Home
last modified time | relevance | path

Searched refs:salt_size (Results 1 – 25 of 327) sorted by relevance

12345678910>>...14

/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/utils/
H A Dencrypt.py88 salt = self._salt(salt, salt_size)
92 def _salt(self, salt, salt_size): argument
93 salt_size = salt_size or self.algo_data.salt_size
94 return salt or random_salt(salt_size)
135 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
157 def _hash(self, secret, salt, salt_size, rounds): argument
163 if salt_size:
164 settings['salt_size'] = salt_size
191 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
193 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
[all …]
/dports/sysutils/py-ansible-base/ansible-base-2.10.15/lib/ansible/utils/
H A Dencrypt.py98 salt = self._salt(salt, salt_size)
102 def _salt(self, salt, salt_size): argument
103 salt_size = salt_size or self.algo_data.salt_size
104 return salt or random_salt(salt_size)
145 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
167 def _hash(self, secret, salt, salt_size, rounds): argument
173 if salt_size:
174 settings['salt_size'] = salt_size
201 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
203 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
[all …]
/dports/sysutils/py-ansible-core/ansible-core-2.11.6/lib/ansible/utils/
H A Dencrypt.py102 salt = self._salt(salt, salt_size)
106 def _salt(self, salt, salt_size): argument
107 salt_size = salt_size or self.algo_data.salt_size
108 ret = salt or random_salt(salt_size)
166 return self._hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
194 def _hash(self, secret, salt, salt_size, rounds): argument
200 if salt_size:
201 settings['salt_size'] = salt_size
228 return PasslibHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
230 return CryptHash(algorithm).hash(secret, salt=salt, salt_size=salt_size, rounds=rounds)
[all …]
/dports/sysutils/shim/shim-0.9/
H A DPasswordCrypt.c51 const char *salt, UINT32 salt_size, in md5_crypt() argument
61 MD5_Update(&ctx, salt, salt_size); in md5_crypt()
65 MD5_Update(&alt_ctx, salt, salt_size); in md5_crypt()
93 MD5_Update(&ctx, salt, salt_size); in md5_crypt()
112 const char *salt, UINT32 salt_size, in sha256_crypt() argument
123 SHA256_Update(&ctx, salt, salt_size); in sha256_crypt()
161 cp = s_bytes = AllocatePool(salt_size); in sha256_crypt()
199 const char *salt, UINT32 salt_size, in sha512_crypt() argument
210 SHA512_Update(&ctx, salt, salt_size); in sha512_crypt()
249 cp = s_bytes = AllocatePool(salt_size); in sha512_crypt()
[all …]
/dports/editors/wxhexeditor/wxHexEditor/mhash/src/
H A Dkeygen_test.c38 mutils_word32 salt_size; in main() local
55 salt_size=10; in main()
57 salt_size = mhash_get_keygen_salt_size(KEYGEN_MCRYPT); in main()
60 salt = (mutils_word8 *) mutils_malloc(salt_size); in main()
73 data.salt_size = salt_size; in main()
109 salt_size = 10; in main()
111 salt_size = mhash_get_keygen_salt_size(KEYGEN_S2K_SALTED); in main()
114 salt = (mutils_word8 *) mutils_malloc(salt_size); in main()
120 data.salt_size = salt_size; in main()
/dports/security/gnutls/gnutls-3.6.16/tests/
H A Dspki-abstract.c44 unsigned salt_size; in pubkey_check() local
75 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in pubkey_check()
76 assert(salt_size == 32); in pubkey_check()
89 unsigned salt_size; in key_check() local
121 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check()
122 assert(salt_size == 32); in key_check()
127 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check()
128 assert(salt_size == 64); in key_check()
132 assert(gnutls_x509_spki_get_rsa_pss_params(spki, NULL, &salt_size) >= 0); in key_check()
133 assert(salt_size == 64); in key_check()
H A Dspki.c46 unsigned salt_size; in crq_check() local
95 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in crq_check()
96 assert(salt_size == 32); in crq_check()
116 unsigned salt_size; in cert_check() local
154 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in cert_check()
155 assert(salt_size == 32); in cert_check()
172 unsigned salt_size; in key_check() local
204 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check()
205 assert(salt_size == 32); in key_check()
210 assert(gnutls_x509_spki_get_rsa_pss_params(spki, &dig, &salt_size) >= 0); in key_check()
[all …]
/dports/security/gnutls/gnutls-3.6.16/lib/x509/
H A Dspki.c91 unsigned int salt_size) in gnutls_x509_spki_set_rsa_pss_params() argument
95 spki->salt_size = salt_size; in gnutls_x509_spki_set_rsa_pss_params()
116 unsigned int *salt_size) in gnutls_x509_spki_get_rsa_pss_params() argument
126 if (salt_size) in gnutls_x509_spki_get_rsa_pss_params()
