Searched refs:salt (Results 1 - 18 of 18) sorted by relevance

/dovecot/src/auth/
H A Dmycrypt.h6 char *mycrypt(const char *key, const char *salt);
H A Dmycrypt.c20 char *mycrypt(const char *key, const char *salt) argument
22 return crypt(key, salt);
H A Dpassword-scheme-pbkdf2.c17 pbkdf_run(const char *plaintext, const char *salt, argument
26 (const unsigned char *)salt, strlen(salt),
34 const char *salt; local
40 salt = password_generate_salt(PBKDF2_GENERATE_SALT_LEN);
41 pbkdf_run(plaintext, salt, rounds, key);
43 str_printfa(str, "$1$%s$%u$", salt, rounds);
55 const char *salt; local
60 /* $1$salt$rounds$hash */
67 salt
[all...]
H A Dpassword-scheme-crypt.c13 #define CRYPT_BLF_SALT_LEN 16 /* raw salt */
14 #define CRYPT_BLF_PREFIX_LEN (7+22+1) /* $2.$nn$ + salt */
27 const char *password, *salt; local
29 salt = password_generate_salt(CRYPT_SALT_LEN);
30 password = t_strdup(mycrypt(plaintext, salt));
39 char salt[CRYPT_BLF_SALT_LEN]; local
51 random_fill(salt, CRYPT_BLF_SALT_LEN);
53 salt, CRYPT_BLF_SALT_LEN,
71 const char *salt; local
88 salt
102 const char *password, *salt, *magic_salt; local
126 const char *password, *salt, *magic_salt; local
149 const char *salt; member in struct:__anon14
[all...]
H A Dpassword-scheme-scram.c27 const unsigned char *salt, size_t salt_size, unsigned int i,
36 hmac_update(&ctx, salt, salt_size);
60 /* password string format: iter,salt,stored_key,server_key */
100 const unsigned char *salt; local
114 salt = buffer_get_data(t_base64_decode_str(salt_base64), &salt_len);
117 Hi((const unsigned char *)plaintext, strlen(plaintext), salt, salt_len,
143 unsigned char salt[16]; local
149 random_fill(salt, sizeof(salt));
151 str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(salt)));
26 Hi(const unsigned char *str, size_t str_size, const unsigned char *salt, size_t salt_size, unsigned int i, unsigned char result[SHA1_RESULTLEN]) argument
[all...]
H A Dpassword-scheme.c107 /* $1$<salt>$<password>[$<ignored>] */
250 char *salt; local
252 salt = t_malloc_no0(len + 1);
253 random_fill(salt, len);
255 salt[i] = salt_chars[salt[i] % (sizeof(salt_chars)-1)];
256 salt[len] = '\0';
257 return salt;
376 char salt[9]; local
379 random_fill(salt, sizeo
433 unsigned char *digest, *salt; local
474 unsigned char *digest, *salt; local
517 unsigned char *digest, *salt; local
560 unsigned char *digest, *salt; local
[all...]
H A Dpassword-scheme-md5crypt.c49 const char *password_generate_md5_crypt(const char *pw, const char *salt) argument
60 sp = salt;
70 /* get the length of the true salt */
81 /* Then the raw salt */
84 /* Then just as many characters of the MD5(pw,salt,pw) */
H A Dmech-scram-sha1.c49 int iter, const char *salt)
68 salt, iter);
258 const char *salt, *error; local
264 &salt, request->stored_key,
273 get_scram_server_first(request, iter_count, salt));
48 get_scram_server_first(struct scram_auth_request *request, int iter, const char *salt) argument
H A Dcrypt-blowfish.c651 BF_word salt[4]; member in union:__anon6::__anon7
680 if (count < min || BF_decode(data.binary.salt, &setting[7], 16) != 0) {
684 BF_swap(data.binary.salt, 4);
693 L ^= data.binary.salt[i & 2];
694 R ^= data.binary.salt[(i & 2) + 1];
703 L ^= data.binary.salt[(BF_N + 2) & 3];
704 R ^= data.binary.salt[(BF_N + 3) & 3];
709 L ^= data.binary.salt[(BF_N + 4) & 3];
710 R ^= data.binary.salt[(BF_N + 5) & 3];
731 tmp1 = data.binary.salt[
[all...]
