Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 21 of 21) sorted by relevance

/dragonfly/crypto/libressl/crypto/kdf/
H A Dhkdf_evp.c67 size_t salt_len; member
94 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_cleanup()
123 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_ctrl()
128 kctx->salt_len = p1; in pkey_hkdf_ctrl()
214 freezero(kctx->salt, kctx->salt_len); in pkey_hkdf_derive_init()
238 kctx->salt, kctx->salt_len, kctx->info, kctx->info_len); in pkey_hkdf_derive()
246 kctx->key_len, kctx->salt, kctx->salt_len); in pkey_hkdf_derive()
/dragonfly/contrib/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
124 salt_len, salt, derived_key_len, derived_key); in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, in pbkdf2_sha1()
145 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
[all …]
H A Darchive_cryptor_private.h150 #define archive_pbkdf2_sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)\ argument
151 __archive_cryptor.pbkdf2sha1(pw, pw_len, salt, salt_len, rounds, dk, dk_len)
173 size_t salt_len, unsigned rounds, uint8_t *derived_key,
H A Darchive_write_set_format_zip.c1613 size_t key_len, salt_len; in init_winzip_aes_encryption() local
1625 salt_len = 8; in init_winzip_aes_encryption()
1629 salt_len = 16; in init_winzip_aes_encryption()
1656 salt[salt_len] = derived_key[key_len * 2]; in init_winzip_aes_encryption()
1657 salt[salt_len + 1] = derived_key[key_len * 2 + 1]; in init_winzip_aes_encryption()
1663 zip->written_bytes += salt_len + 2; in init_winzip_aes_encryption()
1664 zip->entry_compressed_written += salt_len + 2; in init_winzip_aes_encryption()
1672 size_t key_len, salt_len; in is_winzip_aes_encryption_supported() local
1680 salt_len = 8; in is_winzip_aes_encryption_supported()
1684 salt_len = 16; in is_winzip_aes_encryption_supported()
[all …]
H A Darchive_read_support_format_zip.c2861 size_t key_len, salt_len; in init_WinZip_AES_decryption() local
2870 case 1: salt_len = 8; key_len = 16; break; in init_WinZip_AES_decryption()
2871 case 2: salt_len = 12; key_len = 24; break; in init_WinZip_AES_decryption()
2872 case 3: salt_len = 16; key_len = 32; break; in init_WinZip_AES_decryption()
2875 p = __archive_read_ahead(a, salt_len + 2, NULL); in init_WinZip_AES_decryption()
2892 p, salt_len, 1000, derived_key, key_len * 2 + 2); in init_WinZip_AES_decryption()
2901 pv = ((const uint8_t *)p) + salt_len; in init_WinZip_AES_decryption()
2927 __archive_read_consume(a, salt_len + 2); in init_WinZip_AES_decryption()
2928 zip->entry_bytes_remaining -= salt_len + 2 + AUTH_CODE_SIZE; in init_WinZip_AES_decryption()
2932 zip->entry_compressed_bytes_read += salt_len + 2 + AUTH_CODE_SIZE; in init_WinZip_AES_decryption()
/dragonfly/lib/libcrypt/
H A Dcrypt-sha256.c308 size_t salt_len; in crypt_sha256_r() local
340 salt_len = MIN (strcspn (salt, "$"), SALT_LEN_MAX); in crypt_sha256_r()
358 salt, salt_len); in crypt_sha256_r()
370 __crypt__sha256_process_bytes (salt, salt_len, &ctx); in crypt_sha256_r()
381 __crypt__sha256_process_bytes (salt, salt_len, &alt_ctx); in crypt_sha256_r()
433 cp = s_bytes = alloca (salt_len); in crypt_sha256_r()
434 for (cnt = salt_len; cnt >= 32; cnt -= 32) in crypt_sha256_r()
453 __crypt__sha256_process_bytes (s_bytes, salt_len, &ctx); in crypt_sha256_r()
483 buflen -= MIN ((size_t) MAX (0, buflen), salt_len); in crypt_sha256_r()
530 memset (s_bytes, '\0', salt_len); in crypt_sha256_r()
[all …]
H A Dcrypt-sha512.c339 size_t salt_len; in crypt_sha512_r() local
371 salt_len = MIN (strcspn (salt, "$"), SALT_LEN_MAX); in crypt_sha512_r()
389 salt, salt_len); in crypt_sha512_r()
401 __crypt__sha512_process_bytes (salt, salt_len, &ctx); in crypt_sha512_r()
412 __crypt__sha512_process_bytes (salt, salt_len, &alt_ctx); in crypt_sha512_r()
464 cp = s_bytes = alloca (salt_len); in crypt_sha512_r()
465 for (cnt = salt_len; cnt >= 64; cnt -= 64) in crypt_sha512_r()
