Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:Password

2069 These hashes are provided for completeness and they still can be used for the purposes of password hashing or one-way accumulators
4763 \mysection{Password Based Cryptography}
4771 Algorithm One accepts as input a password, an 8--byte salt, and an iteration counter. The iteration counter is meant to act as delay for
4772 people trying to brute force guess the password. The higher the iteration counter the longer the delay. This algorithm also requires a hash
4777 int pkcs_5_alg1(const unsigned char *password,
4785 Where \textit{password} is the user's password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4787 on the password. The \textit{hash\_idx} is the index of the hash you wish to use in the descriptor table.
4796 from a single password and invocation of this algorithm.
4800 int pkcs_5_alg2(const unsigned char *password,
4809 Where \textit{password} is the users password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4811 on the password. The \textit{hash\_idx} is the index of the hash you wish to use in the descriptor table. The output of length up to
4816 * from a password */
4820 unsigned char password[100], salt[100],
4828 /* get users password and make up a salt ... */
4832 if ((err = pkcs_5_alg2(password, password_len, salt,