/dports/security/pam_pwdfile/libpam-pwdfile-1.0/ |
H A D | bigcrypt.c | 41 #define SALT_SIZE 2 macro 45 static char outbuf[MAX_SEGMENTS * ESEGMENT_SIZE + SALT_SIZE + 1]; /* static storage area */ in bigcrypt() 53 if (strlen(salt) == (SALT_SIZE + ESEGMENT_SIZE)) /* conventional crypt */ in bigcrypt() 62 strncpy(outptr, crypt(key, salt), SALT_SIZE + ESEGMENT_SIZE); in bigcrypt() 64 for (seg = 1, outptr += SALT_SIZE; seg < n_seg; ++seg) { in bigcrypt() 70 strncpy(outptr, crypt(key, salt) + SALT_SIZE, ESEGMENT_SIZE); in bigcrypt()
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | mssql12_fmt_plug.c | 61 #define SALT_SIZE 4 macro 97 static unsigned char cursalt[SALT_SIZE]; 128 memcpy(cursalt, salt, SALT_SIZE); in set_salt() 141 for (l = 0;l<SALT_SIZE;l++) in get_salt() 220 keybuffer[15] = ((len << 1) + SALT_SIZE) << 3; in set_key() 251 keybuffer[15] = ((len << 1) + SALT_SIZE) << 3; in set_key_enc() 268 len = ((keybuffer[15] >> 3) - SALT_SIZE) >> 1; in get_key() 322 int j, len = (keybuffer[15] >> 3) - SALT_SIZE; in crypt_all() 325 for (j = 0; j < SALT_SIZE; j++) in crypt_all() 401 SHA512_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact() [all …]
|
H A D | bitlocker2john.c | 41 #define SALT_SIZE 16 macro 103 fillBuffer(fp_eimg, r_salt, SALT_SIZE); in rp_search_salt_aes() 105 print_hex(r_salt, SALT_SIZE, stdout); in rp_search_salt_aes() 245 fillBuffer(fp_eimg, p_salt, SALT_SIZE); in process_encrypted_image() 290 printf("$bitlocker$%d$%d$", HASH_UP, SALT_SIZE); in process_encrypted_image() 291 print_hex(p_salt, SALT_SIZE, stdout); in process_encrypted_image() 301 printf("$bitlocker$%d$%d$", HASH_UP_MAC, SALT_SIZE); in process_encrypted_image() 302 print_hex(p_salt, SALT_SIZE, stdout); in process_encrypted_image() 314 printf("$bitlocker$%d$%d$", HASH_RP, SALT_SIZE); in process_encrypted_image() 315 print_hex(r_salt, SALT_SIZE, stdout); in process_encrypted_image() [all …]
|
H A D | mssql-old_fmt_plug.c | 58 #define SALT_SIZE 4 macro 100 static unsigned char cursalt[SALT_SIZE]; 137 memcpy(cursalt, salt, SALT_SIZE); in set_salt() 147 for (l=0;l<SALT_SIZE;l++) in get_salt() 197 saved_key[GETPOS((i*2+SALT_SIZE) , index)] = 0x80; in set_key() 240 saved_key[GETPOS((i*2+SALT_SIZE) , index)] = 0x80; in set_key_enc() 275 for (i=0;i<SALT_SIZE;i++) in crypt_all() 281 memcpy(saved_key+key_length*2, cursalt, SALT_SIZE); in crypt_all() 283 SHA1_Update( &ctx, saved_key, key_length*2+SALT_SIZE ); in crypt_all() 357 SHA1_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact() [all …]
|
H A D | mssql05_fmt_plug.c | 59 #define SALT_SIZE 4 macro 97 static unsigned char cursalt[SALT_SIZE]; 157 memcpy(cursalt, salt, SALT_SIZE); in set_salt() 167 for (l=0;l<SALT_SIZE;l++) in get_salt() 211 len = SALT_SIZE >> 1; in set_key() 264 len = SALT_SIZE >> 1; in set_key_CP() 313 len = SALT_SIZE >> 1; in set_key_utf8() 410 if (chh != 0xffff || len == SALT_SIZE >> 1) { in set_key_utf8() 471 for (i=0;i<SALT_SIZE;i++) in crypt_all() 546 SHA1_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact() [all …]
|
H A D | citrix_ns_fmt_plug.c | 66 #define PLAINTEXT_LENGTH (55 - SALT_SIZE - 1) 70 #define SALT_SIZE 8 macro 104 static char saved_salt[SALT_SIZE]; 175 #define SALT_PREPENDED SALT_SIZE 182 unsigned char c[SALT_SIZE]; in get_salt() 187 memcpy(out.c, ciphertext, SALT_SIZE); in get_salt() 200 for (i = 0; i < SALT_SIZE; i++) in set_salt() 204 memcpy(saved_salt, salt, SALT_SIZE); in set_salt() 277 SHA1_Update(&ctx, (unsigned char*)saved_salt, SALT_SIZE); in crypt_all() 306 SALT_SIZE,
|
H A D | NETNTLM_bs_fmt_plug.c | 81 #define SALT_SIZE 8 macro 84 #define TOTAL_LENGTH (10 + 2 * 2 * SALT_SIZE + CIPHERTEXT_LENGTH) 366 unsigned char temp[SALT_SIZE]; in get_salt() 368 if (!binary_salt) binary_salt = mem_alloc_tiny(SALT_SIZE, MEM_ALIGN_WORD); in get_salt() 373 for (i = 0; i < SALT_SIZE; ++i) in get_salt() 376 uchar es_salt[2*SALT_SIZE], k1[2*SALT_SIZE]; in get_salt() 382 for (i = 0;i < 2 * SALT_SIZE; ++i) in get_salt() 389 memcpy(binary_salt, k1, SALT_SIZE); // but only 8 bytes of it in get_salt() 393 memset(temp, 0, SALT_SIZE); in get_salt() 400 memcpy(binary_salt, temp, SALT_SIZE); in get_salt() [all …]
|
H A D | FG2_fmt_plug.c | 59 #define SALT_SIZE 12 macro 112 char b[SALT_SIZE]; in get_salt() 115 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_salt() 119 memcpy(out.b, buf, SALT_SIZE); in get_salt() 127 SHA256_Update(&ctx_salt, salt, SALT_SIZE); in set_salt() 146 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_binary() 152 memcpy(bin.b, buf+SALT_SIZE, BINARY_SIZE); in get_binary() 225 SALT_SIZE,
|
