Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 104) sorted by relevance

12345

/openbsd/lib/libc/crypt/
H A Dbcrypt.c108 if (salt[0] != '$') in bcrypt_hashpass()
110 salt += 1; in bcrypt_hashpass()
116 switch ((minor = salt[1])) { in bcrypt_hashpass()
133 if (salt[2] != '$') in bcrypt_hashpass()
136 salt += 3; in bcrypt_hashpass()
140 !isdigit((unsigned char)salt[1]) || salt[2] != '$') in bcrypt_hashpass()
142 logr = (salt[1] - '0') + ((salt[0] - '0') * 10); in bcrypt_hashpass()
149 salt += 3; in bcrypt_hashpass()
208 char salt[BCRYPT_SALTSPACE]; in bcrypt_newhash() local
210 if (bcrypt_initsalt(log_rounds, salt, sizeof(salt)) != 0) in bcrypt_newhash()
[all …]
/openbsd/lib/libcrypto/pkcs12/
H A Dp12_mutl.c105 *psalt = p12->mac->salt; in PKCS12_get0_mac()
119 unsigned char key[EVP_MAX_MD_SIZE], *salt; in PKCS12_gen_mac() local
133 salt = p12->mac->salt->data; in PKCS12_gen_mac()
134 saltlen = p12->mac->salt->length; in PKCS12_gen_mac()
153 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac()
210 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == in PKCS12_set_mac()
247 if (!(p12->mac->salt->data = malloc(saltlen))) { in PKCS12_setup_mac()
251 p12->mac->salt->length = saltlen; in PKCS12_setup_mac()
252 if (!salt) in PKCS12_setup_mac()
253 arc4random_buf(p12->mac->salt->data, saltlen); in PKCS12_setup_mac()
[all …]
H A Dpkcs12_local.h66 ASN1_OCTET_STRING *salt; member
119 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter,
153 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
156 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
163 unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags);
169 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
H A Dp12_p8e.c69 int passlen, unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument
81 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); in PKCS8_encrypt()
83 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); in PKCS8_encrypt()
H A Dp12_key.c75 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
90 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, in PKCS12_key_gen_asc()
99 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument
141 *p++ = salt[i % saltlen]; in PKCS12_key_gen_uni()
/openbsd/lib/libcrypto/asn1/
H A Dp5_pbe.c73 .offset = offsetof(PBEPARAM, salt),
125 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument
143 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) { in PKCS5_pbe_set0_algor()
147 sstr = ASN1_STRING_data(pbe->salt); in PKCS5_pbe_set0_algor()
148 if (salt) in PKCS5_pbe_set0_algor()
149 memcpy(sstr, salt, saltlen); in PKCS5_pbe_set0_algor()
174 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
183 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
H A Dp5_pbev2.c122 .offset = offsetof(PBKDF2PARAM, salt),
186 PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, unsigned char *salt, in PKCS5_pbe2_set() argument
241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set()
279 PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, in PKCS5_pbkdf2_set() argument
291 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
292 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
301 if (salt) in PKCS5_pbkdf2_set()
302 memcpy (osalt->data, salt, saltlen); in PKCS5_pbkdf2_set()
/openbsd/lib/libcrypto/evp/
H A Devp_pbe.c243 unsigned char *salt; in PKCS5_PBE_keyivgen() local
