 X509_ALGOR *PKCS5_pbkdf2_set_ex(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set_ex() argument 200 if (saltlen < 0) { in PKCS5_pbkdf2_set_ex() 204 if (saltlen == 0) in PKCS5_pbkdf2_set_ex() 205 saltlen = PKCS5_DEFAULT_PBE2_SALT_LEN; in PKCS5_pbkdf2_set_ex() [all …]
|
| H A D | p5_scrypt.c | 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() argument 119 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 158 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 170 if (!saltlen) in pkcs5_scrypt_set() 171 saltlen = PKCS5_DEFAULT_PBE2_SALT_LEN; in pkcs5_scrypt_set() 174 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) { in pkcs5_scrypt_set() 179 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set() 246 size_t saltlen; in PKCS5_v2_scrypt_keyivgen_ex() local 296 saltlen = sparam->salt->length; in PKCS5_v2_scrypt_keyivgen_ex() [all …]
|
| /freebsd/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_key.c | 20 int saltlen, int id, int iter, int n, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 42 int saltlen, int id, int iter, int n, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 50 int saltlen, int id, int iter, int n, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 72 int saltlen, int id, int iter, int n, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 80 int saltlen, int id, int iter, int n, in PKCS12_key_gen_uni_ex() argument 106 salt, saltlen); in PKCS12_key_gen_uni_ex() [all …]
|
| H A D | p12_mutl.c | 26 unsigned char *salt, int saltlen, 63 const unsigned char *salt, int saltlen, in pkcs12_gen_gost_mac_key() argument 73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 185 int saltlen, iter; in pkcs12_gen_mac() local 203 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 246 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 266 int res = (*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 279 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 360 unsigned char *salt, int saltlen, int iter, in PKCS12_set_mac() argument 372 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) { in PKCS12_set_mac() [all …]
|
| H A D | p12_p8e.c | 18 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt_ex() argument 30 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS8_encrypt_ex() 40 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, in PKCS8_encrypt_ex() 44 pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, libctx); in PKCS8_encrypt_ex() 62 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt()
|
| H A D | p12_crpt.c | 29 int saltlen, iter, ret; in PKCS12_PBE_keyivgen_ex() local 50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex() 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
|
| H A D | p12_add.c | 95 unsigned char *salt, int saltlen, int iter, in PKCS12_pack_p7encdata_ex() argument 120 pbe = PKCS5_pbe2_set_iv_ex(pbe_ciph, iter, salt, saltlen, NULL, -1, ctx); in PKCS12_pack_p7encdata_ex() 122 pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, ctx); in PKCS12_pack_p7encdata_ex() 148 unsigned char *salt, int saltlen, int iter, in PKCS12_pack_p7encdata() argument 151 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata()
|
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
| H A D | crypto_scrypt-common.c | 146 size_t saltlen; in escrypt_r() local 163 saltlen = src - salt; in escrypt_r() 165 saltlen = strlen((char *) salt); in escrypt_r() 167 need = prefixlen + saltlen + 1 + in escrypt_r() 169 if (need > buflen || need < saltlen) { in escrypt_r() 178 if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, N, r, p, hash, in escrypt_r() 183 memcpy(dst, setting, prefixlen + saltlen); in escrypt_r() 184 dst += prefixlen + saltlen; in escrypt_r() 204 size_t saltlen = BYTES2CHARS(srclen); in escrypt_gensalt_r() local 207 need = prefixlen + saltlen + 1; in escrypt_gensalt_r() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | bcrypt_pbkdf.c | 114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 130 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 132 if ((countsalt = calloc(1, saltlen + 4)) == NULL) in bcrypt_pbkdf() 137 memcpy(countsalt, salt, saltlen); in bcrypt_pbkdf() 144 countsalt[saltlen + 0] = (count >> 24) & 0xff; in bcrypt_pbkdf() 145 countsalt[saltlen + 1] = (count >> 16) & 0xff; in bcrypt_pbkdf() 146 countsalt[saltlen + 2] = (count >> 8) & 0xff; in bcrypt_pbkdf() 147 countsalt[saltlen + 3] = count & 0xff; in bcrypt_pbkdf() 150 crypto_hash_sha512(sha2salt, countsalt, saltlen + 4); in bcrypt_pbkdf() [all …]
