/dragonfly/crypto/libressl/crypto/kdf/ |
H A D | hkdf_evp.c | 67 size_t salt_len; member 94 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup() 123 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl() 128 kctx->salt_len = p1; in pkey_hkdf_ctrl() 214 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init() 238 kctx->salt, kctx->salt_len, kctx->info, kctx->info_len); in pkey_hkdf_derive() 246 kctx->key_len, kctx->salt, kctx->salt_len); in pkey_hkdf_derive()
|
/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, in pbkdf2_sha1() 145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument [all …]
|
H A D | archive_cryptor_private.h | 150 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\ argument 151 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len) 173 size_t salt_len, unsigned rounds, uint8_t *derived_key,
|
H A D | archive_write_set_format_zip.c | 1613 size_t key_len, salt_len; in init_winzip_aes_encryption() local 1625 salt_len = 8; in init_winzip_aes_encryption() 1629 salt_len = 16; in init_winzip_aes_encryption() 1656 salt[salt_len] = derived_key[key_len * 2]; in init_winzip_aes_encryption() 1657 salt[salt_len + 1] = derived_key[key_len * 2 + 1]; in init_winzip_aes_encryption() 1663 zip->written_bytes += salt_len + 2; in init_winzip_aes_encryption() 1664 zip->entry_compressed_written += salt_len + 2; in init_winzip_aes_encryption() 1672 size_t key_len, salt_len; in is_winzip_aes_encryption_supported() local 1680 salt_len = 8; in is_winzip_aes_encryption_supported() 1684 salt_len = 16; in is_winzip_aes_encryption_supported() [all …]
|
H A D | archive_read_support_format_zip.c | 2861 size_t key_len, salt_len; in init_WinZip_AES_decryption() local 2870 case 1: salt_len = 8; key_len = 16; break; in init_WinZip_AES_decryption() 2871 case 2: salt_len = 12; key_len = 24; break; in init_WinZip_AES_decryption() 2872 case 3: salt_len = 16; key_len = 32; break; in init_WinZip_AES_decryption() 2875 p = __archive_read_ahead(a, salt_len + 2, NULL); in init_WinZip_AES_decryption() 2892 p, salt_len, 1000, derived_key, key_len * 2 + 2); in init_WinZip_AES_decryption() 2901 pv = ((const uint8_t *)p) + salt_len; in init_WinZip_AES_decryption() 2927 __archive_read_consume(a, salt_len + 2); in init_WinZip_AES_decryption() 2928 zip->entry_bytes_remaining -= salt_len + 2 + AUTH_CODE_SIZE; in init_WinZip_AES_decryption() 2932 zip->entry_compressed_bytes_read += salt_len + 2 + AUTH_CODE_SIZE; in init_WinZip_AES_decryption()
|
/dragonfly/lib/libcrypt/ |
H A D | crypt-sha256.c | 308 size_t salt_len; in crypt_sha256_r() local 340 salt_len = MIN (strcspn (salt, "$"), SALT_LEN_MAX); in crypt_sha256_r() 358 salt, salt_len); in crypt_sha256_r() 370 __crypt__sha256_process_bytes (salt, salt_len, &ctx); in crypt_sha256_r() 381 __crypt__sha256_process_bytes (salt, salt_len, &alt_ctx); in crypt_sha256_r() 433 cp = s_bytes = alloca (salt_len); in crypt_sha256_r() 434 for (cnt = salt_len; cnt >= 32; cnt -= 32) in crypt_sha256_r() 453 __crypt__sha256_process_bytes (s_bytes, salt_len, &ctx); in crypt_sha256_r() 483 buflen -= MIN ((size_t) MAX (0, buflen), salt_len); in crypt_sha256_r() 530 memset (s_bytes, '\0', salt_len); in crypt_sha256_r() [all …]
|
H A D | crypt-sha512.c | 339 size_t salt_len; in crypt_sha512_r() local 371 salt_len = MIN (strcspn (salt, "$"), SALT_LEN_MAX); in crypt_sha512_r() 389 salt, salt_len); in crypt_sha512_r() 401 __crypt__sha512_process_bytes (salt, salt_len, &ctx); in crypt_sha512_r() 412 __crypt__sha512_process_bytes (salt, salt_len, &alt_ctx); in crypt_sha512_r() 464 cp = s_bytes = alloca (salt_len); in crypt_sha512_r() 465 for (cnt = salt_len; cnt >= 64; cnt -= 64) in crypt_sha512_r() 484 __crypt__sha512_process_bytes (s_bytes, salt_len, &ctx); in crypt_sha512_r() 514 buflen -= MIN ((size_t) MAX (0, buflen), salt_len); in crypt_sha512_r() 573 memset (s_bytes, '\0', salt_len); in crypt_sha512_r() [all …]
|
H A D | crypt-blowfish.c | 185 u_int8_t key_len, salt_len, logr, minor; in crypt_blowfish() local 243 salt_len = BCRYPT_MAXSALT; in crypt_blowfish() 248 Blowfish_expandstate(&state, csalt, salt_len, in crypt_blowfish() 252 Blowfish_expand0state(&state, csalt, salt_len); in crypt_blowfish()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | pkcs5.c | 27 size_t salt_len; member 187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 348 params->salt_len = hdr.length; in pkcs5_get_params() 350 params->salt, params->salt_len); in pkcs5_get_params() 395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 447 if (salt_len) { in pkcs12_key_gen() 449 *pos++ = salt[i % salt_len]; in pkcs12_key_gen() [all …]
|
/dragonfly/crypto/libressl/crypto/hkdf/ |
H A D | hkdf.c | 31 size_t salt_len, const uint8_t *info, size_t info_len) in HKDF() argument 37 salt_len)) in HKDF() 50 const uint8_t *salt, size_t salt_len) in HKDF_extract() argument 58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 485 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 489 ptr += salt_len; in eap_pwd_perform_commit_exchange() 503 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 520 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() [all …]
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | passwd.c | 310 size_t passwd_len, salt_len; in md5crypt() local 321 salt_len = strlen(salt_out); in md5crypt() 322 assert(salt_len <= 8); in md5crypt() 336 if (!EVP_DigestUpdate(md, salt_out, salt_len)) in md5crypt() 345 if (!EVP_DigestUpdate(md2, salt_out, salt_len)) in md5crypt() 376 if (!EVP_DigestUpdate(md2, salt_out, salt_len)) in md5crypt() 407 output = salt_out + salt_len; in md5crypt()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
H A D | eap.h | 35 size_t salt_len; member
|
H A D | eap_server.c | 1820 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | hkdf.h | 38 size_t salt_len, const uint8_t *info, size_t info_len); 48 size_t secret_len, const uint8_t *salt, size_t salt_len);
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user() 82 eap_user->salt_len); in hostapd_radius_get_eap_user() 85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()
|
H A D | ieee802_1x.c | 2273 if (eap_user->salt && eap_user->salt_len) { in ieee802_1x_get_eap_user() 2275 eap_user->salt_len); in ieee802_1x_get_eap_user() 2278 user->salt_len = eap_user->salt_len; in ieee802_1x_get_eap_user()
|
H A D | ap_config.h | 170 size_t salt_len; /* non-zero when password is salted */ member
|
H A D | ap_config.c | 567 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user()
|
/dragonfly/crypto/openssh/ |
H A D | hostfile.c | 69 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) in extract_salt() argument 100 ret = __b64_pton(b64salt, salt, salt_len); in extract_salt()
|