Home
last modified time | relevance | path

Searched refs:SALT_SIZE (Results 1 – 25 of 489) sorted by relevance

12345678910>>...20

/dports/security/pam_pwdfile/libpam-pwdfile-1.0/
H A Dbigcrypt.c41 #define SALT_SIZE 2 macro
45 static char outbuf[MAX_SEGMENTS * ESEGMENT_SIZE + SALT_SIZE + 1]; /* static storage area */ in bigcrypt()
53 if (strlen(salt) == (SALT_SIZE + ESEGMENT_SIZE)) /* conventional crypt */ in bigcrypt()
62 strncpy(outptr, crypt(key, salt), SALT_SIZE + ESEGMENT_SIZE); in bigcrypt()
64 for (seg = 1, outptr += SALT_SIZE; seg < n_seg; ++seg) { in bigcrypt()
70 strncpy(outptr, crypt(key, salt) + SALT_SIZE, ESEGMENT_SIZE); in bigcrypt()
/dports/security/john/john-1.9.0-jumbo-1/src/
H A Dmssql12_fmt_plug.c61 #define SALT_SIZE 4 macro
97 static unsigned char cursalt[SALT_SIZE];
128 memcpy(cursalt, salt, SALT_SIZE); in set_salt()
141 for (l = 0;l<SALT_SIZE;l++) in get_salt()
220 keybuffer[15] = ((len << 1) + SALT_SIZE) << 3; in set_key()
251 keybuffer[15] = ((len << 1) + SALT_SIZE) << 3; in set_key_enc()
268 len = ((keybuffer[15] >> 3) - SALT_SIZE) >> 1; in get_key()
322 int j, len = (keybuffer[15] >> 3) - SALT_SIZE; in crypt_all()
325 for (j = 0; j < SALT_SIZE; j++) in crypt_all()
401 SHA512_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact()
[all …]
H A Dbitlocker2john.c41 #define SALT_SIZE 16 macro
103 fillBuffer(fp_eimg, r_salt, SALT_SIZE); in rp_search_salt_aes()
105 print_hex(r_salt, SALT_SIZE, stdout); in rp_search_salt_aes()
245 fillBuffer(fp_eimg, p_salt, SALT_SIZE); in process_encrypted_image()
290 printf("$bitlocker$%d$%d$", HASH_UP, SALT_SIZE); in process_encrypted_image()
291 print_hex(p_salt, SALT_SIZE, stdout); in process_encrypted_image()
301 printf("$bitlocker$%d$%d$", HASH_UP_MAC, SALT_SIZE); in process_encrypted_image()
302 print_hex(p_salt, SALT_SIZE, stdout); in process_encrypted_image()
314 printf("$bitlocker$%d$%d$", HASH_RP, SALT_SIZE); in process_encrypted_image()
315 print_hex(r_salt, SALT_SIZE, stdout); in process_encrypted_image()
[all …]
H A Dmssql-old_fmt_plug.c58 #define SALT_SIZE 4 macro
100 static unsigned char cursalt[SALT_SIZE];
137 memcpy(cursalt, salt, SALT_SIZE); in set_salt()
147 for (l=0;l<SALT_SIZE;l++) in get_salt()
197 saved_key[GETPOS((i*2+SALT_SIZE) , index)] = 0x80; in set_key()
240 saved_key[GETPOS((i*2+SALT_SIZE) , index)] = 0x80; in set_key_enc()
275 for (i=0;i<SALT_SIZE;i++) in crypt_all()
281 memcpy(saved_key+key_length*2, cursalt, SALT_SIZE); in crypt_all()
283 SHA1_Update( &ctx, saved_key, key_length*2+SALT_SIZE ); in crypt_all()
357 SHA1_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact()
[all …]
H A Dmssql05_fmt_plug.c59 #define SALT_SIZE 4 macro
97 static unsigned char cursalt[SALT_SIZE];
157 memcpy(cursalt, salt, SALT_SIZE); in set_salt()
167 for (l=0;l<SALT_SIZE;l++) in get_salt()
211 len = SALT_SIZE >> 1; in set_key()
264 len = SALT_SIZE >> 1; in set_key_CP()
313 len = SALT_SIZE >> 1; in set_key_utf8()
410 if (chh != 0xffff || len == SALT_SIZE >> 1) { in set_key_utf8()
471 for (i=0;i<SALT_SIZE;i++) in crypt_all()
546 SHA1_Update(&ctx, cursalt, SALT_SIZE); in cmp_exact()
[all …]
H A Dcitrix_ns_fmt_plug.c66 #define PLAINTEXT_LENGTH (55 - SALT_SIZE - 1)
70 #define SALT_SIZE 8 macro
104 static char saved_salt[SALT_SIZE];
175 #define SALT_PREPENDED SALT_SIZE
182 unsigned char c[SALT_SIZE]; in get_salt()
187 memcpy(out.c, ciphertext, SALT_SIZE); in get_salt()
200 for (i = 0; i < SALT_SIZE; i++) in set_salt()
204 memcpy(saved_salt, salt, SALT_SIZE); in set_salt()
277 SHA1_Update(&ctx, (unsigned char*)saved_salt, SALT_SIZE); in crypt_all()
306 SALT_SIZE,