H A D | cq_fmt_plug.c | 35 #define SALT_SIZE 64 // XXX double check this macro 56 static char saved_salt[SALT_SIZE]; 371 if ((p - q) >= SALT_SIZE || p <= q) in valid() 383 static char salt[SALT_SIZE + 1]; in get_salt() 386 memset(salt, 0, SALT_SIZE); in get_salt() 409 unsigned int len = SALT_SIZE; in salt_hash() 419 memcpy(saved_salt, salt, SALT_SIZE); in set_salt() 483 SALT_SIZE,
|
H A D | FGT_fmt_plug.c | 54 #define SALT_SIZE 12 macro 119 char b[SALT_SIZE]; in get_salt() 122 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_salt() 126 memcpy(out.b, buf, SALT_SIZE); in get_salt() 134 SHA1_Update(&ctx_salt, salt, SALT_SIZE); in set_salt() 153 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_binary() 159 memcpy(bin.b, buf+SALT_SIZE, BINARY_SIZE); in get_binary() 234 SALT_SIZE,
|
H A D | oracle11_fmt_plug.c | 93 #define SALT_SIZE 10 macro 97 #if (BINARY_SIZE + SALT_SIZE) * 2 != CIPHERTEXT_LENGTH 153 saved_salt = mem_calloc(1, SALT_SIZE); in init() 177 if (!salt) salt = mem_alloc_tiny(SALT_SIZE, MEM_ALIGN_WORD); in get_salt() 179 for (i = 0; i < SALT_SIZE; i++) { in get_salt() 189 memcpy(saved_salt, salt, SALT_SIZE); in set_salt() 206 #define SALT_APPENDED SALT_SIZE 260 …EF_32 + (index&(SIMD_COEF_32-1)) + index/SIMD_COEF_32*SHA_BUF_SIZ*SIMD_COEF_32]) >> 3) - SALT_SIZE; in crypt_all() 267 for ( ; i < SALT_SIZE; ++i) in crypt_all() 328 SHA1_Update( &ctx, saved_salt, SALT_SIZE ); in crypt_all() [all …]
|
H A D | PHPS2_fmt_plug.c | 37 #define SALT_SIZE 3 macro 43 #define CIPHERTEXT_LENGTH (1 + 4 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE) 87 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_6xxx$%s$", &cp[1]); in Convert() 89 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "%s%s$", dyna_hash_type, &cp[1]); in Convert() 90 for (i = 0; i < SALT_SIZE; ++i) in Convert() 149 for (i = 0;i < SALT_SIZE*2; ++i) in phps_valid() 154 if (atoi16[ARCH_INDEX(ciphertext[i+6+1+SALT_SIZE*2])] == 0x7F) in phps_valid()
|
H A D | osc_fmt_plug.c | 54 #define SALT_SIZE 2 macro 60 #define CIPHERTEXT_LENGTH (1 + 3 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE) 91 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_4$%s$", &cp[1]); in Convert() 92 for (i = 0; i < SALT_SIZE; ++i) in Convert() 137 for (i = 0;i < SALT_SIZE*2; ++i) in osc_valid() 142 if (atoi16[ARCH_INDEX(ciphertext[i+5+1+SALT_SIZE*2])] == 0x7F) in osc_valid()
|
H A D | PHPS_fmt_plug.c | 64 #define SALT_SIZE 3 macro 70 #define CIPHERTEXT_LENGTH (1 + 4 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE) 101 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_6$%s$", &cp[1]); in Convert() 102 for (i = 0; i < SALT_SIZE; ++i) in Convert() 177 for (i = 0;i < SALT_SIZE*2; ++i) in phps_valid() 182 if (atoi16[ARCH_INDEX(ciphertext[i+6+1+SALT_SIZE*2])] == 0x7F) in phps_valid()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-corosync-totemnet.c | 53 #define SALT_SIZE 16 macro 88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header() 104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header() 265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption() 291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption() 315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption() [all …]
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-corosync-totemnet.c | 53 #define SALT_SIZE 16 88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); 104 return HASH_SHA1_LENGTH + SALT_SIZE; 265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { 291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); 315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, 316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), 338 HASH_SHA1_LENGTH + SALT_SIZE, 339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), 340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); [all …]
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-corosync-totemnet.c | 53 #define SALT_SIZE 16 macro 88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header() 104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header() 265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption() 291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption() 315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption() [all …]
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-corosync-totemnet.c | 53 #define SALT_SIZE 16 macro 88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header() 104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header() 265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption() 291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption() 315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption() 339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption() 340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption() [all …]
