Home | History | Annotate | Download | only in openssh

Lines Matching refs:salt

63  * anyway because they will mismatch on fake salt.
120 /* Returns 1 if 'c' is a valid crypt(3) salt character, 0 otherwise */
134 * Derive fake salt as H(username || first_private_host_key)
185 /* ASCII an integer [0, 64) for inclusion in a password/salt */
194 /* Generate ASCII salt bytes for user */
216 * a stable fake salt under it for use by a non-existent account.
220 fake_salt_and_scheme(Authctxt *authctxt, char **salt, char **scheme)
240 xasprintf(salt, "$1$%s$", makesalt(8, authctxt->user));
243 *salt = xstrdup(makesalt(2, authctxt->user));
248 xasprintf(salt, "_%c%c%c%c%s",
257 xasprintf(salt, "$2a$%02lld$%s", rounds,
262 debug3("%s: fake %s salt for user %s: %s",
263 __func__, *scheme, authctxt->user, *salt);
267 * Fetch password hashing scheme, password salt and derive shared secret
269 * salt will be returned.
273 char **hash_scheme, char **salt)
284 *salt = NULL;
291 * "$2$", 2 digit rounds, "$", 22 bytes salt
294 *salt = xmalloc(salt_len);
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
301 * "$2a$", 2 digit rounds, "$", 22 bytes salt
304 *salt = xmalloc(salt_len);
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
311 * "$1$", salt until "$"
316 *salt = xmalloc(salt_len);
317 strlcpy(*salt, authctxt->pw->pw_passwd,
325 * "_", 4 digits count, 4 chars salt
328 *salt = xmalloc(salt_len);
329 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
336 * 2 chars salt
339 *salt = xmalloc(salt_len);
340 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
343 if (*salt == NULL) {
348 if (*salt == NULL)
349 fake_salt_and_scheme(authctxt, salt, hash_scheme);
358 debug3("%s: salt = %s (len %u)", __func__,
359 *salt, (u_int)strlen(*salt));
377 char *salt, *hash_scheme;
388 &hash_scheme, &salt));
395 packet_put_cstring(salt);
405 bzero(salt, strlen(salt));
407 xfree(salt);