/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | crypt.c | 36 crypt(pw, salt) 37 char *pw, *salt; 49 * In this case, the salt will start with "##". We should call 51 * the salt, and otherwise return NULL. If salt does not start with 54 if (salt[0] == '#' && salt[1] == '#') { 55 if (pwdauth(salt+2, pw) == 0) 56 strcpy(iobuf, salt); 62 * In this case, the salt wil [all...] |
/illumos-gate/usr/src/cmd/makekey/ |
H A D | makekey.c | 46 char salt[2]; local 49 (void) read(0, salt, 2); 50 (void) write(1, crypt(key, salt), 13);
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/old/ |
H A D | des_stringtokey.c | 36 const krb5_data * salt); 43 const krb5_data *salt, const krb5_data *parm, 56 return(mit_des_string_to_key_int(context, key, string, salt)); 59 return mit_afs_string_to_key(context, key, string, salt); 40 krb5int_des_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parm, krb5_keyblock *key) argument
|
/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 43 * 2. state := ExpandKey (state, salt, password) 3. 45 * state := ExpandKey (state, 0, salt) 50 * 6. RETURN Concatenate (salt, ctext); 76 #define BCRYPT_MINLOGROUNDS 4 /* we have log2(rounds) in salt */ 146 encode_salt(char *salt, uint8_t *csalt, uint16_t clen, uint8_t logr) argument 148 salt[0] = '$'; 149 salt[1] = BCRYPT_VERSION; 150 salt[2] = 'a'; 151 salt[3] = '$'; 153 (void) snprintf(salt [all...] |
H A D | bsdbf.c | 60 const char *salt, 63 (void) strlcpy(ctbuffer, bcrypt(plaintext, salt), ctbufflen); 57 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | string2key.c | 39 The routine may use "salt" to seed or alter the conversion 52 const krb5_data *salt) 74 if (salt 75 && (salt->length == SALT_TYPE_AFS_LENGTH 77 || salt->length == (unsigned) -1)) { 81 afssalt.data = salt->data; 91 length = data->length + (salt ? salt->length : 0); 99 if (salt) 100 (void) memcpy(copystr + data->length, (char *)salt 49 mit_des_string_to_key_int(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
H A D | afsstring2key.c | 80 const krb5_data *salt) 89 char *realm = salt->data; 97 returned bytes after the copy of the (fixed) salt. 106 memcpy (password, realm, min (salt->length, 8)); 116 /* Out-of-bounds salt characters are equivalent to a salt string 134 unsigned int pw_len = salt->length+data->length; 141 for (i=data->length, j = 0; j < salt->length; i++, j++) { 184 krb5_xfree(salt->data); 368 char *afs_crypt(const char *pw, const char *salt, argument 78 mit_afs_string_to_key(krb5_context context, krb5_keyblock *keyblock, const krb5_data *data, const krb5_data *salt) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | string_to_key.c | 39 const krb5_data *salt, 46 const krb5_data *string, const krb5_data *salt, 49 return krb5_c_string_to_key_with_params(context, enctype, string, salt, 56 const krb5_data *salt, 74 * the salt in much of the code. However only the DES enctypes can 76 if (salt && salt->length == SALT_TYPE_AFS_LENGTH) { 101 ret = (*krb5_enctypes_list[i].str2key)(context, enc, string, salt, 45 krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, const krb5_data *string, const krb5_data *salt, krb5_keyblock *key) argument 54 krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument
|
H A D | pbkdf2.c | 53 const krb5_data *pass, const krb5_data *salt) 103 params.pSaltSourceData = (void *)salt->data; 104 params.ulSaltSourceDataLen = salt->length; 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 17 /* salt string used for exportable ARCFOUR */ 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 97 * k1 = HMAC(input_key, salt) 143 salt.length=14; 144 salt.data=MALLOC(salt.length); 146 if (salt.data == NULL) { 164 FREE(salt.data, salt.length); 184 (void) strncpy(salt 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/dk/ |
H A D | stringtokey.c | 42 const krb5_data *string, const krb5_data *salt, 56 concatlen = string->length+(salt?salt->length:0); 70 /* construct input string ( = string + salt), fold it, make_key it */ 73 if (salt) 74 memcpy(concat+string->length, salt->data, salt->length); 39 krb5int_dk_string_to_key( krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *parms, krb5_keyblock *key) argument
|
/illumos-gate/usr/src/lib/crypt_modules/sha256/ |
H A D | test.c | 33 const char *salt; member in struct:__anon2454 51 "we have a short salt string but not a short password", 64 const char *salt; member in struct:__anon2455 83 "we have a short salt string but not a short password", 120 tests2[cnt].input, tests2[cnt].salt, NULL);
|
H A D | crypt_sha.c | 170 char *salt; local 183 /* Refine the salt */ 184 salt = (char *)switchsalt; 187 if (strncmp((char *)salt, crypt_alg_magic, crypt_alg_magic_len) == 0) { 188 salt += crypt_alg_magic_len + 1; 191 srounds = getrounds(salt); 195 p = strchr(salt, '$'); 197 salt = p + 1; 200 salt_len = MIN(strcspn(salt, "$"), MAX_SALT_LEN); 209 /* 3. Then the raw salt */ [all...] |
