Home | History | Annotate | Download | only in x11vnc

Lines Matching full:salt

150     "         use 'noultra:...' to skip steps involving salt and IV to try to be\n"
170 " Also: cipher may be cipher@n,m where n is the salt size and m is the\n"
171 " initialization vector size. E.g. aesv2@8,16 Use n=-1 to disable salt\n"
268 static int noultra = 0; /* manage salt/iv differently from ultradsm */
269 static int nomd = 0; /* use the keydata directly, no md5 or salt */
277 /* Size of salt and IV; based on UltraVNC DSM */
278 #define SALT 16
282 /* Set default values of salt and IV */
283 static int salt_size = SALT;
374 msrc4_sc = 1; /* no salt/iv workaround */
448 * Look for user specified salt and IV sizes at the end
449 * ( ciph@salt,iv and ciph@[md+]salt,iv ):
468 if (-1 <= s && s <= SALT) {
471 fprintf(stderr, "%s: invalid salt size: %d\n",
484 if (-1 <= s && s <= SALT) {
487 fprintf(stderr, "%s: invalid salt size: %d\n",
493 /* let salt = -1 mean skip both MD5 and salt */
704 unsigned char salt[SALT+1];
715 memset(salt, 0, sizeof(salt));
751 first = 0; /* no need for salt+iv on first time */
752 salt_size = 0; /* we want no salt */
757 /* encrypter initializes the salt and initialization vector */
760 * Our salt is 16 bytes but I believe only the first 8
765 RAND_bytes(salt, salt_size);
769 memcpy(buf, salt, salt_size);
777 /* decrypter needs to read salt + iv from the wire: */
786 n = 0; /* no salt or iv, skip reading. */
800 fprintf(stderr, "%s: could not read enough for salt "
812 memcpy(salt, buf, salt_size);
839 fprintf(stderr, "%s: %s - WARNING: MSRC4 mode and IGNORING random salt\n", prog, encstr);
868 /* check salt and IV source and size. */
873 fprintf(stderr, "%s: %s - WARNING: no salt\n",
877 in_salt = salt;
893 /* special mode: no salt or md5, use keydata directly */
898 fprintf(stderr, "%s: %s - WARNING: no-md5 specified: ignoring salt & hash\n", prog, encstr);
952 /* skip sending salt+iv */
985 /* first time, copy the salt and ivec to out[] for sending */