|
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
| H A D | argon2.c | 88 const void *salt, const size_t saltlen, void *hash, in argon2_hash() argument 104 if (saltlen > ARGON2_MAX_SALT_LENGTH) { in argon2_hash() 118 context.saltlen = (uint32_t) saltlen; in argon2_hash() 162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument 165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_encoded() 172 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2i_hash_raw() argument 175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_raw() 183 const size_t saltlen, const size_t hashlen, char *encoded, in argon2id_hash_encoded() argument 186 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2id_hash_encoded() 193 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2id_hash_raw() argument [all …]
|
| H A D | argon2.h | 171 uint32_t saltlen; /* salt length */ member 215 const size_t saltlen, const size_t hashlen, 236 const size_t saltlen, const size_t hashlen, 256 const size_t saltlen, void *hash, const size_t hashlen); 275 const size_t saltlen, void *hash, const size_t hashlen); 280 const size_t pwdlen, const void *salt, const size_t saltlen,
|
| /freebsd/crypto/openssl/providers/implementations/signature/ |
| H A D | rsa_sig.c | 137 int saltlen; member 250 prsactx->saltlen = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX; in rsa_newctx() 257 int saltlen = ctx->saltlen; in rsa_pss_compute_saltlen() local 267 if (saltlen == RSA_PSS_SALTLEN_DIGEST) { in rsa_pss_compute_saltlen() 268 if ((saltlen = EVP_MD_get_size(ctx->md)) <= 0) { in rsa_pss_compute_saltlen() 272 } else if (saltlen == RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) { in rsa_pss_compute_saltlen() 273 saltlen = RSA_PSS_SALTLEN_MAX; in rsa_pss_compute_saltlen() 279 if (saltlen == RSA_PSS_SALTLEN_MAX || saltlen == RSA_PSS_SALTLEN_AUTO) { in rsa_pss_compute_saltlen() 290 saltlen = rsasize - mdsize - 2; in rsa_pss_compute_saltlen() 292 saltlen--; in rsa_pss_compute_saltlen() [all …]
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_ameth.c | 455 int saltlen; in rsa_ctx_to_pss() local 466 if (EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen) <= 0) in rsa_ctx_to_pss() 468 if (saltlen == RSA_PSS_SALTLEN_DIGEST) { in rsa_ctx_to_pss() 469 saltlen = md_size; in rsa_ctx_to_pss() 470 } else if (saltlen == RSA_PSS_SALTLEN_AUTO_DIGEST_MAX) { in rsa_ctx_to_pss() 478 saltlen = RSA_PSS_SALTLEN_MAX; in rsa_ctx_to_pss() 481 if (saltlen == RSA_PSS_SALTLEN_MAX || saltlen == RSA_PSS_SALTLEN_AUTO) { in rsa_ctx_to_pss() 482 saltlen = EVP_PKEY_get_size(pk) - md_size - 2; in rsa_ctx_to_pss() 484 saltlen--; in rsa_ctx_to_pss() 485 if (saltlen < 0) in rsa_ctx_to_pss() [all …]
|
| H A D | rsa_pmeth.c | 47 int saltlen; member 75 rctx->saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_init() 102 dctx->saltlen = sctx->saltlen; in pkey_rsa_copy() 195 rctx->saltlen)) in pkey_rsa_sign() 303 rctx->tbuf, rctx->saltlen); in pkey_rsa_verify() 487 *(int *)p2 = rctx->saltlen; in pkey_rsa_ctrl() 509 rctx->saltlen = p1; in pkey_rsa_ctrl() 679 int saltlen; in pkey_rsa_ctrl_str() local 682 saltlen = RSA_PSS_SALTLEN_DIGEST; in pkey_rsa_ctrl_str() 684 saltlen = RSA_PSS_SALTLEN_MAX; in pkey_rsa_ctrl_str() [all …]
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | p5_crpt2.c | 23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() argument 41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex() 55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 73 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 86 int saltlen, int iter, const EVP_MD *digest, int keylen, in PKCS5_PBKDF2_HMAC() argument 89 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC() 94 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() argument 101 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 187 int saltlen, iter, t; in PKCS5_v2_PBKDF2_keyivgen_ex() local 253 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen_ex() [all …]
|
