/openbsd/lib/libc/crypt/ |
H A D | bcrypt.c | 108 if (salt[0] != '$') in bcrypt_hashpass() 110 salt += 1; in bcrypt_hashpass() 116 switch ((minor = salt[1])) { in bcrypt_hashpass() 133 if (salt[2] != '$') in bcrypt_hashpass() 136 salt += 3; in bcrypt_hashpass() 140 !isdigit((unsigned char)salt[1]) || salt[2] != '$') in bcrypt_hashpass() 142 logr = (salt[1] - '0') + ((salt[0] - '0') * 10); in bcrypt_hashpass() 149 salt += 3; in bcrypt_hashpass() 208 char salt[BCRYPT_SALTSPACE]; in bcrypt_newhash() local 210 if (bcrypt_initsalt(log_rounds, salt, sizeof(salt)) != 0) in bcrypt_newhash() [all …]
|
/openbsd/lib/libcrypto/pkcs12/ |
H A D | p12_mutl.c | 105 *psalt = p12->mac->salt; in PKCS12_get0_mac() 119 unsigned char key[EVP_MAX_MD_SIZE], *salt; in PKCS12_gen_mac() local 133 salt = p12->mac->salt->data; in PKCS12_gen_mac() 134 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 153 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac() 210 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == in PKCS12_set_mac() 247 if (!(p12->mac->salt->data = malloc(saltlen))) { in PKCS12_setup_mac() 251 p12->mac->salt->length = saltlen; in PKCS12_setup_mac() 252 if (!salt) in PKCS12_setup_mac() 253 arc4random_buf(p12->mac->salt->data, saltlen); in PKCS12_setup_mac() [all …]
|
H A D | pkcs12_local.h | 66 ASN1_OCTET_STRING *salt; member 119 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, 153 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 156 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 163 unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags); 169 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
H A D | p12_p8e.c | 69 int passlen, unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument 81 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); in PKCS8_encrypt() 83 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); in PKCS8_encrypt()
|
H A D | p12_key.c | 75 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 90 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, in PKCS12_key_gen_asc() 99 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument 141 *p++ = salt[i % saltlen]; in PKCS12_key_gen_uni()
|
/openbsd/lib/libcrypto/asn1/ |
H A D | p5_pbe.c | 73 .offset = offsetof(PBEPARAM, salt), 125 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 143 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) { in PKCS5_pbe_set0_algor() 147 sstr = ASN1_STRING_data(pbe->salt); in PKCS5_pbe_set0_algor() 148 if (salt) in PKCS5_pbe_set0_algor() 149 memcpy(sstr, salt, saltlen); in PKCS5_pbe_set0_algor() 174 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 183 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
H A D | p5_pbev2.c | 122 .offset = offsetof(PBKDF2PARAM, salt), 186 PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, unsigned char *salt, in PKCS5_pbe2_set() argument 241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set() 279 PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, in PKCS5_pbkdf2_set() argument 291 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set() 292 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set() 301 if (salt) in PKCS5_pbkdf2_set() 302 memcpy (osalt->data, salt, saltlen); in PKCS5_pbkdf2_set()
|
/openbsd/lib/libcrypto/evp/ |
