/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 36 const krb5_data * salt); 43 const krb5_data *salt, const krb5_data *parm, 56 return(mit_des_string_to_key_int(context, key, string, salt)); 59 return mit_afs_string_to_key(context, key, string, salt); 40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/aes/ |
H A D | aes_s2k.c | 47 const krb5_data *salt, 95 string, salt); 44 krb5int_aes_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/arcfour/ |
H A D | arcfour_str2key.c | 24 const krb5_data *string, const krb5_data *salt, 37 /* We ignore salt per the Microsoft spec*/ 22 krb5int_arcfour_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | string_to_key.c | 39 const krb5_data *salt, 46 const krb5_data *string, const krb5_data *salt, 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, 56 const krb5_data *salt, 74 * the salt in much of the code. However only the DES enctypes can 76 if (salt && salt->length == SALT_TYPE_AFS_LENGTH) { 101 ret = (*krb5_enctypes_list[i].str2key)(context, enc, string, salt, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, const krb5_data *string, const krb5_data *salt, krb5_keyblock *key) argument 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument
|
H A D | pbkdf2.c | 53 const krb5_data *pass, const krb5_data *salt) 103 params.pSaltSourceData = (void *)salt->data; 104 params.ulSaltSourceDataLen = salt->length; 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
H A D | old_api_glue.c | 125 const krb5_data *salt) 127 return(krb5_c_string_to_key(context, eblock->crypto_entry, data, salt, 123 krb5_string_to_key(krb5_context context, const krb5_encrypt_block *eblock, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument
|
/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bsdbf.c | 60 const char *salt, 63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); 57 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
H A D | bcrypt.c | 44 * 2. state := ExpandKey (state, salt, password) 3. 46 * state := ExpandKey (state, 0, salt) 51 * 6. RETURN Concatenate (salt, ctext); 76 #define BCRYPT_MINROUNDS 16 /* we have log2(rounds) in salt */ 145 encode_salt(char *salt, uint8_t *csalt, uint16_t clen, uint8_t logr) argument 147 salt[0] = '$'; 148 salt[1] = BCRYPT_VERSION; 149 salt[2] = 'a'; 150 salt[3] = '$'; 152 (void) snprintf(salt [all...] |
/osnet-11/usr/src/lib/crypt_modules/sha256/ |
H A D | test.c | 33 const char *salt; member in struct:__anon949 51 "we have a short salt string but not a short password", 64 const char *salt; member in struct:__anon950 83 "we have a short salt string but not a short password", 120 tests2[cnt].input, tests2[cnt].salt, NULL);
|
H A D | crypt_sha.c | 170 char *salt; local 183 /* Refine the salt */ 184 salt = (char *)switchsalt; 187 if (strncmp((char *)salt, crypt_alg_magic, crypt_alg_magic_len) == 0) { 188 salt += crypt_alg_magic_len + 1; 191 srounds = getrounds(salt); 195 p = strchr(salt, '$'); 197 salt = p + 1; 200 salt_len = MIN(strcspn(salt, "$"), MAX_SALT_LEN); 209 /* 3. Then the raw salt */ [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 41 The routine may use "salt" to seed or alter the conversion 54 const krb5_data *salt) 77 if (salt 78 && (salt->length == SALT_TYPE_AFS_LENGTH 80 || salt->length == (unsigned) -1)) { 84 afssalt.data = salt->data; 94 length = data->length + (salt ? salt->length : 0); 102 if (salt) 103 (void) memcpy(copystr + data->length, (char *)salt 51 mit_des_string_to_key_int(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
H A D | afsstring2key.c | 78 const krb5_data *salt) 88 char *realm = salt->data; 98 returned bytes after the copy of the (fixed) salt. 107 memcpy (password, realm, min (salt->length, 8)); 117 /* Out-of-bounds salt characters are equivalent to a salt string 135 unsigned int pw_len = salt->length+data->length; 142 for (i=data->length, j = 0; j < salt->length; i++, j++) { 185 krb5_xfree(salt->data); 372 char *afs_crypt(const char *pw, const char *salt, argument 76 mit_afs_string_to_key(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/dk/ |
