/dragonfly/lib/libssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 130 keylen > sizeof(out) * sizeof(out) || saltlen > 1<<20) in bcrypt_pbkdf() 132 if ((countsalt = calloc(1, saltlen + 4)) == NULL) in bcrypt_pbkdf() 137 memcpy(countsalt, salt, saltlen); in bcrypt_pbkdf() 144 countsalt[saltlen + 0] = (count >> 24) & 0xff; in bcrypt_pbkdf() 145 countsalt[saltlen + 1] = (count >> 16) & 0xff; in bcrypt_pbkdf() 146 countsalt[saltlen + 2] = (count >> 8) & 0xff; in bcrypt_pbkdf() 147 countsalt[saltlen + 3] = count & 0xff; in bcrypt_pbkdf() 150 crypto_hash_sha512(sha2salt, countsalt, saltlen + 4); in bcrypt_pbkdf() [all …]
|
/dragonfly/crypto/libressl/crypto/pkcs12/ |
H A D | p12_mutl.c | 117 int saltlen, iter; in PKCS12_gen_mac() local 127 saltlen = p12->mac->salt->length; in PKCS12_gen_mac() 146 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac() 196 int saltlen, int iter, const EVP_MD *md_type) in PKCS12_set_mac() argument 203 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == in PKCS12_set_mac() 237 if (!saltlen) in PKCS12_setup_mac() 238 saltlen = PKCS12_SALT_LEN; in PKCS12_setup_mac() 239 if (!(p12->mac->salt->data = malloc(saltlen))) { in PKCS12_setup_mac() 243 p12->mac->salt->length = saltlen; in PKCS12_setup_mac() 245 arc4random_buf(p12->mac->salt->data, saltlen); in PKCS12_setup_mac() [all …]
|
H A D | p12_crpt.c | 77 int saltlen, iter, ret; in PKCS12_PBE_keyivgen() local 103 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen() 104 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen() 110 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
|
H A D | p12_key.c | 75 int saltlen, int id, int iter, int n, unsigned char *out, in PKCS12_key_gen_asc() argument 89 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, in PKCS12_key_gen_asc() 99 int saltlen, int id, int iter, int n, unsigned char *out, in PKCS12_key_gen_uni() argument 124 Slen = v * ((saltlen + v - 1) / v); in PKCS12_key_gen_uni() 140 *p++ = salt[i % saltlen]; in PKCS12_key_gen_uni()
|
H A D | p12_p8e.c | 68 int passlen, unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument 80 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); in PKCS8_encrypt() 82 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); in PKCS8_encrypt()
|
H A D | p12_add.c | 136 unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) in PKCS12_pack_p7encdata() argument 154 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); in PKCS12_pack_p7encdata() 156 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); in PKCS12_pack_p7encdata()
|
H A D | p12_sbag.c | 206 unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8info) in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument 215 if ((p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | p5_pbe.c | 122 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 139 if (!saltlen) in PKCS5_pbe_set0_algor() 140 saltlen = PKCS5_SALT_LEN; in PKCS5_pbe_set0_algor() 141 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) { in PKCS5_pbe_set0_algor() 147 memcpy(sstr, salt, saltlen); in PKCS5_pbe_set0_algor() 149 arc4random_buf(sstr, saltlen); in PKCS5_pbe_set0_algor() 172 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 181 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
H A D | p5_pbev2.c | 187 int saltlen, unsigned char *aiv, int prf_nid) in PKCS5_pbe2_set_iv() argument 252 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv() 291 int saltlen) in PKCS5_pbe2_set() argument 293 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); in PKCS5_pbe2_set() 297 PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, in PKCS5_pbkdf2_set() argument 312 if (!saltlen) in PKCS5_pbkdf2_set() 313 saltlen = PKCS5_SALT_LEN; in PKCS5_pbkdf2_set() 314 if (!(osalt->data = malloc (saltlen))) in PKCS5_pbkdf2_set() 317 osalt->length = saltlen; in PKCS5_pbkdf2_set() 320 memcpy (osalt->data, salt, saltlen); in PKCS5_pbkdf2_set() [all …]