H A D | evp_pbe.c | 243 unsigned char *salt; in PKCS5_PBE_keyivgen() local 272 salt = pbe->salt->data; in PKCS5_PBE_keyivgen() 273 saltlen = pbe->salt->length; in PKCS5_PBE_keyivgen() 287 if (!EVP_DigestUpdate(md_ctx, salt, saltlen)) in PKCS5_PBE_keyivgen() 370 if (!HMAC_Update(&hctx, salt, saltlen) || in PKCS5_PBKDF2_HMAC() 509 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen() local 567 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen() 573 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen() 604 unsigned char *salt; in PKCS12_PBE_keyivgen() local 628 salt = pbe->salt->data; in PKCS12_PBE_keyivgen() [all …]
|
/openbsd/usr.sbin/radiusd/ |
H A D | radius_subr.c | 28 const u_char *salt, u_char *plain, int plainlen) in radius_attr_hide() argument 40 if (salt != NULL) in radius_attr_hide() 41 MD5Update(&md5ctx, salt, 2); in radius_attr_hide() 53 const u_char *salt, u_char *crypt0, int crypt0len) in radius_attr_unhide() argument 65 if (salt != NULL) in radius_attr_unhide() 66 MD5Update(&md5ctx, salt, 2); in radius_attr_unhide()
|
/openbsd/lib/libfido2/src/ |
H A D | ecdh.c | 23 uint8_t salt[32]; in hkdf_sha256() local 25 memset(salt, 0, sizeof(salt)); in hkdf_sha256() 27 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, in hkdf_sha256() 28 sizeof(salt), (const uint8_t *)info, strlen(info)) != 1) in hkdf_sha256() 41 uint8_t salt[32]; in hkdf_sha256() local 44 memset(salt, 0, sizeof(salt)); in hkdf_sha256() 57 EVP_PKEY_CTX_set1_hkdf_salt(ctx, salt, sizeof(salt)) < 1 || in hkdf_sha256()
|
/openbsd/lib/libcrypto/kdf/ |
H A D | hkdf_evp.c | 66 unsigned char *salt; member 94 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup() 123 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl() 124 if ((kctx->salt = malloc(p1)) == NULL) in pkey_hkdf_ctrl() 126 memcpy(kctx->salt, p2, p1); in pkey_hkdf_ctrl() 221 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init() 245 kctx->salt, kctx->salt_len, kctx->info, kctx->info_len); in pkey_hkdf_derive() 253 kctx->key_len, kctx->salt, kctx->salt_len); in pkey_hkdf_derive()
|
/openbsd/lib/libcrypto/des/ |
H A D | des_fcrypt.c | 182 DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 186 return (DES_fcrypt(buf, salt, buff)); in DES_crypt() 191 DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 210 x = ret[0] = ((salt[0] == '\0') ? 'A' : salt[0]); in DES_fcrypt() 212 x = ret[1] = ((salt[1] == '\0') ? 'A' : salt[1]); in DES_fcrypt()
|
/openbsd/lib/libcrypto/rsa/ |
H A D | rsa_pss.c | 202 unsigned char *H, *salt = NULL, *p; in RSA_padding_add_PKCS1_PSS_mgf1() local 242 salt = malloc(sLen); in RSA_padding_add_PKCS1_PSS_mgf1() 243 if (!salt) { in RSA_padding_add_PKCS1_PSS_mgf1() 247 arc4random_buf(salt, sLen); in RSA_padding_add_PKCS1_PSS_mgf1() 255 if (sLen && !EVP_DigestUpdate(md_ctx, salt, sLen)) in RSA_padding_add_PKCS1_PSS_mgf1() 275 *p++ ^= salt[i]; in RSA_padding_add_PKCS1_PSS_mgf1() 286 free(salt); in RSA_padding_add_PKCS1_PSS_mgf1()
|
/openbsd/usr.sbin/nsd/ |
H A D | iterated_hash.c | 25 const unsigned char *salt, int saltlength, in iterated_hash() argument 50 SHA1_Update(&ctx, salt, saltlength); in iterated_hash() 59 if(!EVP_DigestUpdate(ctx, salt, saltlength)) in iterated_hash() 74 (void)out; (void)salt; (void)saltlength; in iterated_hash()
|
/openbsd/usr.bin/openssl/ |
H A D | enc.c | 338 unsigned char salt[PKCS5_SALT_LEN]; in enc_main() local 564 if (!set_hex(cfg.hsalt, salt, sizeof salt)) { in enc_main() 570 arc4random_buf(salt, in enc_main() 571 sizeof(salt)); in enc_main() 580 (char *) salt, in enc_main() 581 sizeof salt) != sizeof salt)) { in enc_main() 587 (unsigned char *) salt, in enc_main() 588 sizeof salt) != sizeof salt) { in enc_main() 595 sptr = salt; in enc_main() 691 for (i = 0; i < (int) sizeof(salt); i++) in enc_main() [all …]
