/dovecot/src/auth/ |
H A D | mycrypt.h | 6 char *mycrypt(const char *key, const char *salt);
|
H A D | mycrypt.c | 20 char *mycrypt(const char *key, const char *salt) argument 22 return crypt(key, salt);
|
H A D | password-scheme-pbkdf2.c | 17 pbkdf_run(const char *plaintext, const char *salt, argument 26 (const unsigned char *)salt, strlen(salt), 34 const char *salt; local 40 salt = password_generate_salt(PBKDF2_GENERATE_SALT_LEN); 41 pbkdf_run(plaintext, salt, rounds, key); 43 str_printfa(str, "$1$%s$%u$", salt, rounds); 55 const char *salt; local 60 /* $1$salt$rounds$hash */ 67 salt [all...] |
H A D | password-scheme-crypt.c | 13 #define CRYPT_BLF_SALT_LEN 16 /* raw salt */ 14 #define CRYPT_BLF_PREFIX_LEN (7+22+1) /* $2.$nn$ + salt */ 27 const char *password, *salt; local 29 salt = password_generate_salt(CRYPT_SALT_LEN); 30 password = t_strdup(mycrypt(plaintext, salt)); 39 char salt[CRYPT_BLF_SALT_LEN]; local 51 random_fill(salt, CRYPT_BLF_SALT_LEN); 53 salt, CRYPT_BLF_SALT_LEN, 71 const char *salt; local 88 salt 102 const char *password, *salt, *magic_salt; local 126 const char *password, *salt, *magic_salt; local 149 const char *salt; member in struct:__anon14 [all...] |
H A D | password-scheme-scram.c | 27 const unsigned char *salt, size_t salt_size, unsigned int i, 36 hmac_update(&ctx, salt, salt_size); 60 /* password string format: iter,salt,stored_key,server_key */ 100 const unsigned char *salt; local 114 salt = buffer_get_data(t_base64_decode_str(salt_base64), &salt_len); 117 Hi((const unsigned char *)plaintext, strlen(plaintext), salt, salt_len, 143 unsigned char salt[16]; local 149 random_fill(salt, sizeof(salt)); 151 str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(salt))); 26 Hi(const unsigned char *str, size_t str_size, const unsigned char *salt, size_t salt_size, unsigned int i, unsigned char result[SHA1_RESULTLEN]) argument [all...] |
H A D | password-scheme.c | 107 /* $1$<salt>$<password>[$<ignored>] */ 250 char *salt; local 252 salt = t_malloc_no0(len + 1); 253 random_fill(salt, len); 255 salt[i] = salt_chars[salt[i] % (sizeof(salt_chars)-1)]; 256 salt[len] = '\0'; 257 return salt; 376 char salt[9]; local 379 random_fill(salt, sizeo 433 unsigned char *digest, *salt; local 474 unsigned char *digest, *salt; local 517 unsigned char *digest, *salt; local 560 unsigned char *digest, *salt; local [all...] |
H A D | password-scheme-md5crypt.c | 49 const char *password_generate_md5_crypt(const char *pw, const char *salt) argument 60 sp = salt; 70 /* get the length of the true salt */ 81 /* Then the raw salt */ 84 /* Then just as many characters of the MD5(pw,salt,pw) */
|
H A D | mech-scram-sha1.c | 49 int iter, const char *salt) 68 salt, iter); 258 const char *salt, *error; local 264 &salt, request->stored_key, 273 get_scram_server_first(request, iter_count, salt)); 48 get_scram_server_first(struct scram_auth_request *request, int iter, const char *salt) argument
|
H A D | crypt-blowfish.c | 651 BF_word salt[4]; member in union:__anon6::__anon7 680 if (count < min || BF_decode(data.binary.salt, &setting[7], 16) != 0) { 684 BF_swap(data.binary.salt, 4); 693 L ^= data.binary.salt[i & 2]; 694 R ^= data.binary.salt[(i & 2) + 1]; 703 L ^= data.binary.salt[(BF_N + 2) & 3]; 704 R ^= data.binary.salt[(BF_N + 3) & 3]; 709 L ^= data.binary.salt[(BF_N + 4) & 3]; 710 R ^= data.binary.salt[(BF_N + 5) & 3]; 731 tmp1 = data.binary.salt[ [all...] |
H A D | password-scheme.h | 86 const char *password_generate_md5_crypt(const char *pw, const char *salt);
