/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/utils/ |
H A D | encrypt.py | 88 salt = self._salt(salt, salt_size) 92 def _salt(self, salt, salt_size): argument 93 salt_size = salt_size or self.algo_data.salt_size 94 return salt or random_salt(salt_size) 135 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 157 def _hash(self, secret, salt, salt_size, rounds): argument 163 if salt_size: 164 settings['salt_size'] = salt_size 191 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 193 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) [all …]
|
/dports/sysutils/py-ansible-base/ansible-base-2.10.15/lib/ansible/utils/ |
H A D | encrypt.py | 98 salt = self._salt(salt, salt_size) 102 def _salt(self, salt, salt_size): argument 103 salt_size = salt_size or self.algo_data.salt_size 104 return salt or random_salt(salt_size) 145 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 167 def _hash(self, secret, salt, salt_size, rounds): argument 173 if salt_size: 174 settings['salt_size'] = salt_size 201 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 203 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) [all …]
|
/dports/sysutils/py-ansible-core/ansible-core-2.11.6/lib/ansible/utils/ |
H A D | encrypt.py | 102 salt = self._salt(salt, salt_size) 106 def _salt(self, salt, salt_size): argument 107 salt_size = salt_size or self.algo_data.salt_size 108 ret = salt or random_salt(salt_size) 166 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 194 def _hash(self, secret, salt, salt_size, rounds): argument 200 if salt_size: 201 settings['salt_size'] = salt_size 228 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) 230 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds) [all …]
|
/dports/sysutils/shim/shim-0.9/ |
H A D | PasswordCrypt.c | 51 const char *salt, UINT32 salt_size, in md5_crypt() argument 61 MD5_Update(&ctx, salt, salt_size); in md5_crypt() 65 MD5_Update(&alt_ctx, salt, salt_size); in md5_crypt() 93 MD5_Update(&ctx, salt, salt_size); in md5_crypt() 112 const char *salt, UINT32 salt_size, in sha256_crypt() argument 123 SHA256_Update(&ctx, salt, salt_size); in sha256_crypt() 161 cp = s_bytes = AllocatePool(salt_size); in sha256_crypt() 199 const char *salt, UINT32 salt_size, in sha512_crypt() argument 210 SHA512_Update(&ctx, salt, salt_size); in sha512_crypt() 249 cp = s_bytes = AllocatePool(salt_size); in sha512_crypt() [all …]
|
/dports/editors/wxhexeditor/wxHexEditor/mhash/src/ |
H A D | keygen_test.c | 38 mutils_word32 salt_size; in main() local 55 salt_size=10; in main() 57 salt_size = mhash_get_keygen_salt_size(KEYGEN_MCRYPT); in main() 60 salt = (mutils_word8 *) mutils_malloc(salt_size); in main() 73 data.salt_size = salt_size; in main() 109 salt_size = 10; in main() 111 salt_size = mhash_get_keygen_salt_size(KEYGEN_S2K_SALTED); in main() 114 salt = (mutils_word8 *) mutils_malloc(salt_size); in main() 120 data.salt_size = salt_size; in main()
|
/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | spki-abstract.c | 44 unsigned salt_size; in pubkey_check() local 75 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in pubkey_check() 76 assert(salt_size == 32); in pubkey_check() 89 unsigned salt_size; in key_check() local 121 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check() 122 assert(salt_size == 32); in key_check() 127 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check() 128 assert(salt_size == 64); in key_check() 132 assert(gnutls_x509_spki_get_rsa_pss_params(spki, NULL, &salt_size) >= 0); in key_check() 133 assert(salt_size == 64); in key_check()
|
H A D | spki.c | 46 unsigned salt_size; in crq_check() local 95 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in crq_check() 96 assert(salt_size == 32); in crq_check() 116 unsigned salt_size; in cert_check() local 154 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in cert_check() 155 assert(salt_size == 32); in cert_check() 172 unsigned salt_size; in key_check() local 204 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check() 205 assert(salt_size == 32); in key_check() 210 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check() [all …]
|
/dports/security/gnutls/gnutls-3.6.16/lib/x509/ |
H A D | spki.c | 91 unsigned int salt_size) in gnutls_x509_spki_set_rsa_pss_params() argument 95 spki->salt_size = salt_size; in gnutls_x509_spki_set_rsa_pss_params() 116 unsigned int *salt_size) in gnutls_x509_spki_get_rsa_pss_params() argument 126 if (salt_size) in gnutls_x509_spki_get_rsa_pss_params() 127 *salt_size = spki->salt_size; in gnutls_x509_spki_get_rsa_pss_params()
|
/dports/security/mhash/mhash-0.9.9.9/src/ |