|
H A D | passwd.c | 49 char *salt; member 109 .opt.arg = &cfg.salt, 162 if (cfg.salt != NULL) in passwd_main() 236 if (!do_passwd(passed_salt, &cfg.salt, in passwd_main() 261 if (!do_passwd(passed_salt, &cfg.salt, in passwd_main() 299 md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument 316 strlcat(out_buf, salt, sizeof(out_buf)); in md5crypt()
|
/openbsd/usr.bin/snmp/ |
H A D | usm.c | 59 long long salt; member 177 arc4random_buf(&(usmcookie->salt), sizeof(usmcookie->salt)); in usm_genparams() 192 saltlen = sizeof(usmcookie->salt); in usm_genparams() 196 usm->userlen, digest, digestlen, &(usmcookie->salt), in usm_genparams() 258 char *salt = (char *)&(cookie->salt); in usm_crypt() local 267 iv[i] = salt[i] ^ key[USM_SALTOFFSET + i]; in usm_crypt() 275 memcpy(iv + 2 * sizeof(ivv), &(cookie->salt), in usm_crypt() 276 sizeof(cookie->salt)); in usm_crypt() 345 char *engineid, *user, *digest, *salt; in usm_parseparams() local 369 if (saltlen != sizeof(usmcookie->salt) && saltlen != 0) in usm_parseparams() [all …]
|
/openbsd/gnu/usr.bin/perl/win32/ |
H A D | fcrypt.c | 477 des_fcrypt(const char *buf, const char *salt, char *buff) in des_fcrypt() argument 488 if (!good_for_salt(salt[0]) || !good_for_salt(salt[1])) { in des_fcrypt() 501 x=buff[0]=((salt[0] == '\0')?(char)'A':salt[0]); in des_fcrypt() 503 x=buff[1]=((salt[1] == '\0')?(char)'A':salt[1]); in des_fcrypt()
|
/openbsd/lib/libcrypto/hkdf/ |
H A D | hkdf.c | 32 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() argument 38 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 53 const uint8_t *salt, size_t salt_len) in HKDF_extract() argument 61 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
|
/openbsd/regress/lib/libutil/pkcs5_pbkdf2/ |
H A D | pkcs5_pbkdf2_test.c | 27 const char *salt; member 134 vec->salt, strlen(vec->salt), in main()
|
/openbsd/regress/lib/libutil/bcrypt_pbkdf/ |
H A D | bcrypt_pbkdf_test.c | 29 const uint8_t *salt; member 128 char *salt = "salt"; in main() local 143 bcrypt_pbkdf(t->password, t->passlen, t->salt, t->saltlen, in main()
|
/openbsd/usr.sbin/unbound/testcode/ |
H A D | signit.c | 239 ldns_rdf* salt; in process_nsec3() local 242 status = ldns_str2rdf_nsec3_salt(&salt, argv[5]); in process_nsec3() 261 ldns_rdf_data(salt)[0], ldns_rdf_data(salt)+1); in process_nsec3() 269 ldns_rdf_deep_free(salt); in process_nsec3()
|
/openbsd/regress/lib/libcrypto/hkdf/ |
H A D | hkdf_test.c | 30 const uint8_t salt[80]; member 259 test->ikm_len, test->salt, test->salt_len)) { in main() 284 test->ikm_len, test->salt, test->salt_len, test->info, in main()
|
/openbsd/usr.sbin/adduser/ |
H A D | adduser.perl | 804 $cryptpwd = encrypt($password, &salt) if ($password ne ""); 850 if($unencrypted) { $cryptpwd = encrypt($password, &salt) } 959 sub salt { subroutine 960 local($salt); # initialization 962 $salt = ""; 965 $salt = 7 unless $salt; # default rounds if unspecified 970 $salt = 7; 973 warn "Salt is: $salt\n" if $verbose > 1; 975 return $salt; 980 local($pass, $salt) = ($_[0], $_[1]); [all …]
|
/openbsd/gnu/usr.bin/perl/t/win32/ |
H A D | crypt.t | 30 my ($salt, $what) = @$bad_salt; 32 is(crypt("abc", $salt), undef, "bad salt ($what)");
|