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_pmeth.c | 92 int saltlen; member 121 rctx->saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_init() 479 *(int *)p2 = rctx->saltlen; in pkey_rsa_ctrl() 496 rctx->saltlen = p1; in pkey_rsa_ctrl() 648 int saltlen; in pkey_rsa_ctrl_str() local 653 saltlen = RSA_PSS_SALTLEN_MAX; in pkey_rsa_ctrl_str() 655 saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_ctrl_str() 657 saltlen = atoi(value); in pkey_rsa_ctrl_str() 694 int saltlen = atoi(value); in pkey_rsa_ctrl_str() local 736 rctx->saltlen == RSA_PSS_SALTLEN_AUTO ? 0 : rctx->saltlen); in rsa_set_pss_param() [all …]
|
H A D | rsa_ameth.c | 660 int saltlen; in rsa_ctx_to_pss() local 668 if (saltlen == -1) { in rsa_ctx_to_pss() 669 saltlen = EVP_MD_size(sigmd); in rsa_ctx_to_pss() 670 } else if (saltlen == -2 || saltlen == -3) { in rsa_ctx_to_pss() 671 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; in rsa_ctx_to_pss() 673 saltlen--; in rsa_ctx_to_pss() 674 if (saltlen < 0) in rsa_ctx_to_pss() 678 return rsa_pss_params_create(sigmd, mgf1md, saltlen); in rsa_ctx_to_pss() 688 if (saltlen != 20) { in rsa_pss_params_create() 692 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) in rsa_pss_params_create() [all …]
|
H A D | rsa_locl.h | 86 int saltlen);
|
/dragonfly/crypto/libressl/crypto/evp/ |
H A D | p5_crpt2.c | 83 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC() argument 121 if (!HMAC_Update(&hctx, salt, saltlen) || in PKCS5_PBKDF2_HMAC() 155 int saltlen, int iter, int keylen, unsigned char *out) in PKCS5_PBKDF2_HMAC_SHA1() argument 157 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 228 int saltlen, iter, plen; in PKCS5_v2_PBKDF2_keyivgen() local 291 saltlen = kdf->salt->value.octet_string->length; in PKCS5_v2_PBKDF2_keyivgen() 296 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd, in PKCS5_v2_PBKDF2_keyivgen()
|
H A D | p5_crpt.c | 86 int saltlen, iter; in PKCS5_PBE_keyivgen() local 117 saltlen = pbe->salt->length; in PKCS5_PBE_keyivgen() 130 if (!EVP_DigestUpdate(&ctx, salt, saltlen)) in PKCS5_PBE_keyivgen()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | pkcs12.h | 169 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, 185 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, 190 unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags); 218 int saltlen, int id, int iter, int n, unsigned char *out, 221 int saltlen, int id, int iter, int n, unsigned char *out, 230 unsigned char *salt, int saltlen, int iter, 233 int saltlen, const EVP_MD *md_type);
|
H A D | kdf.h | 76 # define EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, saltlen) \ argument 78 EVP_PKEY_CTRL_HKDF_SALT, saltlen, (void *)(salt))
|
H A D | x509.h | 1084 const unsigned char *salt, int saltlen); 1087 const unsigned char *salt, int saltlen); 1089 unsigned char *salt, int saltlen); 1091 unsigned char *salt, int saltlen, 1094 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
|
H A D | evp.h | 871 const unsigned char *salt, int saltlen, int iter, int keylen, 874 int saltlen, int iter, const EVP_MD *digest, int keylen,
|
/dragonfly/crypto/libressl/crypto/pem/ |
H A D | pvkfmt.c | 705 unsigned int saltlen, const unsigned char *pass, int passlen) in derive_pvk_key() argument 712 !EVP_DigestUpdate(&mctx, salt, saltlen) || in derive_pvk_key() 722 do_PVK_body(const unsigned char **in, unsigned int saltlen, in do_PVK_body() argument 735 if (saltlen) { in do_PVK_body() 753 if (!derive_pvk_key(keybuf, p, saltlen, (unsigned char *)psbuf, in do_PVK_body() 757 p += saltlen; in do_PVK_body() 800 if (enctmp && saltlen) in do_PVK_body() 813 unsigned int saltlen, keylen; in b2i_PVK_bio() local 821 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) in b2i_PVK_bio() 823 buflen = keylen + saltlen; in b2i_PVK_bio() [all …]
|
/dragonfly/lib/libtcplay/ |
H A D | pbkdf2-openssl.c | 38 const unsigned char *salt, int saltlen, in pbkdf2() argument 51 r = PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, in pbkdf2()
|
H A D | tcplay.h | 275 const unsigned char *salt, int saltlen,
|