/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_compat.c | 70 BOOL encrypted) 75 if (encrypted) { 100 BOOL encrypted = (global_encrypted_passwords_negotiated && (password_blob.length == 24 || password_blob.length > 46)); local 102 if (encrypted) { 109 if (NT_STATUS_IS_OK(pass_check_smb(smb_name, get_session_workgroup(), null_password, password_blob, null_password, encrypted))) { 112 if (NT_STATUS_IS_OK(pass_check_smb(smb_name, get_session_workgroup(), password_blob, null_password, null_password, encrypted))) { 117 if (NT_STATUS_IS_OK(pass_check_smb(smb_name, lp_workgroup(), null_password, password_blob, null_password, encrypted))) { 121 if (NT_STATUS_IS_OK(pass_check_smb(smb_name, lp_workgroup(), password_blob, null_password, null_password, encrypted))) { 125 if (NT_STATUS_IS_OK(pass_check_smb(smb_name, lp_workgroup(), null_password, null_password, password_blob, encrypted))) { 65 pass_check_smb(const char *smb_name, const char *domain, DATA_BLOB lm_pwd, DATA_BLOB nt_pwd, DATA_BLOB plaintext_password, BOOL encrypted) argument
|
H A D | auth_server.c | 247 if (user_info->encrypted) { 248 DEBUG(1,("password server %s is plaintext, but we are encrypted. This just can't work :-(\n", cli->desthost)); 337 if (!user_info->encrypted) {
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/ |
H A D | correct_password.c | 41 char *unencrypted, *encrypted; local 69 encrypted = crypt(unencrypted, correct); 71 return strcmp(encrypted, correct) == 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/ |
H A D | register.c | 113 char encrypted[16], decrypted[16]; local 135 (unsigned char *) encrypted, sizeof (encrypted), 138 assert (memcmp ((void *) plain, (void *) encrypted, sizeof (plain))); 145 (unsigned char *) encrypted, sizeof (encrypted));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | register.c | 113 char encrypted[16], decrypted[16]; local 135 (unsigned char *) encrypted, sizeof (encrypted), 138 assert (memcmp ((void *) plain, (void *) encrypted, sizeof (plain))); 145 (unsigned char *) encrypted, sizeof (encrypted));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db/ |
H A D | db_setlsn.c | 59 __env_lsn_reset(env, ip, name, encrypted) 63 int encrypted; 75 /* If configured with a password, the databases are encrypted. */ 76 if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
|
H A D | db_setid.c | 61 __env_fileid_reset(env, ip, name, encrypted) 65 int encrypted; 120 /* If configured with a password, the databases are encrypted. */ 121 if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_add.c | 159 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 180 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 181 p7->d.encrypted->enc_data->algorithm = pbe; 182 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 183 if (!(p7->d.encrypted->enc_data->enc_data = 196 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 199 p7->d.encrypted->enc_data->enc_data, 1);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/ |
H A D | crypt.h | 152 extern int encrypted; 157 (encrypted? update_keys(__G__ getc(G.in)^decrypt_byte(__G)) : getc(G.in))
|
H A D | funzip.c | 62 renamed decrypt to encrypted 105 stored. If the entry is encrypted, then the decryption password 136 #define CRPFLG 1 /* bit for encrypted entry */ 182 int encrypted; /* flag to turn on decryption */ variable 205 if (encrypted) { 403 encrypted = h[LOCFLG] & CRPFLG; 423 encrypted = h[GZPFLG] & GZPISE; 428 /* if entry encrypted, decrypt and validate encryption header */ 429 if (encrypted) 483 if (n != LG(h + LOCSIZ) - (encrypted [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/ |
H A D | crypt.h | 152 extern int encrypted; 157 (encrypted? update_keys(__G__ getc(G.in)^decrypt_byte(__G)) : getc(G.in))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/tests/fate/ |
H A D | lossless-audio.mak | 19 FATE_SAMPLES_LOSSLESS_AUDIO-$(call DEMDEC, TTA, TTA) += fate-lossless-tta-encrypted 20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypted.tta
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_add.c | 177 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 207 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 208 p7->d.encrypted->enc_data->algorithm = pbe; 209 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 210 if (!(p7->d.encrypted->enc_data->enc_data = 229 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 232 p7->d.encrypted->enc_data->enc_data, 1);