H A D | keygen_test.c | 38 mutils_word32 salt_size; in main() local 61 salt_size=10; in main() 63 salt_size = mhash_get_keygen_salt_size(KEYGEN_MCRYPT); in main() 66 salt = (mutils_word8 *) mutils_malloc(salt_size); in main() 81 data.salt_size = salt_size; in main() 128 salt_size = 10; in main() 130 salt_size = mhash_get_keygen_salt_size(KEYGEN_S2K_SALTED); in main() 133 salt = (mutils_word8 *) mutils_malloc(salt_size); in main() 148 data.salt_size = salt_size; in main()
|
/dports/security/libxcrypt/libxcrypt-4.4.27/lib/ |
H A D | crypt-md5.c | 78 size_t salt_size; in crypt_md5crypt_rn() local 92 salt_size = strcspn (salt, "$:\n"); in crypt_md5crypt_rn() 93 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_md5crypt_rn() 100 if (salt_size > SALT_LEN_MAX) in crypt_md5crypt_rn() 101 salt_size = SALT_LEN_MAX; in crypt_md5crypt_rn() 111 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn() 132 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn() 169 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn() 190 memcpy (cp, salt, salt_size); in crypt_md5crypt_rn() 191 cp += salt_size; in crypt_md5crypt_rn()
|
H A D | crypt-sha256.c | 105 size_t salt_size; in crypt_sha256crypt_rn() local 148 salt_size = strcspn (salt, "$:\n"); in crypt_sha256crypt_rn() 149 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_sha256crypt_rn() 156 if (salt_size > SALT_LEN_MAX) in crypt_sha256crypt_rn() 157 salt_size = SALT_LEN_MAX; in crypt_sha256crypt_rn() 167 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn() 184 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn() 217 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn() 237 SHA256_Update_recycled (ctx, s_bytes, salt_size); in crypt_sha256crypt_rn() 267 memcpy (cp, salt, salt_size); in crypt_sha256crypt_rn() [all …]
|
H A D | crypt-sha512.c | 106 size_t salt_size; in crypt_sha512crypt_rn() local 149 salt_size = strcspn (salt, "$:\n"); in crypt_sha512crypt_rn() 150 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_sha512crypt_rn() 157 if (salt_size > SALT_LEN_MAX) in crypt_sha512crypt_rn() 158 salt_size = SALT_LEN_MAX; in crypt_sha512crypt_rn() 168 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn() 186 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn() 219 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn() 239 sha512_process_recycled_bytes (s_bytes, salt_size, ctx); in crypt_sha512crypt_rn() 271 memcpy (cp, salt, salt_size); in crypt_sha512crypt_rn() [all …]
|
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/ |
H A D | encryption.cpp | 33 if (raw.size() == public_key::key_size + public_key::salt_size) { in from_base64_impl() 62 ret.salt_ = random_bytes(salt_size); in generate() 117 if (raw.size() == key_size + salt_size) { in from_base64() 123 ret.salt_.assign(p + key_size, p + key_size + salt_size); in from_base64() 247 ephemeral_pub.salt_.resize(public_key::salt_size); in decrypt() 340 ret.salt_ = random_bytes(salt_size); in generate() 370 if (raw.size() == key_size + salt_size) { in from_base64() 384 if (raw.size() == key_size + salt_size) { in from_base64() 416 if (raw.size() == key_size + salt_size) { in decrypt_key() 440 return symmetric_key::salt_size + GCM_DIGEST_SIZE; in encryption_overhead() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/emsa_pssr/ |
H A D | pssr.cpp | 109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local 114 hash.update(&DB[salt_offset], salt_size); in pss_verify() 121 *out_salt_size = salt_size; in pss_verify() 135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument 137 m_salt_size(salt_size), in PSSR() 173 size_t salt_size = 0; in verify() local 176 if(m_required_salt_len && salt_size != m_salt_size) in verify() 228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument 230 m_salt_size(salt_size), in PSSR_Raw() 272 size_t salt_size = 0; in verify() local [all …]
|
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/emsa_pssr/ |
H A D | pssr.cpp | 109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local 114 hash.update(&DB[salt_offset], salt_size); in pss_verify() 121 *out_salt_size = salt_size; in pss_verify() 135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument 137 m_salt_size(salt_size), in PSSR() 173 size_t salt_size = 0; in verify() local 176 if(m_required_salt_len && salt_size != m_salt_size) in verify() 228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument 230 m_salt_size(salt_size), in PSSR_Raw() 272 size_t salt_size = 0; in verify() local [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/emsa_pssr/ |