H A DNETNTLM_bs_fmt_plug.c81 #define SALT_SIZE 8 macro
84 #define TOTAL_LENGTH (10 + 2 * 2 * SALT_SIZE + CIPHERTEXT_LENGTH)
366 unsigned char temp[SALT_SIZE]; in get_salt()
368 if (!binary_salt) binary_salt = mem_alloc_tiny(SALT_SIZE, MEM_ALIGN_WORD); in get_salt()
373 for (i = 0; i < SALT_SIZE; ++i) in get_salt()
376 uchar es_salt[2*SALT_SIZE], k1[2*SALT_SIZE]; in get_salt()
382 for (i = 0;i < 2 * SALT_SIZE; ++i) in get_salt()
389 memcpy(binary_salt, k1, SALT_SIZE); // but only 8 bytes of it in get_salt()
393 memset(temp, 0, SALT_SIZE); in get_salt()
400 memcpy(binary_salt, temp, SALT_SIZE); in get_salt()
[all …]
H A DFG2_fmt_plug.c59 #define SALT_SIZE 12 macro
112 char b[SALT_SIZE]; in get_salt()
115 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_salt()
119 memcpy(out.b, buf, SALT_SIZE); in get_salt()
127 SHA256_Update(&ctx_salt, salt, SALT_SIZE); in set_salt()
146 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_binary()
152 memcpy(bin.b, buf+SALT_SIZE, BINARY_SIZE); in get_binary()
225 SALT_SIZE,
H A Dcq_fmt_plug.c35 #define SALT_SIZE 64 // XXX double check this macro
56 static char saved_salt[SALT_SIZE];
371 if ((p - q) >= SALT_SIZE || p <= q) in valid()
383 static char salt[SALT_SIZE + 1]; in get_salt()
386 memset(salt, 0, SALT_SIZE); in get_salt()
409 unsigned int len = SALT_SIZE; in salt_hash()
419 memcpy(saved_salt, salt, SALT_SIZE); in set_salt()
483 SALT_SIZE,
H A DFGT_fmt_plug.c54 #define SALT_SIZE 12 macro
119 char b[SALT_SIZE]; in get_salt()
122 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_salt()
126 memcpy(out.b, buf, SALT_SIZE); in get_salt()
134 SHA1_Update(&ctx_salt, salt, SALT_SIZE); in set_salt()
153 char buf[SALT_SIZE+BINARY_SIZE+1]; in get_binary()
159 memcpy(bin.b, buf+SALT_SIZE, BINARY_SIZE); in get_binary()
234 SALT_SIZE,
H A Doracle11_fmt_plug.c93 #define SALT_SIZE 10 macro
97 #if (BINARY_SIZE + SALT_SIZE) * 2 != CIPHERTEXT_LENGTH
153 saved_salt = mem_calloc(1, SALT_SIZE); in init()
177 if (!salt) salt = mem_alloc_tiny(SALT_SIZE, MEM_ALIGN_WORD); in get_salt()
179 for (i = 0; i < SALT_SIZE; i++) { in get_salt()
189 memcpy(saved_salt, salt, SALT_SIZE); in set_salt()
206 #define SALT_APPENDED SALT_SIZE
260 …EF_32 + (index&(SIMD_COEF_32-1)) + index/SIMD_COEF_32*SHA_BUF_SIZ*SIMD_COEF_32]) >> 3) - SALT_SIZE; in crypt_all()
267 for ( ; i < SALT_SIZE; ++i) in crypt_all()
328 SHA1_Update( &ctx, saved_salt, SALT_SIZE ); in crypt_all()
[all …]
H A DPHPS2_fmt_plug.c37 #define SALT_SIZE 3 macro
43 #define CIPHERTEXT_LENGTH (1 + 4 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE)
87 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_6xxx$%s$", &cp[1]); in Convert()
89 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "%s%s$", dyna_hash_type, &cp[1]); in Convert()
90 for (i = 0; i < SALT_SIZE; ++i) in Convert()
149 for (i = 0;i < SALT_SIZE*2; ++i) in phps_valid()
154 if (atoi16[ARCH_INDEX(ciphertext[i+6+1+SALT_SIZE*2])] == 0x7F) in phps_valid()
H A Dosc_fmt_plug.c54 #define SALT_SIZE 2 macro
60 #define CIPHERTEXT_LENGTH (1 + 3 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE)
91 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_4$%s$", &cp[1]); in Convert()
92 for (i = 0; i < SALT_SIZE; ++i) in Convert()
137 for (i = 0;i < SALT_SIZE*2; ++i) in osc_valid()
142 if (atoi16[ARCH_INDEX(ciphertext[i+5+1+SALT_SIZE*2])] == 0x7F) in osc_valid()
H A DPHPS_fmt_plug.c64 #define SALT_SIZE 3 macro
70 #define CIPHERTEXT_LENGTH (1 + 4 + 1 + SALT_SIZE * 2 + 1 + MD5_HEX_SIZE)
101 snprintf(Buf, sizeof(Conv_Buf) - SALT_SIZE, "$dynamic_6$%s$", &cp[1]); in Convert()