|
/dovecot/src/lib/ |
H A D | pkcs5.h | 15 salt - salt for generation 16 salt_len - length of salt in octets 26 if (pkcs5_pbkdf(PKCS5_PBKDF2, hash_method_lookup("sha256"), "password", 8, "salt", 4, 4096, 256, result) != 0) { // error } 32 const unsigned char *salt, size_t salt_len,
|
H A D | pkcs5.c | 15 const unsigned char *salt, size_t salt_len, 28 hash->loop(ctx, salt, salt_len); 46 const unsigned char *salt, size_t salt_len, 64 hmac_update(&hctx, salt, salt_len); 86 const unsigned char *salt, size_t salt_len, 92 salt,salt_len,iterations,dk_len,result); 95 salt,salt_len,iterations,dk_len,result); 13 pkcs5_pbkdf1(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument 44 pkcs5_pbkdf2(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument 84 pkcs5_pbkdf(enum pkcs5_pbkdf_mode mode, const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iterations, uint32_t dk_len, buffer_t *result) argument
|
H A D | var-expand.c | 225 string_t *salt = t_str_new(64); local 241 str_append(salt, field); 276 } else if (strcmp(k, "salt") == 0) { 277 str_truncate(salt, 0); 278 if (var_expand_with_funcs(salt, value, ctx->table, 307 salt->data, salt->used, 319 if (salt->used > 0) 320 method->loop(context, salt->data, salt [all...] |
/dovecot/src/lib-dcrypt/ |
H A D | dcrypt-openssl.c | 49 - enctype password (algorithm AES-256-CTR, key = PBKDF2(SHA1, 16, password, salt), IV = \0\0\0...) 50 1<tab>algo id<tab>2<tab>private point<tab>salt<tab>key id 65 - enctype ecdh, key,iv = PBKDF2(hash algo, rounds, shared secret, salt) 66 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>ephemeral public key<tab>encryption key id<tab>key id 68 - enctype password, key,iv = PBKDF2(hash algo, rounds, password, salt) 69 2<tab>key algo oid<tab>1<tab>symmetric algo name<tab>salt<tab>hash algo<tab>rounds<tab>E(RSA = i2d_PrivateKey, EC=Private Point)<tab>key id 710 bool dcrypt_openssl_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, argument 726 if ((ret = PKCS5_PBKDF2_HMAC((const char*)password, password_len, salt, salt_len, rounds, 840 buffer_t *salt, *data, *password, *key; local 844 salt 896 const char *salt = input[4]; local 981 dcrypt_openssl_cipher_key_dovecot_v2(const char *cipher, enum dcrypt_sym_mode mode, buffer_t *input, buffer_t *secret, buffer_t *salt, const char *digalgo, unsigned int rounds, buffer_t *result_r, const char **error_r) argument 1099 buffer_t *salt, *peer_key, *secret; local 1135 buffer_t *salt, secret, *data; local 1386 unsigned char salt[8]; local [all...] |
H A D | dcrypt-gnutls.c | 248 int dcrypt_gnutls_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, const char *algorithm, argument 254 pbkdf2_hmac_sha1(password_len, password, rounds, salt_len, salt, result_len, buf); 256 pbkdf2_hmac_sha256(password_len, password, rounds, salt_len, salt, result_len, buf); 260 PBKDF2(&ctx, hmac_sha512_update, hmac_sha512_digest, 64, rounds, salt_len, salt, result_len, buf);
|
H A D | dcrypt-private.h | 59 const unsigned char *salt, size_t salt_len, const char *hash,
|
H A D | dcrypt.c | 224 bool dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, argument 228 return dcrypt_vfs->pbkdf2(password, password_len, salt, salt_len, hash, rounds, result, result_len, error_r);
|
H A D | dcrypt.h | 164 * generate cryptographic data from password and salt. Use 1000-10000 for rounds. 166 bool dcrypt_pbkdf2(const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len,
|