| H A D | pbe_scrypt.c | 38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex() argument 61 saltlen = 0; in EVP_PBE_scrypt_ex() 77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex() 91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
| /freebsd/crypto/libecc/src/examples/sig/rsa/ |
| H A D | rsa_pkcs1_tests.h | 47 .saltlen = sizeof(rsa_oaep_0_salt), 110 .saltlen = sizeof(rsa_oaep_1_CRT_salt), 158 .saltlen = sizeof(rsa_oaep_2_salt), 221 .saltlen = sizeof(rsa_oaep_3_CRT_salt), 269 .saltlen = sizeof(rsa_oaep_4_salt), 332 .saltlen = sizeof(rsa_oaep_5_CRT_salt), 380 .saltlen = sizeof(rsa_oaep_6_salt), 443 .saltlen = sizeof(rsa_oaep_7_CRT_salt), 491 .saltlen = sizeof(rsa_oaep_8_salt), 554 .saltlen = sizeof(rsa_oaep_9_CRT_salt), [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | PKCS5_PBE_keyivgen.pod | 32 const unsigned char *salt, size_t saltlen, 36 const unsigned char *salt, size_t saltlen, 51 const unsigned char *salt, int saltlen); 53 const unsigned char *salt, int saltlen, 57 const unsigned char *salt, int saltlen); 59 const unsigned char *salt, int saltlen, 63 unsigned char *salt, int saltlen); 65 unsigned char *salt, int saltlen, 68 unsigned char *salt, int saltlen, 72 const unsigned char *salt, int saltlen, [all …]
|
| H A D | PKCS12_key_gen_utf8_ex.pod | 14 int saltlen, int id, int iter, int n, 17 int saltlen, int id, int iter, int n, 21 int saltlen, int id, int iter, int n, 24 int saltlen, int id, int iter, int n, 28 int saltlen, int id, int iter, int n, 31 int saltlen, int id, int iter, int n, 39 I<saltlen>, an iteration count I<iter> and a digest algorithm I<md_type>. 83 I<salt> is the salt used in the derivation of length I<saltlen>. If the 84 I<salt> is NULL, then I<saltlen> must be 0. The function will not
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | pkcs12.h | 159 int saltlen, int iter, 165 int saltlen, int iter, 185 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8); 188 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8, 198 unsigned char *salt, int saltlen, int iter, 201 unsigned char *salt, int saltlen, int iter, 265 int saltlen, int id, int iter, int n, 268 int saltlen, int id, int iter, int n, 272 int saltlen, int id, int iter, int n, 275 int saltlen, int id, int iter, int n, [all …]
|
| H A D | pkcs12.h.in | 136 int saltlen, int iter, 142 int saltlen, int iter, 162 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8); 165 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8, 175 unsigned char *salt, int saltlen, int iter, 178 unsigned char *salt, int saltlen, int iter, 242 int saltlen, int id, int iter, int n, 245 int saltlen, int id, int iter, int n, 249 int saltlen, int id, int iter, int n, 252 int saltlen, int id, int iter, int n, [all …]
|
| /freebsd/crypto/openssl/apps/ |
| H A D | enc.c | 167 int saltlen = 0; in enc_main() local 335 if (!opt_int(opt_arg(), &saltlen)) in enc_main() 337 if (saltlen > (int)sizeof(salt)) in enc_main() 338 saltlen = (int)sizeof(salt); in enc_main() 373 if (saltlen == 0 || pbkdf2 == 0) in enc_main() 374 saltlen = PKCS5_SALT_LEN; in enc_main() 554 if (hsalt != NULL && !set_hex(hsalt, salt, saltlen)) { in enc_main() 560 if (RAND_bytes(salt, saltlen) <= 0) { in enc_main() 574 saltlen) in enc_main() 575 != saltlen)) { in enc_main() [all …]
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_nsec3.c | 202 uint8_t** salt, size_t* saltlen) in nsec3_get_salt() argument 209 *saltlen = 0; in nsec3_get_salt() 212 *saltlen = (size_t)d->rr_data[r][2+4]; in nsec3_get_salt() 213 if(d->rr_len[r] < 2+5+(size_t)*saltlen) { in nsec3_get_salt() 215 *saltlen = 0; in nsec3_get_salt() 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) in nsec3_get_params() argument 227 if(!nsec3_get_salt(rrset, r, salt, saltlen)) in nsec3_get_params() 238 size_t saltlen; in nsec3_get_nextowner() local 247 saltlen = (size_t)d->rr_data[r][2+4]; in nsec3_get_nextowner() 248 if(d->rr_len[r] < 2+5+saltlen+1) { in nsec3_get_nextowner() [all …]
|
| /freebsd/crypto/openssl/providers/common/der/ |
| H A D | der_rsa_key.c | 286 int saltlen, default_saltlen; in ossl_DER_w_RSASSA_PSS_params() local 304 saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_DER_w_RSASSA_PSS_params() 307 if (saltlen < 0) { in ossl_DER_w_RSASSA_PSS_params() 350 && (saltlen == default_saltlen || ossl_DER_w_uint32(pkt, 2, (uint32_t)saltlen)) in ossl_DER_w_RSASSA_PSS_params()
|