484 __crypt__sha512_process_bytes (s_bytes, salt_len, &ctx); in crypt_sha512_r()
514 buflen -= MIN ((size_t) MAX (0, buflen), salt_len); in crypt_sha512_r()
573 memset (s_bytes, '\0', salt_len); in crypt_sha512_r()
[all …]
H A Dcrypt-blowfish.c185 u_int8_t key_len, salt_len, logr, minor; in crypt_blowfish() local
243 salt_len = BCRYPT_MAXSALT; in crypt_blowfish()
248 Blowfish_expandstate(&state, csalt, salt_len, in crypt_blowfish()
252 Blowfish_expand0state(&state, csalt, salt_len); in crypt_blowfish()
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dpkcs5.c27 size_t salt_len; member
187 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
348 params->salt_len = hdr.length; in pkcs5_get_params()
350 params->salt, params->salt_len); in pkcs5_get_params()
395 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
423 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument
441 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
447 if (salt_len) { in pkcs12_key_gen()
449 *pos++ = salt[i % salt_len]; in pkcs12_key_gen()
[all …]
/dragonfly/crypto/libressl/crypto/hkdf/
H A Dhkdf.c31 size_t salt_len, const uint8_t *info, size_t info_len) in HKDF() argument
37 salt_len)) in HKDF()
50 const uint8_t *salt, size_t salt_len) in HKDF_extract() argument
58 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == in HKDF_extract()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange()
448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
454 (int) salt_len); in eap_pwd_perform_commit_exchange()
455 ptr += salt_len; in eap_pwd_perform_commit_exchange()
468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
485 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
489 ptr += salt_len; in eap_pwd_perform_commit_exchange()
503 salt_len = *ptr++; in eap_pwd_perform_commit_exchange()
520 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange()
[all …]
/dragonfly/crypto/libressl/apps/openssl/
H A Dpasswd.c310 size_t passwd_len, salt_len; in md5crypt() local
321 salt_len = strlen(salt_out); in md5crypt()
322 assert(salt_len <= 8); in md5crypt()
336 if (!EVP_DigestUpdate(md, salt_out, salt_len)) in md5crypt()
345 if (!EVP_DigestUpdate(md2, salt_out, salt_len)) in md5crypt()
376 if (!EVP_DigestUpdate(md2, salt_out, salt_len)) in md5crypt()
407 output = salt_out + salt_len; in md5crypt()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c31 size_t salt_len; member
121 data->salt_len = sm->user->salt_len; in eap_pwd_init()
122 if (data->salt_len) { in eap_pwd_init()
123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset()
194 if (data->salt_len) in eap_pwd_build_id_req()
196 data->salt, data->salt_len); in eap_pwd_build_id_req()
202 if (data->salt_len) { in eap_pwd_build_id_req()
283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req()
288 if (data->salt_len) { in eap_pwd_build_commit_req()
[all …]
H A Deap.h35 size_t salt_len; member
H A Deap_server.c1820 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
/dragonfly/crypto/libressl/include/openssl/
H A Dhkdf.h38 size_t salt_len, const uint8_t *info, size_t info_len);
48 size_t secret_len, const uint8_t *salt, size_t salt_len);
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dauthsrv.c80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user()
82 eap_user->salt_len); in hostapd_radius_get_eap_user()
85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()
H A Dieee802_1x.c2273 if (eap_user->salt && eap_user->salt_len) { in ieee802_1x_get_eap_user()
2275 eap_user->salt_len); in ieee802_1x_get_eap_user()
2278 user->salt_len = eap_user->salt_len; in ieee802_1x_get_eap_user()
H A Dap_config.h170 size_t salt_len; /* non-zero when password is salted */ member
H A Dap_config.c567 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user()
/dragonfly/crypto/openssh/
H A Dhostfile.c69 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) in extract_salt() argument
100 ret = __b64_pton(b64salt, salt, salt_len); in extract_salt()