/dovecot/src/auth/ |
H A D | password-scheme-sodium.c | 13 unsigned long long rounds = params->rounds; local 17 if (rounds == 0) 18 rounds = crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVE; 20 if (rounds >= crypto_pwhash_argon2i_OPSLIMIT_SENSITIVE) 22 else if (rounds >= crypto_pwhash_argon2i_OPSLIMIT_MODERATE) 27 if (crypto_pwhash_argon2i_str(result, plaintext, strlen(plaintext), rounds, memlimit) < 0) 38 unsigned long long rounds = params->rounds; local 43 if (rounds [all...] |
H A D | password-scheme.h | 14 unsigned int rounds; member in struct:password_generate_params 81 encryption rounds. */ 82 void password_set_encryption_rounds(unsigned int rounds);
|
H A D | password-scheme-pbkdf2.c | 18 unsigned int rounds, unsigned char key_r[PBKDF2_KEY_SIZE_SHA1]) 27 rounds, PBKDF2_KEY_SIZE_SHA1, &buf); 36 unsigned int rounds = params->rounds; local 38 if (rounds == 0) 39 rounds = PBKDF2_ROUNDS_DEFAULT; 41 pbkdf_run(plaintext, salt, rounds, key); 43 str_printfa(str, "$1$%s$%u$", salt, rounds); 56 unsigned int rounds; local 60 /* $1$salt$rounds 17 pbkdf_run(const char *plaintext, const char *salt, unsigned int rounds, unsigned char key_r[PBKDF2_KEY_SIZE_SHA1]) argument [all...] |
H A D | password-scheme-crypt.c | 42 unsigned int rounds = params->rounds; local 44 if (rounds == 0) 45 rounds = CRYPT_BLF_ROUNDS_DEFAULT; 46 else if (rounds < CRYPT_BLF_ROUNDS_MIN) 47 rounds = CRYPT_BLF_ROUNDS_MIN; 48 else if (rounds > CRYPT_BLF_ROUNDS_MAX) 49 rounds = CRYPT_BLF_ROUNDS_MAX; 52 if (crypt_gensalt_blowfish_rn(CRYPT_BLF_PREFIX, rounds, 103 unsigned int rounds local 127 unsigned int rounds = params->rounds; local [all...] |
/dovecot/src/lib/ |
H A D | test-hash-method.c | 60 size_t rounds; member in struct:__anon45 337 for(size_t n = 0; n < test_vectors[i].rounds; n++)
|
H A D | test-ostream-multiplex.c | 92 size_t rounds = 1 + i_rand() % 10; local 93 for(size_t i = 0; i < rounds; i++) {
|
H A D | test-istream-multiplex.c | 272 size_t rounds = i_rand() % 10; local 273 for(size_t i = 0; i < rounds; i++) {
|
H A D | var-expand.c | 236 unsigned int rounds = 1; local 240 rounds = 2048; 253 if (strcmp(k, "rounds") == 0) { 254 if (str_to_uint(value, &rounds)<0) { 257 "'%s' is not number for rounds", 261 if (rounds < 1) { 264 "rounds must be at least 1"); 308 rounds, HMAC_MAX_CONTEXT_SIZE, tmp) != 0) { 317 for(;rounds>0;rounds [all...] |
/dovecot/src/lib-dcrypt/ |
H A D | dcrypt-gnutls.c | 249 unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) 254 pbkdf2_hmac_sha1(password_len, password, rounds, salt_len, salt, result_len, buf); 256 pbkdf2_hmac_sha256(password_len, password, rounds, salt_len, salt, result_len, buf); 260 PBKDF2(&ctx, hmac_sha512_update, hmac_sha512_digest, 64, rounds, salt_len, salt, result_len, buf); 248 dcrypt_gnutls_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *algorithm, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument
|
H A D | istream-decrypt.c | 275 ssize_t i_stream_decrypt_key(struct decrypt_istream *stream, const char *malg, unsigned int rounds, argument 393 malg, rounds, temp_key, 32+16, &error)) { 494 /* read rounds (for PBKDF2) */ 495 uint32_t rounds; local 496 if (!get_msb32(&data, end, &rounds)) 519 if ((ret = i_stream_decrypt_key(stream, malg, rounds, data, end, keydata, kl)) <= 0)
|
H A D | dcrypt.c | 225 const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) 228 return dcrypt_vfs->pbkdf2(password, password_len, salt, salt_len, hash, rounds, result, result_len, error_r); 224 dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument
|
H A D | dcrypt-openssl.c | 65 - enctype ecdh, key,iv = PBKDF2(hash algo, rounds, shared secret, salt) 66 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>ephemeral public key<tab>encryption key id<tab>key id 68 - enctype password, key,iv = PBKDF2(hash algo, rounds, password, salt) 69 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>key id 711 const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) 714 i_assert(rounds > 0); 726 if ((ret = PKCS5_PBKDF2_HMAC((const char*)password, password_len, salt, salt_len, rounds, 982 buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds, 995 digalgo, rounds, key_data, 1073 unsigned int rounds; local 710 dcrypt_openssl_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument 981 dcrypt_openssl_cipher_key_dovecot_v2(const char *cipher, enum dcrypt_sym_mode mode, buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds, buffer_t *result_r, const char **error_r) argument 1128 unsigned int rounds; local [all...] |