272 salt = pbe->salt->data; in PKCS5_PBE_keyivgen()
273 saltlen = pbe->salt->length; in PKCS5_PBE_keyivgen()
287 if (!EVP_DigestUpdate(md_ctx, salt, saltlen)) in PKCS5_PBE_keyivgen()
370 if (!HMAC_Update(&hctx, salt, saltlen) || in PKCS5_PBKDF2_HMAC()
509 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen() local
567 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen()
573 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen()
604 unsigned char *salt; in PKCS12_PBE_keyivgen() local
628 salt = pbe->salt->data; in PKCS12_PBE_keyivgen()
[all …]
/openbsd/usr.sbin/radiusd/
H A Dradius_subr.c28 const u_char *salt, u_char *plain, int plainlen) in radius_attr_hide() argument
40 if (salt != NULL) in radius_attr_hide()
41 MD5Update(&md5ctx, salt, 2); in radius_attr_hide()
53 const u_char *salt, u_char *crypt0, int crypt0len) in radius_attr_unhide() argument
65 if (salt != NULL) in radius_attr_unhide()
66 MD5Update(&md5ctx, salt, 2); in radius_attr_unhide()
/openbsd/lib/libfido2/src/
H A Decdh.c23 uint8_t salt[32]; in hkdf_sha256() local
25 memset(salt, 0, sizeof(salt)); in hkdf_sha256()
27 HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt, in hkdf_sha256()
28 sizeof(salt), (const uint8_t *)info, strlen(info)) != 1) in hkdf_sha256()
41 uint8_t salt[32]; in hkdf_sha256() local
44 memset(salt, 0, sizeof(salt)); in hkdf_sha256()
57 EVP_PKEY_CTX_set1_hkdf_salt(ctx, salt, sizeof(salt)) < 1 || in hkdf_sha256()
/openbsd/lib/libcrypto/kdf/
H A Dhkdf_evp.c66 unsigned char *salt; member
94 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup()
123 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl()
124 if ((kctx->salt = malloc(p1)) == NULL) in pkey_hkdf_ctrl()
126 memcpy(kctx->salt, p2, p1); in pkey_hkdf_ctrl()
221 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init()
245 kctx->salt, kctx->salt_len, kctx->info, kctx->info_len); in pkey_hkdf_derive()
253 kctx->key_len, kctx->salt, kctx->salt_len); in pkey_hkdf_derive()
/openbsd/lib/libcrypto/des/
H A Ddes_fcrypt.c182 DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
186 return (DES_fcrypt(buf, salt, buff)); in DES_crypt()
191 DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
210 x = ret[0] = ((salt[0] == '\0') ? 'A' : salt[0]); in DES_fcrypt()
212 x = ret[1] = ((salt[1] == '\0') ? 'A' : salt[1]); in DES_fcrypt()
/openbsd/lib/libcrypto/rsa/
H A Drsa_pss.c202 unsigned char *H, *salt = NULL, *p; in RSA_padding_add_PKCS1_PSS_mgf1() local
242 salt = malloc(sLen); in RSA_padding_add_PKCS1_PSS_mgf1()
243 if (!salt) { in RSA_padding_add_PKCS1_PSS_mgf1()
247 arc4random_buf(salt, sLen); in RSA_padding_add_PKCS1_PSS_mgf1()
255 if (sLen && !EVP_DigestUpdate(md_ctx, salt, sLen)) in RSA_padding_add_PKCS1_PSS_mgf1()
275 *p++ ^= salt[i]; in RSA_padding_add_PKCS1_PSS_mgf1()
286 free(salt); in RSA_padding_add_PKCS1_PSS_mgf1()
/openbsd/usr.sbin/nsd/
H A Diterated_hash.c25 const unsigned char *salt, int saltlength, in iterated_hash() argument
50 SHA1_Update(&ctx, salt, saltlength); in iterated_hash()
59 if(!EVP_DigestUpdate(ctx, salt, saltlength)) in iterated_hash()
74 (void)out; (void)salt; (void)saltlength; in iterated_hash()
/openbsd/usr.bin/openssl/
H A Denc.c338 unsigned char salt[PKCS5_SALT_LEN]; in enc_main() local
564 if (!set_hex(cfg.hsalt, salt, sizeof salt)) { in enc_main()
570 arc4random_buf(salt, in enc_main()
571 sizeof(salt)); in enc_main()
