Searched defs:rounds (Results 1 - 12 of 12) sorted by relevance

/dovecot/src/auth/
H A Dpassword-scheme-sodium.c13 unsigned long long rounds = params->rounds; local
17 if (rounds == 0)
18 rounds = crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVE;
20 if (rounds >= crypto_pwhash_argon2i_OPSLIMIT_SENSITIVE)
22 else if (rounds >= crypto_pwhash_argon2i_OPSLIMIT_MODERATE)
27 if (crypto_pwhash_argon2i_str(result, plaintext, strlen(plaintext), rounds, memlimit) < 0)
38 unsigned long long rounds = params->rounds; local
43 if (rounds
[all...]
H A Dpassword-scheme.h14 unsigned int rounds; member in struct:password_generate_params
81 encryption rounds. */
82 void password_set_encryption_rounds(unsigned int rounds);
H A Dpassword-scheme-pbkdf2.c18 unsigned int rounds, unsigned char key_r[PBKDF2_KEY_SIZE_SHA1])
27 rounds, PBKDF2_KEY_SIZE_SHA1, &buf);
36 unsigned int rounds = params->rounds; local
38 if (rounds == 0)
39 rounds = PBKDF2_ROUNDS_DEFAULT;
41 pbkdf_run(plaintext, salt, rounds, key);
43 str_printfa(str, "$1$%s$%u$", salt, rounds);
56 unsigned int rounds; local
60 /* $1$salt$rounds
17 pbkdf_run(const char *plaintext, const char *salt, unsigned int rounds, unsigned char key_r[PBKDF2_KEY_SIZE_SHA1]) argument
[all...]
H A Dpassword-scheme-crypt.c42 unsigned int rounds = params->rounds; local
44 if (rounds == 0)
45 rounds = CRYPT_BLF_ROUNDS_DEFAULT;
46 else if (rounds < CRYPT_BLF_ROUNDS_MIN)
47 rounds = CRYPT_BLF_ROUNDS_MIN;
48 else if (rounds > CRYPT_BLF_ROUNDS_MAX)
49 rounds = CRYPT_BLF_ROUNDS_MAX;
52 if (crypt_gensalt_blowfish_rn(CRYPT_BLF_PREFIX, rounds,
103 unsigned int rounds local
127 unsigned int rounds = params->rounds; local
[all...]
/dovecot/src/lib/
H A Dtest-hash-method.c60 size_t rounds; member in struct:__anon45
337 for(size_t n = 0; n < test_vectors[i].rounds; n++)
H A Dtest-ostream-multiplex.c92 size_t rounds = 1 + i_rand() % 10; local
93 for(size_t i = 0; i < rounds; i++) {
H A Dtest-istream-multiplex.c272 size_t rounds = i_rand() % 10; local
273 for(size_t i = 0; i < rounds; i++) {
H A Dvar-expand.c236 unsigned int rounds = 1; local
240 rounds = 2048;
253 if (strcmp(k, "rounds") == 0) {
254 if (str_to_uint(value, &rounds)<0) {
257 "'%s' is not number for rounds",
261 if (rounds < 1) {
264 "rounds must be at least 1");
308 rounds, HMAC_MAX_CONTEXT_SIZE, tmp) != 0) {
317 for(;rounds>0;rounds
[all...]
/dovecot/src/lib-dcrypt/
H A Ddcrypt-gnutls.c249 unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r)
254 pbkdf2_hmac_sha1(password_len, password, rounds, salt_len, salt, result_len, buf);
256 pbkdf2_hmac_sha256(password_len, password, rounds, salt_len, salt, result_len, buf);
260 PBKDF2(&ctx, hmac_sha512_update, hmac_sha512_digest, 64, rounds, salt_len, salt, result_len, buf);
248 dcrypt_gnutls_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *algorithm, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument
H A Distream-decrypt.c275 ssize_t i_stream_decrypt_key(struct decrypt_istream *stream, const char *malg, unsigned int rounds, argument
393 malg, rounds, temp_key, 32+16, &error)) {
494 /* read rounds (for PBKDF2) */
495 uint32_t rounds; local
496 if (!get_msb32(&data, end, &rounds))
519 if ((ret = i_stream_decrypt_key(stream, malg, rounds, data, end, keydata, kl)) <= 0)
H A Ddcrypt.c225 const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r)
228 return dcrypt_vfs->pbkdf2(password, password_len, salt, salt_len, hash, rounds, result, result_len, error_r);
224 dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument
H A Ddcrypt-openssl.c65 - enctype ecdh, key,iv = PBKDF2(hash algo, rounds, shared secret, salt)
66 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>ephemeral public key<tab>encryption key id<tab>key id
68 - enctype password, key,iv = PBKDF2(hash algo, rounds, password, salt)
69 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>key id
711 const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r)
714 i_assert(rounds > 0);
726 if ((ret = PKCS5_PBKDF2_HMAC((const char*)password, password_len, salt, salt_len, rounds,
982 buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds,
995 digalgo, rounds, key_data,
1073 unsigned int rounds; local
710 dcrypt_openssl_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *hash, unsigned int rounds, buffer_t *result, unsigned int result_len, const char **error_r) argument
981 dcrypt_openssl_cipher_key_dovecot_v2(const char *cipher, enum dcrypt_sym_mode mode, buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds, buffer_t *result_r, const char **error_r) argument
1128 unsigned int rounds; local
[all...]

Completed in 33 milliseconds