127 *salt_size = spki->salt_size; in gnutls_x509_spki_get_rsa_pss_params()
/dports/security/mhash/mhash-0.9.9.9/src/
H A Dkeygen_test.c38 mutils_word32 salt_size; in main() local
61 salt_size=10; in main()
63 salt_size = mhash_get_keygen_salt_size(KEYGEN_MCRYPT); in main()
66 salt = (mutils_word8 *) mutils_malloc(salt_size); in main()
81 data.salt_size = salt_size; in main()
128 salt_size = 10; in main()
130 salt_size = mhash_get_keygen_salt_size(KEYGEN_S2K_SALTED); in main()
133 salt = (mutils_word8 *) mutils_malloc(salt_size); in main()
148 data.salt_size = salt_size; in main()
/dports/security/libxcrypt/libxcrypt-4.4.27/lib/
H A Dcrypt-md5.c78 size_t salt_size; in crypt_md5crypt_rn() local
92 salt_size = strcspn (salt, "$:\n"); in crypt_md5crypt_rn()
93 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_md5crypt_rn()
100 if (salt_size > SALT_LEN_MAX) in crypt_md5crypt_rn()
101 salt_size = SALT_LEN_MAX; in crypt_md5crypt_rn()
111 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn()
132 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn()
169 MD5_Update (ctx, salt, salt_size); in crypt_md5crypt_rn()
190 memcpy (cp, salt, salt_size); in crypt_md5crypt_rn()
191 cp += salt_size; in crypt_md5crypt_rn()
H A Dcrypt-sha256.c105 size_t salt_size; in crypt_sha256crypt_rn() local
148 salt_size = strcspn (salt, "$:\n"); in crypt_sha256crypt_rn()
149 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_sha256crypt_rn()
156 if (salt_size > SALT_LEN_MAX) in crypt_sha256crypt_rn()
157 salt_size = SALT_LEN_MAX; in crypt_sha256crypt_rn()
167 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn()
184 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn()
217 SHA256_Update (ctx, salt, salt_size); in crypt_sha256crypt_rn()
237 SHA256_Update_recycled (ctx, s_bytes, salt_size); in crypt_sha256crypt_rn()
267 memcpy (cp, salt, salt_size); in crypt_sha256crypt_rn()
[all …]
H A Dcrypt-sha512.c106 size_t salt_size; in crypt_sha512crypt_rn() local
149 salt_size = strcspn (salt, "$:\n"); in crypt_sha512crypt_rn()
150 if (!(salt[salt_size] == '$' || !salt[salt_size])) in crypt_sha512crypt_rn()
157 if (salt_size > SALT_LEN_MAX) in crypt_sha512crypt_rn()
158 salt_size = SALT_LEN_MAX; in crypt_sha512crypt_rn()
168 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn()
186 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn()
219 SHA512_Update (ctx, salt, salt_size); in crypt_sha512crypt_rn()
239 sha512_process_recycled_bytes (s_bytes, salt_size, ctx); in crypt_sha512crypt_rn()
271 memcpy (cp, salt, salt_size); in crypt_sha512crypt_rn()
[all …]
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/
H A Dencryption.cpp33 if (raw.size() == public_key::key_size + public_key::salt_size) { in from_base64_impl()
62 ret.salt_ = random_bytes(salt_size); in generate()
117 if (raw.size() == key_size + salt_size) { in from_base64()
123 ret.salt_.assign(p + key_size, p + key_size + salt_size); in from_base64()
247 ephemeral_pub.salt_.resize(public_key::salt_size); in decrypt()
340 ret.salt_ = random_bytes(salt_size); in generate()
370 if (raw.size() == key_size + salt_size) { in from_base64()
384 if (raw.size() == key_size + salt_size) { in from_base64()
416 if (raw.size() == key_size + salt_size) { in decrypt_key()
440 return symmetric_key::salt_size + GCM_DIGEST_SIZE; in encryption_overhead()
[all …]
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/emsa_pssr/
H A Dpssr.cpp109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local
114 hash.update(&DB[salt_offset], salt_size); in pss_verify()
121 *out_salt_size = salt_size; in pss_verify()
135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument
137 m_salt_size(salt_size), in PSSR()
173 size_t salt_size = 0; in verify() local
176 if(m_required_salt_len && salt_size != m_salt_size) in verify()
228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument
230 m_salt_size(salt_size), in PSSR_Raw()
272 size_t salt_size = 0; in verify() local
[all …]
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/emsa_pssr/
H A Dpssr.cpp109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local
114 hash.update(&DB[salt_offset], salt_size); in pss_verify()
121 *out_salt_size = salt_size; in pss_verify()
135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument
137 m_salt_size(salt_size), in PSSR()
173 size_t salt_size = 0; in verify() local
176 if(m_required_salt_len && salt_size != m_salt_size) in verify()
228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument
230 m_salt_size(salt_size), in PSSR_Raw()
272 size_t salt_size = 0; in verify() local
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/emsa_pssr/
H A Dpssr.cpp109 const size_t salt_size = DB_size - salt_offset; in pss_verify() local
