| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
| H A D | crypto_scrypt-common.c | 146 size_t saltlen; in escrypt_r() local 163 saltlen = src - salt; in escrypt_r() 165 saltlen = strlen((char *) salt); in escrypt_r() 167 need = prefixlen + saltlen + 1 + in escrypt_r() 169 if (need > buflen || need < saltlen) { in escrypt_r() 183 memcpy(dst, setting, prefixlen + saltlen); in escrypt_r() 184 dst += prefixlen + saltlen; in escrypt_r() 204 size_t saltlen = BYTES2CHARS(srclen); in escrypt_gensalt_r() local 207 need = prefixlen + saltlen + 1; in escrypt_gensalt_r() 208 if (need > buflen || need < saltlen || saltlen < srclen) { in escrypt_gensalt_r() [all …]
|
| H A D | pbkdf2-sha256.c | 48 size_t saltlen, uint64_t c, uint8_t *buf, size_t dkLen) in PBKDF2_SHA256() argument 67 crypto_auth_hmacsha256_update(&PShctx, salt, saltlen); in PBKDF2_SHA256()
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
| H A D | argon2.c | 88 const void *salt, const size_t saltlen, void *hash, in argon2_hash() argument 104 if (saltlen > ARGON2_MAX_SALT_LENGTH) { in argon2_hash() 118 context.saltlen = (uint32_t) saltlen; in argon2_hash() 162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument 165 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_encoded() 172 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2i_hash_raw() argument 175 return argon2_hash(t_cost, m_cost, parallelism, pwd, pwdlen, salt, saltlen, in argon2i_hash_raw() 193 const size_t pwdlen, const void *salt, const size_t saltlen, in argon2id_hash_raw() argument 223 ctx.saltlen = (uint32_t) encoded_len; in argon2_verify() 227 ctx.salt = (uint8_t *) malloc(ctx.saltlen); in argon2_verify() [all …]
|
| H A D | argon2.h | 171 uint32_t saltlen; /* salt length */ member 215 const size_t saltlen, const size_t hashlen, 236 const size_t saltlen, const size_t hashlen, 256 const size_t saltlen, void *hash, const size_t hashlen); 275 const size_t saltlen, void *hash, const size_t hashlen); 280 const size_t pwdlen, const void *salt, const size_t saltlen,
|
| H A D | argon2-encoding.c | 155 size_t maxsaltlen = ctx->saltlen; in decode_string() 160 ctx->saltlen = 0; in decode_string() 193 BIN(ctx->salt, maxsaltlen, ctx->saltlen); in decode_string() 296 SB(ctx->salt, ctx->saltlen); in encode_string()
|
| H A D | argon2-core.c | 280 if (0 != context->saltlen) { in validate_inputs() 285 if (ARGON2_MIN_SALT_LENGTH > context->saltlen) { in validate_inputs() 289 if (ARGON2_MAX_SALT_LENGTH < context->saltlen) { in validate_inputs() 437 STORE32_LE(value, context->saltlen); in initial_hash() 442 &BlakeHash, (const uint8_t *) context->salt, context->saltlen); in initial_hash()
|
| H A D | pwhash_argon2i.c | 261 ctx.outlen = ctx.pwdlen = ctx.saltlen = (uint32_t) fodder_len; in _needs_rehash()
|
| /f-stack/app/nginx-1.16.1/src/core/ |
| H A D | ngx_crypt.c | 57 size_t saltlen, keylen; in ngx_crypt_apr1() local 69 saltlen = p - salt; in ngx_crypt_apr1() 76 ngx_md5_update(&md5, salt, saltlen); in ngx_crypt_apr1() 80 ngx_md5_update(&ctx1, salt, saltlen); in ngx_crypt_apr1() 112 ngx_md5_update(&ctx1, salt, saltlen); in ngx_crypt_apr1() 131 *encrypted = ngx_pnalloc(pool, sizeof("$apr1$") - 1 + saltlen + 1 + 22 + 1); in ngx_crypt_apr1() 137 p = ngx_copy(p, salt, saltlen); in ngx_crypt_apr1()
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/include/sodium/ |
| H A D | crypto_pwhash_scryptsalsa208sha256.h | 105 const uint8_t * salt, size_t saltlen,
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/ |
| H A D | pwhash_scryptsalsa208sha256_nosse.c | 294 size_t passwdlen, const uint8_t *salt, size_t saltlen, in escrypt_kdf_nosse() argument 363 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size); in escrypt_kdf_nosse()
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/ |
| H A D | pwhash_scryptsalsa208sha256_sse.c | 310 const uint8_t *salt, size_t saltlen, uint64_t N, uint32_t _r, in escrypt_kdf_sse() argument 386 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size); in escrypt_kdf_sse()
|