/titanic_41/usr/src/lib/crypt_modules/sha256/ |
H A D | crypt_sha.c | 169 int salt_len, plaintext_len, i; in crypt_genhash_impl() local 200 salt_len = MIN(strcspn(salt, "$"), MAX_SALT_LEN); in crypt_genhash_impl() 210 DIGESTUpdate(&ctxA, salt, salt_len); in crypt_genhash_impl() 215 DIGESTUpdate(&ctxB, salt, salt_len); in crypt_genhash_impl() 252 DIGESTUpdate(&ctxDS, salt, salt_len); in crypt_genhash_impl() 256 Sp = S = alloca(salt_len); in crypt_genhash_impl() 257 for (i = salt_len; i >= MIXCHARS; i -= MIXCHARS) { in crypt_genhash_impl() 276 DIGESTUpdate(&ctxC, S, salt_len); in crypt_genhash_impl() 302 (void) strncat(ctbuffer, (const char *)salt, salt_len); in crypt_genhash_impl()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | ldap_key_seq.c | 96 unsigned int salt_len = 0; in asn1_encode_key() local 103 salt_len += length; in asn1_encode_key() 106 salt_len += length; in asn1_encode_key() 111 salt_len += length; in asn1_encode_key() 113 salt_len += length; in asn1_encode_key() 115 ret = asn1_make_sequence(buf, salt_len, &length); checkerr; in asn1_encode_key() 116 salt_len += length; in asn1_encode_key() 117 ret = asn1_make_etag(buf, CONTEXT_SPECIFIC, 0, salt_len, &length); checkerr; in asn1_encode_key() 118 salt_len += length; in asn1_encode_key() 120 sum += salt_len; in asn1_encode_key()
|
/titanic_41/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 199 uint8_t salt_len, logr, minor; local 251 salt_len = BCRYPT_MAXSALT; 269 Blowfish_expandstate(&state, csalt, salt_len, 273 Blowfish_expand0state(&state, csalt, salt_len);
|
/titanic_41/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 120 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, 139 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type,
|
/titanic_41/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 378 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, in pkcs11_PasswdToPBKD2Object() argument 427 if (salt == NULL || salt_len == 0) { in pkcs11_PasswdToPBKD2Object() 434 params.ulSaltSourceDataLen = salt_len; in pkcs11_PasswdToPBKD2Object() 563 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type, in pkcs11_PasswdToKey() argument 570 salt, salt_len, CK_PKCS5_PBKD2_ITERATIONS, key_type, key_len, 0, in pkcs11_PasswdToKey()
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | hostfile.c | 64 extract_salt(const char *s, u_int l, char *salt, size_t salt_len) in extract_salt() argument 96 ret = __b64_pton(b64salt, (u_char *) salt, salt_len); in extract_salt()
|
/titanic_41/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | dump.c | 1782 int alt_key_len, salt_len, alt_salt_len; local 1815 &alt_key_len, &salt_len, &alt_salt_len); 1819 pkey->key_data_length[1] = salt_len; 1834 (!salt_len || 1836 (krb5_octet *) malloc((size_t) (salt_len + 1)))) &&
|