/illumos-gate/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 169 int salt_len, plaintext_len, i; in crypt_genhash_impl() local 200 salt_len = MIN(strcspn(salt, "$"), MAX_SALT_LEN); in crypt_genhash_impl() 210 DIGESTUpdate(&ctxA, salt, salt_len); in crypt_genhash_impl() 215 DIGESTUpdate(&ctxB, salt, salt_len); in crypt_genhash_impl() 252 DIGESTUpdate(&ctxDS, salt, salt_len); in crypt_genhash_impl() 256 Sp = S = alloca(salt_len); in crypt_genhash_impl() 257 for (i = salt_len; i >= MIXCHARS; i -= MIXCHARS) { in crypt_genhash_impl() 276 DIGESTUpdate(&ctxC, S, salt_len); in crypt_genhash_impl() 302 (void) strncat(ctbuffer, (const char *)salt, salt_len); in crypt_genhash_impl()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 94 unsigned int salt_len = 0; in asn1_encode_key() local 101 salt_len += length; in asn1_encode_key() 104 salt_len += length; in asn1_encode_key() 109 salt_len += length; in asn1_encode_key() 111 salt_len += length; in asn1_encode_key() 113 ret = asn1_make_sequence(buf, salt_len, &length); checkerr; in asn1_encode_key() 114 salt_len += length; in asn1_encode_key() 115 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 0, salt_len, &length); checkerr; in asn1_encode_key() 116 salt_len += length; in asn1_encode_key() 118 sum += salt_len; in asn1_encode_key()
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | hkdf.c | 27 hkdf_sha512_extract(uint8_t *salt, uint_t salt_len, uint8_t *key_material, in hkdf_sha512_extract() argument 42 key.ck_length = CRYPTO_BYTES2BITS(salt_len); in hkdf_sha512_extract() 156 uint_t salt_len, uint8_t *info, uint_t info_len, uint8_t *output_key, in hkdf_sha512() argument 162 ret = hkdf_sha512_extract(salt, salt_len, key_material, km_len, in hkdf_sha512()
|
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 199 uint8_t salt_len, logr, minor; local 251 salt_len = BCRYPT_MAXSALT; 269 Blowfish_expandstate(&state, csalt, salt_len, 273 Blowfish_expand0state(&state, csalt, salt_len);
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 118 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, 137 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type,
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 378 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, in pkcs11_PasswdToPBKD2Object() argument 427 if (salt == NULL || salt_len == 0) { in pkcs11_PasswdToPBKD2Object() 434 params.ulSaltSourceDataLen = salt_len; in pkcs11_PasswdToPBKD2Object() 563 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type, in pkcs11_PasswdToKey() argument 570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, in pkcs11_PasswdToKey()
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_negotiate.c | 425 uint16_t salt_len = sizeof (picap->picap_salt); in smb31_encode_neg_ctxs() local 426 uint32_t preauth_ctx_len = 6 + salt_len; in smb31_encode_neg_ctxs() 438 picap->picap_salt_len = salt_len; in smb31_encode_neg_ctxs() 440 (void) random_get_pseudo_bytes(picap->picap_salt, salt_len); in smb31_encode_neg_ctxs() 453 salt_len, /* salt length */ in smb31_encode_neg_ctxs() 455 salt_len, /* salt length */ in smb31_encode_neg_ctxs()
|
/illumos-gate/usr/src/uts/common/fs/zfs/sys/ |
H A D | hkdf.h | 26 uint_t salt_len, uint8_t *info, uint_t info_len, uint8_t *output_key,
|
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | dump.c | 1780 int alt_key_len, salt_len, alt_salt_len; local 1813 &alt_key_len, &salt_len, &alt_salt_len); 1817 pkey->key_data_length[1] = salt_len; 1832 (!salt_len || 1834 (krb5_octet *) malloc((size_t) (salt_len + 1)))) &&
|