580 (char *) salt, in enc_main()
581 sizeof salt) != sizeof salt)) { in enc_main()
587 (unsigned char *) salt, in enc_main()
588 sizeof salt) != sizeof salt) { in enc_main()
595 sptr = salt; in enc_main()
691 for (i = 0; i < (int) sizeof(salt); i++) in enc_main()
[all …]
H A Dpasswd.c49 char *salt; member
109 .opt.arg = &cfg.salt,
162 if (cfg.salt != NULL) in passwd_main()
236 if (!do_passwd(passed_salt, &cfg.salt, in passwd_main()
261 if (!do_passwd(passed_salt, &cfg.salt, in passwd_main()
299 md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument
316 strlcat(out_buf, salt, sizeof(out_buf)); in md5crypt()
/openbsd/usr.bin/snmp/
H A Dusm.c59 long long salt; member
177 arc4random_buf(&(usmcookie->salt), sizeof(usmcookie->salt)); in usm_genparams()
192 saltlen = sizeof(usmcookie->salt); in usm_genparams()
196 usm->userlen, digest, digestlen, &(usmcookie->salt), in usm_genparams()
258 char *salt = (char *)&(cookie->salt); in usm_crypt() local
267 iv[i] = salt[i] ^ key[USM_SALTOFFSET + i]; in usm_crypt()
275 memcpy(iv + 2 * sizeof(ivv), &(cookie->salt), in usm_crypt()
276 sizeof(cookie->salt)); in usm_crypt()
345 char *engineid, *user, *digest, *salt; in usm_parseparams() local
369 if (saltlen != sizeof(usmcookie->salt) && saltlen != 0) in usm_parseparams()
[all …]
/openbsd/gnu/usr.bin/perl/win32/
H A Dfcrypt.c477 des_fcrypt(const char *buf, const char *salt, char *buff) in des_fcrypt() argument
488 if (!good_for_salt(salt[0]) || !good_for_salt(salt[1])) { in des_fcrypt()
501 x=buff[0]=((salt[0] == '\0')?(char)'A':salt[0]); in des_fcrypt()
503 x=buff[1]=((salt[1] == '\0')?(char)'A':salt[1]); in des_fcrypt()
/openbsd/lib/libcrypto/hkdf/
H A Dhkdf.c32 const uint8_t *secret, size_t secret_len, const uint8_t *salt, in HKDF() argument
38 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
53 const uint8_t *salt, size_t salt_len) in HKDF_extract() argument
61 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
/openbsd/regress/lib/libutil/pkcs5_pbkdf2/
H A Dpkcs5_pbkdf2_test.c27 const char *salt; member
134 vec->salt, strlen(vec->salt), in main()
/openbsd/regress/lib/libutil/bcrypt_pbkdf/
H A Dbcrypt_pbkdf_test.c29 const uint8_t *salt; member
128 char *salt = "salt"; in main() local
143 bcrypt_pbkdf(t->password, t->passlen, t->salt, t->saltlen, in main()
/openbsd/usr.sbin/unbound/testcode/
H A Dsignit.c239 ldns_rdf* salt; in process_nsec3() local
242 status = ldns_str2rdf_nsec3_salt(&salt, argv[5]); in process_nsec3()
261 ldns_rdf_data(salt)[0], ldns_rdf_data(salt)+1); in process_nsec3()
269 ldns_rdf_deep_free(salt); in process_nsec3()
/openbsd/regress/lib/libcrypto/hkdf/
H A Dhkdf_test.c30 const uint8_t salt[80]; member
259 test->ikm_len, test->salt, test->salt_len)) { in main()
284 test->ikm_len, test->salt, test->salt_len, test->info, in main()
/openbsd/usr.sbin/adduser/
H A Dadduser.perl804 $cryptpwd = encrypt($password, &salt) if ($password ne "");
850 if($unencrypted) { $cryptpwd = encrypt($password, &salt) }
959 sub salt { subroutine
960 local($salt); # initialization
962 $salt = "";
965 $salt = 7 unless $salt; # default rounds if unspecified
970 $salt = 7;
973 warn "Salt is: $salt\n" if $verbose > 1;
975 return $salt;
980 local($pass, $salt) = ($_[0], $_[1]);
[all …]
/openbsd/gnu/usr.bin/perl/t/win32/
H A Dcrypt.t30 my ($salt, $what) = @$bad_salt;
32 is(crypt("abc", $salt), undef, "bad salt ($what)");

12345