/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 104 HMAC_Update(&hctx, salt, saltlen); 122 h__dump (salt, saltlen); 134 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 135 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 151 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 234 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 241 salt = kdf->salt->value.octet_string->data; 242 saltlen = kdf->salt 79 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |
H A D | evp_key.c | 111 const unsigned char *salt, const unsigned char *data, int datal, 134 if (salt != NULL) 135 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); 110 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | kdf.c | 39 const void *salt, size_t saltlen, 51 && (!salt || saltlen != 8)) 84 gcry_md_write (md, salt, saltlen); 89 gcry_md_write (md, salt, count); 92 gcry_md_write (md, salt, saltlen); 116 used in HMAC mode. SALT is a salt of length SALTLEN and ITERATIONS 121 const void *salt, size_t saltlen, 133 char *sbuf; /* Malloced buffer to concatenate salt and iter 141 if (!salt || !saltlen || !iterations || !dklen) 176 memcpy (sbuf, salt, saltle 37 openpgp_s2k(const void *passphrase, size_t passphraselen, int algo, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument 119 pkdf2(const void *passphrase, size_t passphraselen, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument 233 gcry_kdf_derive(const void *passphrase, size_t passphraselen, int algo, int subalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/loginutils/ |
H A D | passwd.c | 17 char salt[sizeof("$N$XXXXXXXX")]; /* "$N$XXXXXXXX" or "XX" */ local 25 crypt_make_salt(salt, 1, 0); /* des */ 27 strcpy(salt, "$1$"); 28 crypt_make_salt(salt + 3, 4, 0); 31 ret = xstrdup(pw_encrypt(newp, salt)); 48 char salt[sizeof("$N$XXXXXXXX")]; /* "$N$XXXXXXXX" or "XX" */ local 85 crypt_make_salt(salt, 1, 0); /* des */ 87 strcpy(salt, "$1$"); 88 crypt_make_salt(salt + 3, 4, 0); 91 ret = xstrdup(pw_encrypt(newp, salt)); [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 88 unsigned char *salt, int saltlen) 138 if (salt) memcpy (osalt->data, salt, saltlen); 144 /* Now include salt in kdf structure */ 145 kdf->salt->value.octet_string = osalt; 146 kdf->salt->type = V_ASN1_OCTET_STRING;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 88 unsigned char *salt, int saltlen) 138 if (salt) memcpy (osalt->data, salt, saltlen); 144 /* Now include salt in kdf structure */ 145 kdf->salt->value.octet_string = osalt; 146 kdf->salt->type = V_ASN1_OCTET_STRING;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/corby/ |
H A D | channel.h | 32 #include <salt/salt.h> 33 #include <salt/socket.h> 121 sw_salt * salt,
|
H A D | object.h | 32 #include <salt/salt.h>
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/discovery/ |
H A D | text_record.h | 32 #include <salt/salt.h>
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/salt/ |
H A D | address.h | 33 #include <salt/salt.h>
|
H A D | time.h | 32 #include <salt/platform.h>
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon1413 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
H A D | p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 158 unsigned char *salt, int saltlen, int iter, 172 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) { 104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument 157 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/include/openssl/ |
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon1473 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | enc.c | 114 unsigned char salt[PKCS5_SALT_LEN]; local 188 else if (strcmp(*argv,"-salt") == 0) 469 * line, so we get no salt in that case. Is this a bug? 473 /* Salt handling: if encrypting generate a salt and 474 * write to output BIO. If decrypting read salt from 482 if(!set_hex(hsalt,salt,sizeof salt)) { 484 "invalid hex salt value\n"); 487 } else if (RAND_pseudo_bytes(salt, sizeof salt) < [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/ |
H A D | enc.c | 114 unsigned char salt[PKCS5_SALT_LEN]; local 189 else if (strcmp(*argv,"-salt") == 0) 469 * line, so we get no salt in that case. Is this a bug? 473 /* Salt handling: if encrypting generate a salt and 474 * write to output BIO. If decrypting read salt from 482 if(!set_hex(hsalt,salt,sizeof salt)) { 484 "invalid hex salt value\n"); 487 } else if (RAND_pseudo_bytes(salt, sizeof salt) < [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/evp/ |
H A D | evp_key.c | 111 const unsigned char *salt, const unsigned char *data, int datal, 133 if (salt != NULL) 134 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); 110 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const unsigned char *salt, const unsigned char *data, int datal, int count, unsigned char *key, unsigned char *iv) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/ |
H A D | Makefile | 120 include/discovery/text_record.h include/salt/socket.h \ 121 include/salt/address.h include/salt/platform.h \ 122 include/salt/signal.h include/salt/interface.h \ 123 include/salt/salt.h include/salt/time.h include/salt/debug.h \ 152 include/discovery/text_record.h include/salt/socke [all...] |
H A D | Makefile.in | 120 include/discovery/text_record.h include/salt/socket.h \ 121 include/salt/address.h include/salt/platform.h \ 122 include/salt/signal.h include/salt/interface.h \ 123 include/salt/salt.h include/salt/time.h include/salt/debug.h \ 152 include/discovery/text_record.h include/salt/socke [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 162 unsigned char *salt, int saltlen, int iter, 176 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) { 104 PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8) argument 161 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) argument
|
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon2911 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon2982 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/ |
H A D | smbldap-passwd | 270 my $salt = sprintf($crypt_salt_format,make_salt()); 271 $hash_pass = "{CRYPT}" . crypt($clear_pass,$salt); 278 # Generate SMD5 hash (MD5 with salt) 279 my $salt = make_salt(4); 280 $hash_pass = "{SMD5}" . encode_base64( md5($clear_pass . $salt) . $salt,''); 287 # Generate SSHA hash (SHA1 with salt) 288 my $salt = make_salt(4); 289 $hash_pass = "{SSHA}" . encode_base64( sha1($clear_pass . $salt) . $salt,'' ); [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/des/ |
H A D | des_old.c | 188 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument 190 return DES_fcrypt(buf, salt, ret); 192 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument 194 return DES_crypt(buf, salt); 196 char *_ossl_old_crypt(const char *buf,const char *salt) argument 198 return DES_crypt(buf, salt);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/ |
H A D | des_old.c | 188 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) argument 190 return DES_fcrypt(buf, salt, ret); 192 char *_ossl_old_des_crypt(const char *buf,const char *salt) argument 194 return DES_crypt(buf, salt); 196 char *_ossl_old_crypt(const char *buf,const char *salt) argument 198 return DES_crypt(buf, salt);
|