102 for (i = 0; i < SALT_SIZE; ++i) in Convert()
177 for (i = 0;i < SALT_SIZE*2; ++i) in phps_valid()
182 if (atoi16[ARCH_INDEX(ciphertext[i+6+1+SALT_SIZE*2])] == 0x7F) in phps_valid()
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/
H A Dpacket-corosync-totemnet.c53 #define SALT_SIZE 16 macro
88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header()
104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header()
265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption()
291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption()
315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption()
[all …]
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/
H A Dpacket-corosync-totemnet.c53 #define SALT_SIZE 16
88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA);
104 return HASH_SHA1_LENGTH + SALT_SIZE;
265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) {
291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state);
315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE,
316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE),
338 HASH_SHA1_LENGTH + SALT_SIZE,
339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE),
340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE));
[all …]
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/
H A Dpacket-corosync-totemnet.c53 #define SALT_SIZE 16 macro
88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header()
104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header()
265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption()
291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption()
315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption()
[all …]
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/
H A Dpacket-corosync-totemnet.c53 #define SALT_SIZE 16 macro
88 tvb, HASH_SHA1_LENGTH, SALT_SIZE, ENC_NA); in dissect_corosync_totemnet_security_header()
104 return HASH_SHA1_LENGTH + SALT_SIZE; in dissect_corosync_totemnet_security_header()
265 if (io_len < HASH_SHA1_LENGTH + SALT_SIZE) { in dissect_corosynec_totemnet_with_decryption()
291 sober128_add_entropy (salt, SALT_SIZE, &keygen_prng_state); in dissect_corosynec_totemnet_with_decryption()
315 sober128_read (io_base + HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
316 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
338 HASH_SHA1_LENGTH + SALT_SIZE, in dissect_corosynec_totemnet_with_decryption()
339 io_len - (HASH_SHA1_LENGTH + SALT_SIZE), in dissect_corosynec_totemnet_with_decryption()
340 io_len - (HASH_SHA1_LENGTH + SALT_SIZE)); in dissect_corosynec_totemnet_with_decryption()
[all …]
/dports/security/botan110/Botan-1.10.17/src/pk_pad/emsa4/
H A Demsa4.cpp41 if(output_bits < 8*HASH_SIZE + 8*SALT_SIZE + 9) in encoding_of()
46 SecureVector<byte> salt = rng.random_vec(SALT_SIZE); in encoding_of()
51 hash->update(salt, SALT_SIZE); in encoding_of()
56 EM[output_length - HASH_SIZE - SALT_SIZE - 2] = 0x01; in encoding_of()
57 EM.copy(output_length - 1 - HASH_SIZE - SALT_SIZE, salt, SALT_SIZE); in encoding_of()
131 SALT_SIZE(h->output_length()), hash(h) in EMSA4()
140 SALT_SIZE(salt_size), hash(h) in EMSA4()
/dports/security/putty/putty-0.76/unix/
H A Duxshare.c24 #define SALT_SIZE 64 macro
76 unsigned char saltbuf[SALT_SIZE]; in make_dirname()
122 random_read(saltbuf, SALT_SIZE); in make_dirname()
123 ret = write(saltfd, saltbuf, SALT_SIZE); in make_dirname()
127 assert(SALT_SIZE < PIPE_BUF); in make_dirname()
128 assert(ret < 0 || ret == SALT_SIZE); in make_dirname()
192 for (i = 0; i < SALT_SIZE; i++) { in make_dirname()
193 ret = read(saltfd, saltbuf, SALT_SIZE); in make_dirname()
