Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 7 of 7) sorted by relevance

/titanic_41/usr/src/lib/crypt_modules/sha256/
H A Dcrypt_sha.c169 int salt_len, plaintext_len, i; in crypt_genhash_impl() local
200 salt_len = MIN(strcspn(salt, "$"), MAX_SALT_LEN); in crypt_genhash_impl()
210 DIGESTUpdate(&ctxA, salt, salt_len); in crypt_genhash_impl()
215 DIGESTUpdate(&ctxB, salt, salt_len); in crypt_genhash_impl()
252 DIGESTUpdate(&ctxDS, salt, salt_len); in crypt_genhash_impl()
256 Sp = S = alloca(salt_len); in crypt_genhash_impl()
257 for (i = salt_len; i >= MIXCHARS; i -= MIXCHARS) { in crypt_genhash_impl()
276 DIGESTUpdate(&ctxC, S, salt_len); in crypt_genhash_impl()
302 (void) strncat(ctbuffer, (const char *)salt, salt_len); in crypt_genhash_impl()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dldap_key_seq.c96 unsigned int salt_len = 0; in asn1_encode_key() local
103 salt_len += length; in asn1_encode_key()
106 salt_len += length; in asn1_encode_key()
111 salt_len += length; in asn1_encode_key()
113 salt_len += length; in asn1_encode_key()
115 ret = asn1_make_sequence(buf, salt_len, &length); checkerr; in asn1_encode_key()
116 salt_len += length; in asn1_encode_key()
117 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 0, salt_len, &length); checkerr; in asn1_encode_key()
118 salt_len += length; in asn1_encode_key()
120 sum += salt_len; in asn1_encode_key()
/titanic_41/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c199 uint8_t salt_len, logr, minor; local
251 salt_len = BCRYPT_MAXSALT;
269 Blowfish_expandstate(&state, csalt, salt_len,
273 Blowfish_expand0state(&state, csalt, salt_len);
/titanic_41/usr/src/lib/pkcs11/include/
H A Dcryptoki.h120 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations,
139 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type,
/titanic_41/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11SUNWExtensions.c378 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, in pkcs11_PasswdToPBKD2Object() argument
427 if (salt == NULL || salt_len == 0) { in pkcs11_PasswdToPBKD2Object()
434 params.ulSaltSourceDataLen = salt_len; in pkcs11_PasswdToPBKD2Object()
563 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type, in pkcs11_PasswdToKey() argument
570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, in pkcs11_PasswdToKey()
/titanic_41/usr/src/cmd/ssh/libssh/common/
H A Dhostfile.c64 extract_salt(const char *s, u_int l, char *salt, size_t salt_len) in extract_salt() argument
96 ret = __b64_pton(b64salt, (u_char *) salt, salt_len); in extract_salt()
/titanic_41/usr/src/cmd/krb5/kadmin/dbutil/
H A Ddump.c1782 int alt_key_len, salt_len, alt_salt_len; local
1815 &alt_key_len, &salt_len, &alt_salt_len);
1819 pkey->key_data_length[1] = salt_len;
1834 (!salt_len ||
1836 (krb5_octet *) malloc((size_t) (salt_len + 1)))) &&