114 hash.update(&DB[salt_offset], salt_size); in pss_verify()
121 *out_salt_size = salt_size; in pss_verify()
135 PSSR::PSSR(HashFunction* h, size_t salt_size) : in PSSR() argument
137 m_salt_size(salt_size), in PSSR()
173 size_t salt_size = 0; in verify() local
176 if(m_required_salt_len && salt_size != m_salt_size) in verify()
228 PSSR_Raw::PSSR_Raw(HashFunction* h, size_t salt_size) : in PSSR_Raw() argument
230 m_salt_size(salt_size), in PSSR_Raw()
272 size_t salt_size = 0; in verify() local
[all …]
/dports/security/botan110/Botan-1.10.17/src/pbkdf/pgps2k/
H A Dpgp_s2k.cpp17 const byte salt_buf[], size_t salt_size, in derive_key() argument
23 total_size = passphrase.size() + salt_size; in derive_key()
35 hash->update(salt_buf, salt_size); in derive_key()
39 if(left <= salt_size) in derive_key()
43 hash->update(salt_buf, salt_size); in derive_key()
44 left -= salt_size; in derive_key()
/dports/security/mhash/mhash-0.9.9.9/lib/
H A Dkeygen.h13 void *salt, mutils_word32 salt_size,
22 mutils_word8 *salt, mutils_word32 salt_size,
26 mutils_word8 *salt, mutils_word32 salt_size,
32 void *salt, mutils_word32 salt_size);
52 #define KEYGEN_ENTRY(name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_size) \ argument
53 …{ (mutils_word8 *) #name, name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_siz…
61 mutils_word32 salt_size; member
/dports/editors/wxhexeditor/wxHexEditor/mhash/lib/
H A Dkeygen.h13 void *salt, mutils_word32 salt_size,
22 mutils_word8 *salt, mutils_word32 salt_size,
26 mutils_word8 *salt, mutils_word32 salt_size,
32 void *salt, mutils_word32 salt_size);
52 #define KEYGEN_ENTRY(name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_size) \ argument
53 …{ (mutils_word8 *) #name, name, uses_hash_algorithm, uses_count, uses_salt, salt_size, max_key_siz…
61 mutils_word32 salt_size; member
/dports/devel/libluksde/libluksde-20200205/tests/
H A Dluksde_test_password.c68 size_t salt_size; member
194 test_vectors[ test_number ].salt_size, in luksde_test_password_pbkdf2()
226 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
249 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
272 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
295 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
341 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
364 test_vectors[ 0 ].salt_size, in luksde_test_password_pbkdf2()
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pk_pad/
H A Demsa.cpp93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
94 return new PSSR_Raw(h.release(), salt_size); in get_emsa()
116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
117 return new PSSR(h.release(), salt_size); in get_emsa()
135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local
137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
/dports/security/botan2/Botan-2.18.2/src/lib/pk_pad/
H A Demsa.cpp93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
94 return new PSSR_Raw(h.release(), salt_size); in get_emsa()
116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
117 return new PSSR(h.release(), salt_size); in get_emsa()
135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local
137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pk_pad/
H A Demsa.cpp93 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
94 return new PSSR_Raw(h.release(), salt_size); in get_emsa()
116 const size_t salt_size = req.arg_as_integer(2, 0); in get_emsa() local
117 return new PSSR(h.release(), salt_size); in get_emsa()
135 const size_t salt_size = req.arg_as_integer(2, h->output_length()); in get_emsa() local
137 return new ISO_9796_DS2(h.release(), implicit, salt_size); in get_emsa()
/dports/security/steghide/steghide-0.5.1/src/
H A DMHashKeyGen.cc33 AlgorithmData.salt_size = 0 ; in MHashKeyGen()
43 AlgorithmData.salt_size = 0 ; in MHashKeyGen()
100 AlgorithmData.salt_size = salt.size() ; in setSalt()
104 AlgorithmData.salt = s_malloc (AlgorithmData.salt_size) ; in setSalt()
106 for (int i = 0 ; i < AlgorithmData.salt_size ; i++) { in setSalt()
/dports/security/gnutls/gnutls-3.6.16/src/
H A Dsrptool.c159 size_t salt_size; in _verify_passwd_int() local
194 salt_size = sizeof(_salt); in _verify_passwd_int()
195 memset(_salt, 0, salt_size); in _verify_passwd_int()
388 int salt_size, ret; in main() local
439 salt_size = 16; in main()
454 return crypt_int(username, passwd, salt_size, in main()
460 int salt_size, const gnutls_datum_t * g, in _srp_crypt() argument
468 if ((unsigned) salt_size > sizeof(salt)) in _srp_crypt()
473 if (gnutls_rnd(GNUTLS_RND_NONCE, salt, salt_size) < 0) { in _srp_crypt()
479 dat_salt.size = salt_size; in _srp_crypt()
[all …]

12345678910>>...14