Searched refs:salt (Results 1 - 25 of 505) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/avahi-0.6.31/avahi-compat-howl/include/
H A Dhowl.h32 #include <salt/salt.h>
33 #include <salt/time.h>
34 #include <salt/debug.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/avahi-0.6.31/avahi-compat-howl/include/
H A Dhowl.h32 #include <salt/salt.h>
33 #include <salt/time.h>
34 #include <salt/debug.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/avahi-0.6.31/avahi-compat-howl/include/
H A Dhowl.h32 #include <salt/salt.h>
33 #include <salt/time.h>
34 #include <salt/debug.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/busybox/libbb/
H A Dpw_encrypt.c81 static char *my_crypt(const char *key, const char *salt) argument
84 if (salt[0] == '$' && salt[1] && salt[2] == '$') {
85 if (salt[1] == '1')
86 return md5_crypt(xzalloc(MD5_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
88 if (salt[1] == '5' || salt[1] == '6')
89 return sha_crypt((char*)key, (char*)salt);
96 return des_crypt(des_ctx, xzalloc(DES_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
108 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
122 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
[all...]
H A Dpw_encrypt_md5.c76 md5_crypt(char result[MD5_OUT_BUFSIZE], const unsigned char *pw, const unsigned char *salt) argument
83 /* NB: in busybox, "$1$" in salt is always present */
87 /* Get the length of the salt including "$1$" */
89 while (salt[sl] && salt[sl] != '$' && sl < (3 + 8))
97 /* Then the salt including "$1$" */
98 md5_hash(salt, sl, &ctx);
100 /* Copy salt to result; skip "$1$" */
101 memcpy(result, salt, sl);
103 salt
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/busybox/libbb/
H A Dpw_encrypt.c81 static char *my_crypt(const char *key, const char *salt) argument
84 if (salt[0] == '$' && salt[1] && salt[2] == '$') {
85 if (salt[1] == '1')
86 return md5_crypt(xzalloc(MD5_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
88 if (salt[1] == '5' || salt[1] == '6')
89 return sha_crypt((char*)key, (char*)salt);
96 return des_crypt(des_ctx, xzalloc(DES_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
108 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
122 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/busybox/libbb/
H A Dpw_encrypt.c81 static char *my_crypt(const char *key, const char *salt) argument
84 if (salt[0] == '$' && salt[1] && salt[2] == '$') {
85 if (salt[1] == '1')
86 return md5_crypt(xzalloc(MD5_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
88 if (salt[1] == '5' || salt[1] == '6')
89 return sha_crypt((char*)key, (char*)salt);
96 return des_crypt(des_ctx, xzalloc(DES_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
108 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
122 pw_encrypt(const char *clear, const char *salt, int cleanup) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/hdb/
H A Dkeys.c49 if (keys[i].salt != NULL) {
50 free_Salt(keys[i].salt);
51 free(keys[i].salt);
52 keys[i].salt = NULL;
61 * of etype:salttype:salt, syntax of this if something like:
62 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it
65 * v5 == pw-salt, and
66 * v4 == des:pw-salt:
67 * afs or afs3 == des:afs3-salt
85 krb5_salt *salt, krb5_principa
83 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument
200 add_enctype_to_key_set(Key **key_set, size_t *nkeyset, krb5_enctype enctype, krb5_salt *salt) argument
279 krb5_salt salt; local
375 krb5_salt salt; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/hdb/
H A Dkeys.c49 if (keys[i].salt != NULL) {
50 free_Salt(keys[i].salt);
51 free(keys[i].salt);
52 keys[i].salt = NULL;
61 * of etype:salttype:salt, syntax of this if something like:
62 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it
65 * v5 == pw-salt, and
66 * v4 == des:pw-salt:
67 * afs or afs3 == des:afs3-salt
85 krb5_salt *salt, krb5_principa
83 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument
200 add_enctype_to_key_set(Key **key_set, size_t *nkeyset, krb5_enctype enctype, krb5_salt *salt) argument
279 krb5_salt salt; local
375 krb5_salt salt; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/hdb/
H A Dkeys.c49 if (keys[i].salt != NULL) {
50 free_Salt(keys[i].salt);
51 free(keys[i].salt);
52 keys[i].salt = NULL;
61 * of etype:salttype:salt, syntax of this if something like:
62 * [(des|des3|etype):](pw-salt|afs3)[:string], if etype is omitted it
65 * v5 == pw-salt, and
66 * v4 == des:pw-salt:
67 * afs or afs3 == des:afs3-salt
85 krb5_salt *salt, krb5_principa
83 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument
200 add_enctype_to_key_set(Key **key_set, size_t *nkeyset, krb5_enctype enctype, krb5_salt *salt) argument
279 krb5_salt salt; local
375 krb5_salt salt; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/libgcrypt-1.5.1/tests/
H A Dpkcs1v2-pss.h23 const char *salt; member in struct:__anon5037::__anon5038
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/libgcrypt-1.5.1/tests/
H A Dpkcs1v2-pss.h23 const char *salt; member in struct:__anon4132::__anon4133
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/libgcrypt-1.5.1/tests/
H A Dpkcs1v2-pss.h23 const char *salt; member in struct:__anon39062::__anon39063
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/tests/
H A Dcrypttest.c18 char salt[9]; local
26 strcpy(salt, "12345678");
28 strcpy(c_out1, crypt(passwd, salt));
29 salt[2] = '\0';
30 strcpy(c_out2, crypt(passwd, salt));
33 * If the non-trucated salt fails but the
34 * truncated salt succeeds then exit 1.
