Searched refs:salt (Results 1 - 25 of 108) sorted by relevance

12345

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/loginutils/
H A Dcryptpw.c13 char salt[sizeof("$N$XXXXXXXX")]; local
16 strcpy(salt, "$1$");
18 //((uint32_t*)&salt)[0] = '$' + '1'*0x100 + '$'*0x10000;
20 crypt_make_salt(salt + 3, 4, 0); /* md5 */
22 crypt_make_salt(salt, 1, 0); /* des */
25 puts(pw_encrypt(argv[optind] ? argv[optind] : xmalloc_getline(stdin), salt));
H A Dchpasswd.c27 char salt[sizeof("$N$XXXXXXXX")]; local
47 rnd = crypt_make_salt(salt, 1, rnd);
49 strcpy(salt, "$1$");
50 rnd = crypt_make_salt(salt + 3, 4, rnd);
52 pass = pw_encrypt(pass, salt);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/libbb/
H A Dpw_encrypt.c13 char *pw_encrypt(const char *clear, const char *salt) argument
20 cipher = xstrdup(crypt(clear, salt));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/
H A Dhowl.h32 #include <salt/salt.h>
33 #include <salt/time.h>
34 #include <salt/debug.h>
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dpkcs1v2-pss.h23 const char *salt; member in struct:__anon2627::__anon2628
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt,
94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) {
98 pbe->salt->length = saltlen;
99 if (salt) memcpy (pbe->salt->data, salt, saltlen);
100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
76 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt,
94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) {
98 pbe->salt->length = saltlen;
99 if (salt) memcpy (pbe->salt->data, salt, saltlen);
100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_mutl.c72 unsigned char key[PKCS12_MAC_KEY_LENGTH], *salt; local
75 salt = p12->mac->salt->data;
76 saltlen = p12->mac->salt->length;
84 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
119 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
125 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
142 int PKCS12_setup_mac (PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
157 p12->mac->salt->length = saltlen;
158 if (!(p12->mac->salt
118 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_crpt.c92 unsigned char *salt, *pbuf; local
105 salt = pbe->salt->data;
106 saltlen = pbe->salt->length;
107 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
81 salt = p12->mac->salt->data;
82 saltlen = p12->mac->salt->length;
90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
163 p12->mac->salt->length = saltlen;
164 if (!(p12->mac->salt
124 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_crpt.c92 unsigned char *salt; local
111 salt = pbe->salt->data;
112 saltlen = pbe->salt->length;
113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/
H A DMakefile.am34 avahi_compat_howl_saltdir=$(avahi_compat_howldir)/salt
56 include/salt/socket.h \
57 include/salt/address.h \
58 include/salt/platform.h \
59 include/salt/signal.h \
60 include/salt/interface.h \
61 include/salt/salt.h \
62 include/salt/time.h \
63 include/salt/debu
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/salt/
H A Dsignal.h32 #include <salt/platform.h>
H A Dsalt.h32 #include <salt/platform.h>
33 #include <salt/time.h>
61 sw_salt salt,
71 sw_salt salt,
80 sw_salt salt,
88 sw_salt salt,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/avahi-0.6.25/avahi-compat-howl/include/corby/
H A Dorb.h32 #include <salt/salt.h>
33 #include <salt/address.h>
34 #include <salt/socket.h>
80 sw_salt salt,
94 sw_salt salt,
103 sw_salt salt,
H A Dcorby.h32 #include <salt/platform.h>
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/
H A Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; local
45 ecryptfs_to_hex(salt, auth_tok->token.password.salt,
47 salt[ECRYPTFS_SALT_SIZE * 2] = '\0';
48 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/des/
H A Dfcrypt.c27 /* Added more values to handle illegal salt values the way normal
64 char *DES_crypt(const char *buf, const char *salt) argument
69 return(DES_fcrypt(buf,salt,buff));
75 /* Copy at most 2 chars of salt */
76 if ((e_salt[0] = salt[0]) != '\0')
77 e_salt[1] = salt[1];
102 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument
122 x=ret[0]=((salt[0] == '\0')?'A':salt[0]);
124 x=ret[1]=((salt[
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/
H A Dfcrypt.c27 /* Added more values to handle illegal salt values the way normal
61 char *DES_crypt(const char *buf, const char *salt) argument
66 return(DES_fcrypt(buf,salt,buff));
72 /* Copy at most 2 chars of salt */
73 if ((e_salt[0] = salt[0]) != '\0')
74 e_salt[1] = salt[1];
99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument
119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]);
121 x=ret[1]=((salt[
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/
H A Drsa_pss.c88 * -2 salt length is autorecovered from signature
176 unsigned char *H, *salt = NULL, *p; local
183 * -2 salt length is maximized
213 salt = OPENSSL_malloc(sLen);
214 if (!salt)
220 if (!RAND_bytes(salt, sLen))
230 EVP_DigestUpdate(&ctx, salt, sLen);
248 *p++ ^= salt[i];
260 if (salt)
261 OPENSSL_free(salt);
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/
H A Dp5_crpt.c113 unsigned char *salt, *pbuf; local
125 salt = pbe->salt->data;
126 saltlen = pbe->salt->length;
134 EVP_DigestUpdate(&ctx, salt, saltlen);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Dp5_crpt.c113 unsigned char *salt; local
131 salt = pbe->salt->data;
132 saltlen = pbe->salt->length;
140 EVP_DigestUpdate(&ctx, salt, saltlen);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dkdf.c39 const void *salt, size_t saltlen,
51 && (!salt || saltlen != 8))
84 gcry_md_write (md, salt, saltlen);
89 gcry_md_write (md, salt, count);
92 gcry_md_write (md, salt, saltlen);
116 used in HMAC mode. SALT is a salt of length SALTLEN and ITERATIONS
121 const void *salt, size_t saltlen,
133 char *sbuf; /* Malloced buffer to concatenate salt and iter
141 if (!salt || !saltlen || !iterations || !dklen)
176 memcpy (sbuf, salt, saltle
37 openpgp_s2k(const void *passphrase, size_t passphraselen, int algo, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
119 pkdf2(const void *passphrase, size_t passphraselen, int hashalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
233 gcry_kdf_derive(const void *passphrase, size_t passphraselen, int algo, int subalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
[all...]

Completed in 472 milliseconds

12345