H A D | pssr.cpp | 109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local 114 hash.update(&DB[salt_offset], salt_size); in pss_verify() 121 *out_salt_size = salt_size; in pss_verify() 135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument 137 m_salt_size(salt_size), in PSSR() 173 size_t salt_size = 0; in verify() local 176 if(m_required_salt_len && salt_size != m_salt_size) in verify() 228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument 230 m_salt_size(salt_size), in PSSR_Raw() 272 size_t salt_size = 0; in verify() local [all …]
|
/dports/security/botan110/Botan-1.10.17/src/pbkdf/pgps2k/ |
H A D | pgp_s2k.cpp | 17 const byte salt_buf[], size_t salt_size, in derive_key() argument 23 total_size = passphrase.size() + salt_size; in derive_key() 35 hash->update(salt_buf, salt_size); in derive_key() 39 if(left <= salt_size) in derive_key() 43 hash->update(salt_buf, salt_size); in derive_key() 44 left -= salt_size; in derive_key()
|
/dports/security/mhash/mhash-0.9.9.9/lib/ |
H A D | keygen.h | 13 void *salt, mutils_word32 salt_size, 22 mutils_word8 *salt, mutils_word32 salt_size, 26 mutils_word8 *salt, mutils_word32 salt_size, 32 void *salt, mutils_word32 salt_size); 52 #define KEYGEN_ENTRY(name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_size) \ argument 53 …{ (mutils_word8 *) #name, name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_siz… 61 mutils_word32 salt_size; member
|
/dports/editors/wxhexeditor/wxHexEditor/mhash/lib/ |
H A D | keygen.h | 13 void *salt, mutils_word32 salt_size, 22 mutils_word8 *salt, mutils_word32 salt_size, 26 mutils_word8 *salt, mutils_word32 salt_size, 32 void *salt, mutils_word32 salt_size); 52 #define KEYGEN_ENTRY(name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_size) \ argument 53 …{ (mutils_word8 *) #name, name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_siz… 61 mutils_word32 salt_size; member
|
/dports/devel/libluksde/libluksde-20200205/tests/ |
H A D | luksde_test_password.c | 68 size_t salt_size; member 194 test_vectors[ test_number ].salt_size, in luksde_test_password_pbkdf2() 226 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2() 249 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2() 272 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2() 295 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2() 341 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2() 364 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/ |
H A D | emsa.cpp | 93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 94 return new PSSR_Raw(h.release(), salt_size); in get_emsa() 116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 117 return new PSSR(h.release(), salt_size); in get_emsa() 135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local 137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
|
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/ |
H A D | emsa.cpp | 93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 94 return new PSSR_Raw(h.release(), salt_size); in get_emsa() 116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 117 return new PSSR(h.release(), salt_size); in get_emsa() 135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local 137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/ |
H A D | emsa.cpp | 93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 94 return new PSSR_Raw(h.release(), salt_size); in get_emsa() 116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local 117 return new PSSR(h.release(), salt_size); in get_emsa() 135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local 137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
|
/dports/security/steghide/steghide-0.5.1/src/ |
H A D | MHashKeyGen.cc | 33 AlgorithmData.salt_size = 0 ; in MHashKeyGen() 43 AlgorithmData.salt_size = 0 ; in MHashKeyGen() 100 AlgorithmData.salt_size = salt.size() ; in setSalt() 104 AlgorithmData.salt = s_malloc (AlgorithmData.salt_size) ; in setSalt() 106 for (int i = 0 ; i < AlgorithmData.salt_size ; i++) { in setSalt()
|
/dports/security/gnutls/gnutls-3.6.16/src/ |
H A D | srptool.c | 159 size_t salt_size; in _verify_passwd_int() local 194 salt_size = sizeof(_salt); in _verify_passwd_int() 195 memset(_salt, 0, salt_size); in _verify_passwd_int() 388 int salt_size, ret; in main() local 439 salt_size = 16; in main() 454 return crypt_int(username, passwd, salt_size, in main() 460 int salt_size, const gnutls_datum_t * g, in _srp_crypt() argument 468 if ((unsigned) salt_size > sizeof(salt)) in _srp_crypt() 473 if (gnutls_rnd(GNUTLS_RND_NONCE, salt, salt_size) < 0) { in _srp_crypt() 479 dat_salt.size = salt_size; in _srp_crypt() [all …]
|