H A Dpassword-scheme.h86 const char *password_generate_md5_crypt(const char *pw, const char *salt);
/dovecot/src/lib/
H A Dpkcs5.h15 salt - salt for generation
16 salt_len - length of salt in octets
26 if (pkcs5_pbkdf(PKCS5_PBKDF2, hash_method_lookup("sha256"), "password", 8, "salt", 4, 4096, 256, result) != 0) { // error }
32 const unsigned char *salt, size_t salt_len,
H A Dpkcs5.c15 const unsigned char *salt, size_t salt_len,
28 hash->loop(ctx, salt, salt_len);
46 const unsigned char *salt, size_t salt_len,
64 hmac_update(&hctx, salt, salt_len);
86 const unsigned char *salt, size_t salt_len,
92 salt,salt_len,iterations,dk_len,result);
95 salt,salt_len,iterations,dk_len,result);
13 pkcs5_pbkdf1(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument
44 pkcs5_pbkdf2(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument
84 pkcs5_pbkdf(enum pkcs5_pbkdf_mode mode, const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iterations, uint32_t dk_len, buffer_t *result) argument
H A Dvar-expand.c225 string_t *salt = t_str_new(64); local
241 str_append(salt, field);
276 } else if (strcmp(k, "salt") == 0) {
277 str_truncate(salt, 0);
278 if (var_expand_with_funcs(salt, value, ctx->table,
307 salt->data, salt->used,
319 if (salt->used > 0)
320 method->loop(context, salt->data, salt
[all...]
/dovecot/src/lib-dcrypt/
H A Ddcrypt-openssl.c49 - enctype password (algorithm AES-256-CTR, key = PBKDF2(SHA1, 16, password, salt), IV = \0\0\0...)
50 1<tab>algo id<tab>2<tab>private point<tab>salt<tab>key id
65 - enctype ecdh, key,iv = PBKDF2(hash algo, rounds, shared secret, salt)
66 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>ephemeral public key<tab>encryption key id<tab>key id
68 - enctype password, key,iv = PBKDF2(hash algo, rounds, password, salt)
69 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>key id
710 bool dcrypt_openssl_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, argument
726 if ((ret = PKCS5_PBKDF2_HMAC((const char*)password, password_len, salt, salt_len, rounds,
840 buffer_t *salt, *data, *password, *key; local
844 salt
896 const char *salt = input[4]; local
981 dcrypt_openssl_cipher_key_dovecot_v2(const char *cipher, enum dcrypt_sym_mode mode, buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds, buffer_t *result_r, const char **error_r) argument
1099 buffer_t *salt, *peer_key, *secret; local
1135 buffer_t *salt, secret, *data; local
1386 unsigned char salt[8]; local
[all...]
H A Ddcrypt-gnutls.c248 int dcrypt_gnutls_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *algorithm, argument
254 pbkdf2_hmac_sha1(password_len, password, rounds, salt_len, salt, result_len, buf);
256 pbkdf2_hmac_sha256(password_len, password, rounds, salt_len, salt, result_len, buf);
260 PBKDF2(&ctx, hmac_sha512_update, hmac_sha512_digest, 64, rounds, salt_len, salt, result_len, buf);
H A Ddcrypt-private.h59 const unsigned char *salt, size_t salt_len, const char *hash,
H A Ddcrypt.c224 bool dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, argument
228 return dcrypt_vfs->pbkdf2(password, password_len, salt, salt_len, hash, rounds, result, result_len, error_r);
H A Ddcrypt.h164 * generate cryptographic data from password and salt. Use 1000-10000 for rounds.
166 bool dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len,

Completed in 51 milliseconds