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | edonr_zfs.c | 67 zio_checksum_edonr_tmpl_init(const zio_cksum_salt_t *salt) argument 74 * blocks, but the salt is too small. Rather than simply padding it 75 * with zeros, we expand the salt into a new salt block of proper 76 * size by double-hashing it (the new salt block will be composed of 77 * H(salt) || H(H(salt))). 80 EdonRHash(EDONR_MODE, salt->zcs_bytes, sizeof (salt->zcs_bytes) * 8, 86 * Feed the new salt bloc [all...] |
H A D | skein_zfs.c | 70 zio_checksum_skein_tmpl_init(const zio_cksum_salt_t *salt) argument 76 salt->zcs_bytes, sizeof (salt->zcs_bytes));
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 144 krb5_data salt; local 177 salt.data = 0; 178 salt.length = SALT_TYPE_NO_LENGTH; 181 salt.data = (char *) etype_info[0]->salt; 183 salt.length = SALT_TYPE_NO_LENGTH; /* XXX */ 185 salt.length = etype_info[0]->length; 187 if (salt.length == SALT_TYPE_NO_LENGTH) { 189 * This will set the salt length 191 if ((retval = krb5_principal2salt(context, request->client, &salt))) 334 krb5_data salt; local [all...] |
H A D | preauth2.c | 58 krb5_data *salt, krb5_data *s2kparams, 509 krb5_data *salt, 565 gak_fct, gak_data, salt, s2kparams, 593 krb5_data *salt, krb5_data *s2kparams, 604 krb5_free_data_contents(context, salt); 605 krb5int_copy_data_contents(context, &tmp, salt); 609 salt->length = SALT_TYPE_AFS_LENGTH; 620 krb5_data *salt, 638 if (salt != NULL && salt 500 krb5_run_preauth_plugins(krb5_context kcontext, int module_required_flags, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, krb5_data *salt, krb5_data *s2kparams, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_keyblock *as_key, krb5_pa_data ***out_pa_list, int *out_pa_list_size, int *module_ret, int *module_flags, krb5_gic_opt_ext *opte) argument 589 pa_salt(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 616 pa_enc_timestamp(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 760 pa_sam(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1031 pa_sam_2(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1398 krb5_do_preauth_tryagain(krb5_context kcontext, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **padata, krb5_pa_data ***return_padata, krb5_error *err_reply, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument 1469 krb5_do_preauth(krb5_context context, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **in_padata, krb5_pa_data ***out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/aes/ |
H A D | aes_s2k.c | 47 const krb5_data *salt, 95 string, salt); 44 krb5int_aes_string_to_key(krb5_context context, const struct krb5_enc_provider *enc, const krb5_data *string, const krb5_data *salt, const krb5_data *params, krb5_keyblock *key) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | old.h | 59 const krb5_data *string, const krb5_data *salt,
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 114 static char *getalgfromsalt(const char *salt); 119 static char *_unix_crypt(const char *pw, const char *salt, char *iobuf); 129 * as passwords. It generates the password hash given the plaintext and salt. 131 * If the first character of salt is "$" then we use crypt.conf(4) to 144 crypt(const char *plaintext, const char *salt) argument 158 * '$' is never a possible salt char with the traditional unix 159 * algorithm. If the salt passed in is NULL or the first char 160 * of the salt isn't a $ then do the traditional thing. 161 * We also do the traditional thing if the salt is only 1 char. 163 if (salt 282 getalgfromsalt(const char *salt) argument 1065 _unix_crypt(const char *pw, const char *salt, char *iobuf) argument [all...] |
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 205 CRYPTED must have a salt. */ 210 char *salt = crypted + 3; /* skip $1$ header */ local 224 saltlen = strstr (salt, "$") - salt; 228 char *end = strstr (salt, "$"); 229 if (end && end - salt < 8) 230 saltlen = end - salt; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 268 md5_update (salt, saltle [all...] |
/illumos-gate/usr/src/lib/libcrypt/common/ |
H A D | llib-lcrypt | 44 char *crypt(const char *pw, const char *salt); 66 char *des_crypt(const char *pw, const char *salt);
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 88 krb5_octet *salt; member in struct:_old_krb5_db_entry
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 77 /* Default salt len to generate PKCS#5 key */ 120 size_t passphrase_len, void *salt, size_t salt_len, CK_ULONG iterations, 139 size_t passphrase_len, void *salt, size_t salt_len, CK_KEY_TYPE key_type,
|
/illumos-gate/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 191 * was in the old salt use that, otherwise keep what was in the 192 * old salt. 245 const char *salt, 282 * Extract the puresalt (if it exists) from the existing salt string 285 saltend = strrchr(salt, '$'); 286 if (saltend == NULL || saltend == salt) { 290 size_t len = saltend - salt + 1; 294 (void) strlcpy(puresalt, salt, len); 296 puresalt = strdup(salt); 302 maxrounds += getrounds(salt); 242 crypt_genhash_impl(char *ctbuffer, size_t ctbufflen, const char *plaintext, const char *salt, const char **params) argument [all...] |