Lines Matching defs:salt
43 * 2. state := ExpandKey (state, salt, password) 3.
45 * state := ExpandKey (state, 0, salt)
50 * 6. RETURN Concatenate (salt, ctext);
76 #define BCRYPT_MINLOGROUNDS 4 /* we have log2(rounds) in salt */
146 encode_salt(char *salt, uint8_t *csalt, uint16_t clen, uint8_t logr)
148 salt[0] = '$';
149 salt[1] = BCRYPT_VERSION;
150 salt[2] = 'a';
151 salt[3] = '$';
153 (void) snprintf(salt + 4, 4, "%2.2u$", logr);
155 encode_base64((uint8_t *)salt + 7, csalt, clen);
158 * Generates a salt for this version of crypt.
186 * We handle $Vers$log2(NumRounds)$salt+passwd$
191 bcrypt(key, salt)
193 const char *salt;
206 salt++;
208 if (*salt > BCRYPT_VERSION) {
214 if (salt[1] != '$') {
215 switch (salt[1]) {
218 minor = salt[1];
219 salt++;
228 salt += 2;
230 if (salt[2] != '$')
234 (void) memcpy(arounds, salt, sizeof (arounds));
244 salt += 3;
246 if (strlen(salt) * 3 / 4 < BCRYPT_MAXSALT)
249 /* We dont want the base64 salt but the raw data */
250 decode_base64(csalt, BCRYPT_MAXSALT, (uint8_t *)salt);
346 char salt[100];
348 salt[0] = '$';
349 salt[1] = BCRYPT_VERSION;
350 salt[2] = '$';
352 snprintf(salt + 3, 4, "%2.2u$", 5);
354 printf("24 bytes of salt: ");
355 fgets(salt + 6, 94, stdin);
356 salt[99] = 0;
362 p = crypt(blubber, salt);
366 printf("Generated salt: %s\n", p);