203 assert(0 < ret && ret <= SALT_SIZE - i); in make_dirname()
219 put_string(h, saltbuf, SALT_SIZE); in make_dirname()
/dports/security/putty-nogtk/putty-0.76/unix/
H A Duxshare.c24 #define SALT_SIZE 64 macro
76 unsigned char saltbuf[SALT_SIZE]; in make_dirname()
122 random_read(saltbuf, SALT_SIZE); in make_dirname()
123 ret = write(saltfd, saltbuf, SALT_SIZE); in make_dirname()
127 assert(SALT_SIZE < PIPE_BUF); in make_dirname()
128 assert(ret < 0 || ret == SALT_SIZE); in make_dirname()
192 for (i = 0; i < SALT_SIZE; i++) { in make_dirname()
193 ret = read(saltfd, saltbuf, SALT_SIZE); in make_dirname()
203 assert(0 < ret && ret <= SALT_SIZE - i); in make_dirname()
219 put_string(h, saltbuf, SALT_SIZE); in make_dirname()
/dports/security/ylva/ylva-1.7/src/
H A Dcrypto.c59 salt = generate_random_data(SALT_SIZE); in generate_key()
62 salt = tmalloc(SALT_SIZE); in generate_key()
63 memmove(salt, old_salt, SALT_SIZE); in generate_key()
73 SALT_SIZE, iterations, EVP_sha256(), in generate_key()
84 memmove(key.salt, salt, SALT_SIZE); in generate_key()
250 int offset = sizeof(int) + IV_SIZE + SALT_SIZE + HMAC_SHA512_SIZE; in is_file_encrypted()
343 fwrite(key.salt, 1, SALT_SIZE, cipher_fp); in encrypt_file()
394 salt = tmalloc(SALT_SIZE); in decrypt_file()
408 int offset = len - (sizeof(int) + IV_SIZE + SALT_SIZE + HMAC_SHA512_SIZE); in decrypt_file()
419 fread(salt, SALT_SIZE, 1, cipher); in decrypt_file()
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/iso9796/
H A Diso9796.cpp23 size_t SALT_SIZE, in iso9796_encoding() argument
37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding()
43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding()
62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding()
72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding()
106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument
166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification()
175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification()
180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/iso9796/
H A Diso9796.cpp23 size_t SALT_SIZE, in iso9796_encoding() argument
37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding()
43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding()
62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding()
72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding()
106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument
166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification()
175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification()
180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/iso9796/
H A Diso9796.cpp23 size_t SALT_SIZE, in iso9796_encoding() argument
37 if(output_length <= HASH_SIZE + SALT_SIZE + tLength) in iso9796_encoding()
43 const size_t capacity = output_length - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_encoding()
62 secure_vector<uint8_t> salt = rng.random_vec(SALT_SIZE); in iso9796_encoding()
72 const size_t offset = output_length - HASH_SIZE - SALT_SIZE - tLength - msgLength - 1; in iso9796_encoding()
106 …ecure_vector<uint8_t>& raw, size_t key_bits, std::unique_ptr<HashFunction>& hash, size_t SALT_SIZE) in iso9796_verification() argument
166 … bad_input |= CT::Mask<size_t>::is_lt(coded.size(), tLength + HASH_SIZE + msg1_offset + SALT_SIZE); in iso9796_verification()
175 coded.end() - tLength - HASH_SIZE - SALT_SIZE); in iso9796_verification()
180 const size_t capacity = (key_bits - 2 + 7) / 8 - HASH_SIZE - SALT_SIZE - tLength - 1; in iso9796_verification()

12345678910>>...20