|
/dports/security/botan110/Botan-1.10.17/src/pk_pad/emsa4/ |
H A D | emsa4.cpp | 41 if(output_bits < 8*HASH_SIZE + 8*SALT_SIZE + 9) in encoding_of() 46 SecureVector<byte> salt = rng.random_vec(SALT_SIZE); in encoding_of() 51 hash->update(salt, SALT_SIZE); in encoding_of() 56 EM[output_length - HASH_SIZE - SALT_SIZE - 2] = 0x01; in encoding_of() 57 EM.copy(output_length - 1 - HASH_SIZE - SALT_SIZE, salt, SALT_SIZE); in encoding_of() 131 SALT_SIZE(h->output_length()), hash(h) in EMSA4() 140 SALT_SIZE(salt_size), hash(h) in EMSA4()
|
/dports/security/putty/putty-0.76/unix/ |
H A D | uxshare.c | 24 #define SALT_SIZE 64 macro 76 unsigned char saltbuf[SALT_SIZE]; in make_dirname() 122 random_read(saltbuf, SALT_SIZE); in make_dirname() 123 ret = write(saltfd, saltbuf, SALT_SIZE); in make_dirname() 127 assert(SALT_SIZE < PIPE_BUF); in make_dirname() 128 assert(ret < 0 || ret == SALT_SIZE); in make_dirname() 192 for (i = 0; i < SALT_SIZE; i++) { in make_dirname() 193 ret = read(saltfd, saltbuf, SALT_SIZE); in make_dirname() 203 assert(0 < ret && ret <= SALT_SIZE - i); in make_dirname() 219 put_string(h, saltbuf, SALT_SIZE); in make_dirname()
|
/dports/security/putty-nogtk/putty-0.76/unix/ |
H A D | uxshare.c | 24 #define SALT_SIZE 64 macro 76 unsigned char saltbuf[SALT_SIZE]; in make_dirname() 122 random_read(saltbuf, SALT_SIZE); in make_dirname() 123 ret = write(saltfd, saltbuf, SALT_SIZE); in make_dirname() 127 assert(SALT_SIZE < PIPE_BUF); in make_dirname() 128 assert(ret < 0 || ret == SALT_SIZE); in make_dirname() 192 for (i = 0; i < SALT_SIZE; i++) { in make_dirname() 193 ret = read(saltfd, saltbuf, SALT_SIZE); in make_dirname() 203 assert(0 < ret && ret <= SALT_SIZE - i); in make_dirname() 219 put_string(h, saltbuf, SALT_SIZE); in make_dirname()
|
/dports/security/ylva/ylva-1.7/src/ |
H A D | crypto.c | 59 salt = generate_random_data(SALT_SIZE); in generate_key() 62 salt = tmalloc(SALT_SIZE); in generate_key() 63 memmove(salt, old_salt, SALT_SIZE); in generate_key() 73 SALT_SIZE, iterations, EVP_sha256(), in generate_key() 84 memmove(key.salt, salt, SALT_SIZE); in generate_key() 250 int offset = sizeof(int) + IV_SIZE + SALT_SIZE + HMAC_SHA512_SIZE; in is_file_encrypted() 343 fwrite(key.salt, 1, SALT_SIZE, cipher_fp); in encrypt_file() 394 salt = tmalloc(SALT_SIZE); in decrypt_file() 408 int offset = len - (sizeof(int) + IV_SIZE + SALT_SIZE + HMAC_SHA512_SIZE); in decrypt_file() 419 fread(salt, SALT_SIZE, 1, cipher); in decrypt_file()
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/iso9796/ |
H A D | iso9796.cpp | 23 size_t SALT_SIZE, in iso9796_encoding() argument 37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding() 43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding() 62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding() 72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding() 106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument 166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification() 175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification() 180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()
|
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/iso9796/ |
H A D | iso9796.cpp | 23 size_t SALT_SIZE, in iso9796_encoding() argument 37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding() 43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding() 62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding() 72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding() 106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument 166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification() 175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification() 180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/iso9796/ |
H A D | iso9796.cpp | 23 size_t SALT_SIZE, in iso9796_encoding() argument 37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding() 43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding() 62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding() 72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding() 106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument 166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification() 175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification() 180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()
|