H A D | stringtokey.c | 42 const krb5_data *string, const krb5_data *salt, 56 concatlen = string->length+(salt?salt->length:0); 70 /* construct input string ( = string + salt), fold it, make_key it */ 73 if (salt) 74 memcpy(concat+string->length, salt->data, salt->length); 39 krb5int_dk_string_to_key( krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parms, krb5_keyblock *key) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | password_pbkdf2.c | 35 grub_uint8_t *salt; member in struct:pbkdf2_password 55 pass->salt, pass->saltlen, pass->c, 122 ptro = pass->salt = grub_malloc (pass->saltlen); 137 grub_free (pass->salt); 150 grub_free (pass->salt); 166 grub_free (pass->salt);
|
/osnet-11/usr/src/grub/grub2/util/ |
H A D | grub-mkpasswd-pbkdf2.c | 58 -s number, --salt=number Length of salt\n\ 92 grub_uint8_t *buf, *salt; local 148 salt = malloc (saltlen); 149 if (!salt) 158 free (salt); 170 free (salt); 179 free (salt); 190 free (salt); 209 free (salt); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_keytab.c | 44 krb5_data *salt, 39 get_as_key_keytab(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
H A D | init_creds_ctx.h | 28 krb5_data salt; member in struct:_krb5_init_creds_context 46 krb5_data *salt,
|
H A D | gic_opt.c | 88 krb5_get_init_creds_opt_set_salt(krb5_get_init_creds_opt *opt, krb5_data *salt) argument 91 opt->salt = salt; 251 oe->salt = opt->salt;
|
H A D | gic_pwd.c | 34 krb5_data *salt, 89 if ((salt->length == -1 || salt->length == SALT_TYPE_AFS_LENGTH) && (salt->data == NULL)) { 93 salt = &defsalt; 98 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, 29 krb5_get_as_key_password(krb5_context context, krb5_principal client, krb5_enctype etype, krb5_prompter_fct prompter, void *prompter_data, krb5_data *salt, krb5_data *params, krb5_keyblock *as_key, void *gak_data) argument
|
H A D | preauth.c | 132 krb5_data salt; local 165 salt.data = 0; 166 salt.length = SALT_TYPE_NO_LENGTH; 169 salt.data = (char *) etype_info[0]->salt; 171 salt.length = SALT_TYPE_NO_LENGTH; /* XXX */ 173 salt.length = etype_info[0]->length; 175 if (salt.length == SALT_TYPE_NO_LENGTH) { 177 * This will set the salt length 179 if ((retval = krb5_principal2salt(context, request->client, &salt))) 322 krb5_data salt; local [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 108 * <salt> \0 <secret> 110 * where <secret> = MD5(<salt>, "sasldb", <pass>) 113 static int _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, argument 117 static int _sasl_make_plain_secret(const char *salt, 123 unsigned sec_len = 16 + 1 + 16; /* salt + "\0" + hash */ 137 _sasl_MD5Update(&ctx, salt, 16); 140 memcpy((*secret)->data, salt, 16);
|
/osnet-11/usr/src/lib/libcrypt/common/ |
H A D | des_crypt.c | 345 des_crypt(const char *pw, const char *salt) argument 372 c = *salt++;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 74 krb5_data password, salt; local 84 if ((code = krb5_principal2salt(ctx, svc_princ, &salt)) != 0) { 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 99 krb5_xfree(salt.data); 116 * constructing the salt in the string-to-key function. 144 * Note: In Active Directory environments the salt is constructed by truncating 145 * the host name to 15 characters and only use the host svc princ as the salt, 150 * derive the salt by sending an initial authentication exchange. 161 krb5_principal princ = NULL, salt = NULL, f_princ = NULL; local 197 * and only use the host svc princ as the salt, [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 56 krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, 76 salt, s2kparams, 48 process_preauth(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument
|
/osnet-11/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 191 * was in the old salt use that, otherwise keep what was in the 192 * old salt. 245 const char *salt, 282 * Extract the puresalt (if it exists) from the existing salt string 285 saltend = strrchr(salt, '$'); 286 if (saltend == NULL || saltend == salt) { 290 size_t len = saltend - salt + 1; 294 (void) strlcpy(puresalt, salt, len); 296 puresalt = strdup(salt); 302 maxrounds += getrounds(salt); 242 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument [all...] |