|
H A D | p12_npas.c | 127 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 177 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 207 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 208 p7->d.encrypted->enc_data->algorithm = pbe; 209 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 210 if (!(p7->d.encrypted->enc_data->enc_data = 229 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 232 p7->d.encrypted->enc_data->enc_data, 1);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | validat1.cpp | 566 const byte encrypted[] = { local 573 plain, sizeof(plain), encrypted, sizeof(encrypted)); 579 encrypted, sizeof(encrypted), plain, sizeof(plain)); 585 const byte encrypted[] = { local 592 plain, sizeof(plain), encrypted, sizeof(encrypted)); 598 encrypted, sizeof(encrypted), plai 609 const byte encrypted[] = { local 630 const byte encrypted[] = { local 651 const byte encrypted[] = { local 669 const byte encrypted[] = { local 693 const byte encrypted[] = {0x12, 0x34, 0x56}; local 712 const byte encrypted[] = { // from FIPS 81 local 736 const byte encrypted[] = { // from FIPS 81 local 756 const byte encrypted[] = { // from Eric Young's libdes local 778 const byte encrypted[] = { // generated with Crypto++ local [all...] |
H A D | datatest.cpp | 342 std::string encrypted, xorDigest, ciphertext, ciphertextXorDigest; local 343 StringSource ss(plaintext, false, new StreamTransformationFilter(*encryptor, new StringSink(encrypted), StreamTransformationFilter::NO_PADDING)); 353 assert(encrypted[i] == z[i]); 360 xorDigest.append(encrypted, 0, 64); 361 for (size_t i=64; i<encrypted.size(); i++) 362 xorDigest[i%64] ^= encrypted[i]; 364 if (test != "EncryptXorDigest" ? encrypted != ciphertext : xorDigest != ciphertextXorDigest) 366 std::cout << "incorrectly encrypted: "; 367 StringSource xx(encrypted, false, new HexEncoder(new FileSink(std::cout))); 373 StringSource dd(encrypted, fals 416 std::string encrypted, decrypted; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | rxkad.c | 688 response->encrypted.checksum = htonl(csum); 731 rxkad_sg_set_buf2(sg, &resp->encrypted, sizeof(resp->encrypted)); 732 crypto_blkcipher_encrypt_iv(&desc, sg, sg, sizeof(resp->encrypted)); 789 resp.encrypted.epoch = conn->epoch; 790 resp.encrypted.cid = conn->cid; 791 resp.encrypted.securityIndex = htonl(conn->security_ix); 792 resp.encrypted.call_id[0] = 794 resp.encrypted.call_id[1] = 796 resp.encrypted [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | auth.h | 30 BOOL encrypted; member in struct:auth_usersupplied_info
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | omadec.c | 38 * (can be encrypted using the Sony DRM!). 63 int encrypted; member in struct:OMAContext 200 oc->encrypted = 1; 201 av_log(s, AV_LOG_INFO, "File is encrypted\n"); 311 /* encrypted file */ 429 if (oc->encrypted) { 469 if (!oc->encrypted)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/java/src/com/sleepycat/db/ |
H A D | Environment.java | 1310 @param encrypted 1311 Whether the file contains encrypted databases. 1315 public void resetFileID(final String filename, boolean encrypted) argument 1318 dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); 1345 @param encrypted 1346 Whether the file contains encrypted databases. 1350 public void resetLogSequenceNumber(final String filename, boolean encrypted) argument 1353 dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/rxrpc/ |
H A D | packet.h | 141 __be32 nonce; /* encrypted random number */ 154 /* encrypted bit of the response */ 160 __be32 call_id[4]; /* encrypted call IDs */ 163 } encrypted; member in struct:rxkad_response 212 #define RXKADILLEGALLEVEL 19270412 /* caller not authorised to use encrypted conns */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | omadec.c | 38 * (can be encrypted using the Sony DRM!). 61 int encrypted; member in struct:OMAContext 182 oc->encrypted = 1; 183 av_log(s, AV_LOG_INFO, "File is encrypted\n"); 283 /* encrypted file */ 385 if (oc->encrypted) { 427 if (oc->encrypted) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_lib.c | 204 if ((p7->d.encrypted=PKCS7_ENCRYPT_new()) 206 if (!ASN1_INTEGER_set(p7->d.encrypted->version,0)) 208 p7->d.encrypted->enc_data->content_type
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | cms-examples.pl | 96 [ "7.1.bin" => "encode, encrypted, cont" ], 97 [ "7.2.bin" => "encode, encrypted, cont" ] 166 if ( $tlist =~ /encrypted/ ) {
|