62 * If the non-trucated salt fails but the
63 * truncated salt succeeds then exit 1.
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/busybox/loginutils/
H A Dcryptpw.c23 -S, --salt=STRING
24 Use the STRING as salt. It must not contain prefixes such as
57 char salt[3 + 16 + 1]; local
67 "salt\0" Required_argument "S"
86 salt_ptr = salt;
94 salt[1] = '5' + (strcmp(opt_m, "sha512") == 0);
100 safe_strncpy(salt_ptr, opt_S, sizeof(salt) - 3);
114 salt, 1));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/busybox/loginutils/
H A Dcryptpw.c23 -S, --salt=STRING
24 Use the STRING as salt. It must not contain prefixes such as
57 char salt[3 + 16 + 1]; local
67 "salt\0" Required_argument "S"
86 salt_ptr = salt;
94 salt[1] = '5' + (strcmp(opt_m, "sha512") == 0);
100 safe_strncpy(salt_ptr, opt_S, sizeof(salt) - 3);
114 salt, 1));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/tests/
H A Dcrypttest.c18 char salt[9]; local
26 strcpy(salt, "12345678");
28 strcpy(c_out1, crypt(passwd, salt));
29 salt[2] = '\0';
30 strcpy(c_out2, crypt(passwd, salt));
33 * If the non-trucated salt fails but the
34 * truncated salt succeeds then exit 1.
62 * If the non-trucated salt fails but the
63 * truncated salt succeeds then exit 1.
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/busybox/loginutils/
H A Dcryptpw.c23 -S, --salt=STRING
24 Use the STRING as salt. It must not contain prefixes such as
57 char salt[3 + 16 + 1]; local
67 "salt\0" Required_argument "S"
86 salt_ptr = salt;
94 salt[1] = '5' + (strcmp(opt_m, "sha512") == 0);
100 safe_strncpy(salt_ptr, opt_S, sizeof(salt) - 3);
114 salt, 1));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/tests/
H A Dcrypttest.c18 char salt[9]; local
26 strcpy(salt, "12345678");
28 strcpy(c_out1, crypt(passwd, salt));
29 salt[2] = '\0';
30 strcpy(c_out2, crypt(passwd, salt));
33 * If the non-trucated salt fails but the
34 * truncated salt succeeds then exit 1.
62 * If the non-trucated salt fails but the
63 * truncated salt succeeds then exit 1.
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/asn1/
H A Dp5_pbe.c69 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
97 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) {
101 sstr = ASN1_STRING_data(pbe->salt);
102 if (salt)
103 memcpy(sstr, salt, saltlen);
129 const unsigned char *salt, int saltlen)
138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/asn1/
H A Dp5_pbe.c69 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
97 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) {
101 sstr = ASN1_STRING_data(pbe->salt);
102 if (salt)
103 memcpy(sstr, salt, saltlen);
129 const unsigned char *salt, int saltlen)
138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/asn1/
H A Dp5_pbe.c69 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
97 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) {
101 sstr = ASN1_STRING_data(pbe->salt);
102 if (salt)
103 memcpy(sstr, salt, saltlen);
129 const unsigned char *salt, int saltlen)
138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))

Completed in 228 milliseconds

1234567891011>>