/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/loginutils/ |
H A D | cryptpw.c | 13 char salt[sizeof("$N$XXXXXXXX")]; local 16 strcpy(salt, "$1$"); 18 //((uint32_t*)&salt)[0] = '$' + '1'*0x100 + '$'*0x10000; 20 crypt_make_salt(salt + 3, 4, 0); /* md5 */ 22 crypt_make_salt(salt, 1, 0); /* des */ 25 puts(pw_encrypt(argv[optind] ? argv[optind] : xmalloc_getline(stdin), salt));
|
H A D | chpasswd.c | 27 char salt[sizeof("$N$XXXXXXXX")]; local 47 rnd = crypt_make_salt(salt, 1, rnd); 49 strcpy(salt, "$1$"); 50 rnd = crypt_make_salt(salt + 3, 4, rnd); 52 pass = pw_encrypt(pass, salt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/libbb/ |
H A D | pw_encrypt.c | 13 char *pw_encrypt(const char *clear, const char *salt) argument 20 cipher = xstrdup(crypt(clear, salt));
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/ |
H A D | howl.h | 32 #include <salt/salt.h> 33 #include <salt/time.h> 34 #include <salt/debug.h>
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | pkcs1v2-pss.h | 23 const char *salt; member in struct:__anon2653::__anon2654
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, 94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) { 98 pbe->salt->length = saltlen; 99 if (salt) memcpy (pbe->salt->data, salt, saltlen); 100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, 94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) { 98 pbe->salt->length = saltlen; 99 if (salt) memcpy (pbe->salt->data, salt, saltlen); 100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 72 unsigned char key[PKCS12_MAC_KEY_LENGTH], *salt; local 75 salt = p12->mac->salt->data; 76 saltlen = p12->mac->salt->length; 84 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 119 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 125 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 142 int PKCS12_setup_mac (PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 157 p12->mac->salt->length = saltlen; 158 if (!(p12->mac->salt 118 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_crpt.c | 92 unsigned char *salt, *pbuf; local 105 salt = pbe->salt->data; 106 saltlen = pbe->salt->length; 107 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 81 salt = p12->mac->salt->data; 82 saltlen = p12->mac->salt->length; 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 163 p12->mac->salt->length = saltlen; 164 if (!(p12->mac->salt 124 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_crpt.c | 92 unsigned char *salt; local 111 salt = pbe->salt->data; 112 saltlen = pbe->salt->length; 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/ |
H A D | Makefile.am | 34 avahi_compat_howl_saltdir=$(avahi_compat_howldir)/salt 56 include/salt/socket.h \ 57 include/salt/address.h \ 58 include/salt/platform.h \ 59 include/salt/signal.h \ 60 include/salt/interface.h \ 61 include/salt/salt.h \ 62 include/salt/time.h \ 63 include/salt/debu [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/salt/ |
H A D | signal.h | 32 #include <salt/platform.h>
|
H A D | salt.h | 32 #include <salt/platform.h> 33 #include <salt/time.h> 61 sw_salt salt, 71 sw_salt salt, 80 sw_salt salt, 88 sw_salt salt,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/corby/ |
H A D | orb.h | 32 #include <salt/salt.h> 33 #include <salt/address.h> 34 #include <salt/socket.h> 80 sw_salt salt, 94 sw_salt salt, 103 sw_salt salt,
|
H A D | corby.h | 32 #include <salt/platform.h>
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; local 45 ecryptfs_to_hex(salt, auth_tok->token.password.salt, 47 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; 48 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/des/ |
H A D | fcrypt.c | 27 /* Added more values to handle illegal salt values the way normal 64 char *DES_crypt(const char *buf, const char *salt) argument 69 return(DES_fcrypt(buf,salt,buff)); 75 /* Copy at most 2 chars of salt */ 76 if ((e_salt[0] = salt[0]) != '\0') 77 e_salt[1] = salt[1]; 102 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument 122 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); 124 x=ret[1]=((salt[ [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/ |
H A D | fcrypt.c | 27 /* Added more values to handle illegal salt values the way normal 61 char *DES_crypt(const char *buf, const char *salt) argument 66 return(DES_fcrypt(buf,salt,buff)); 72 /* Copy at most 2 chars of salt */ 73 if ((e_salt[0] = salt[0]) != '\0') 74 e_salt[1] = salt[1]; 99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument 119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); 121 x=ret[1]=((salt[ [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/ |
H A D | rsa_pss.c | 88 * -2 salt length is autorecovered from signature 176 unsigned char *H, *salt = NULL, *p; local 183 * -2 salt length is maximized 213 salt = OPENSSL_malloc(sLen); 214 if (!salt) 220 if (!RAND_bytes(salt, sLen)) 230 EVP_DigestUpdate(&ctx, salt, sLen); 248 *p++ ^= salt[i]; 260 if (salt) 261 OPENSSL_free(salt); [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/evp/ |
H A D | p5_crpt.c | 113 unsigned char *salt, *pbuf; local 125 salt = pbe->salt->data; 126 saltlen = pbe->salt->length; 134 EVP_DigestUpdate(&ctx, salt, saltlen);
|
H A D | p5_crpt2.c | 80 unsigned char *salt, int saltlen, int iter, 104 HMAC_Update(&hctx, salt, saltlen); 122 h__dump (salt, saltlen); 134 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 135 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 151 unsigned char *pbuf, *salt, key[EVP_MAX_KEY_LENGTH]; local 222 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 229 salt = kdf->salt->value.octet_string->data; 230 saltlen = kdf->salt 79 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p5_crpt.c | 113 unsigned char *salt; local 131 salt = pbe->salt->data; 132 saltlen = pbe->salt->length; 140 EVP_DigestUpdate(&ctx, salt, saltlen);
|