Searched refs:setting (Results 1 - 9 of 9) sorted by relevance

/seL4-test-master/projects/musllibc/src/crypt/
H A Dcrypt_blowfish.c599 static char *BF_crypt(const char *key, const char *setting, argument
616 if (setting[0] != '$' ||
617 setting[1] != '2' ||
618 setting[2] - 'a' > 25U ||
619 !flags_by_subtype[setting[2] - 'a'] ||
620 setting[3] != '$' ||
621 setting[4] - '0' > 1U ||
622 setting[5] - '0' > 9U ||
623 setting[6] != '$') {
627 count = (BF_word)1 << ((setting[
745 __crypt_blowfish(const char *key, const char *setting, char *output) argument
[all...]
H A Dcrypt_md5.c197 static char *md5crypt(const char *key, const char *setting, char *output) argument
210 /* setting: $1$salt$ (closing $ is optional) */
211 if (strncmp(setting, "$1$", 3) != 0)
213 salt = setting + 3;
227 md5_update(&ctx, setting, 3 + slen);
258 memcpy(output, setting, 3 + slen);
271 char *__crypt_md5(const char *key, const char *setting, char *output) argument
279 p = md5crypt(key, setting, output);
H A Dcrypt_des.c880 const unsigned char *setting = (const unsigned char *)_setting; local
899 if (*setting == _PASSWORD_EFMT1) {
902 * setting - underscore, 4 chars of count, 4 chars of salt
906 uint32_t value = ascii_to_bin(setting[i]);
907 if (ascii64[value] != setting[i])
915 uint32_t value = ascii_to_bin(setting[i]);
916 if (ascii64[value] != setting[i])
935 memcpy(output, setting, 9);
941 * setting - 2 chars of salt
946 if (ascii_is_unsafe(setting[
986 __crypt_des(const char *key, const char *setting, char *output) argument
[all...]
H A Dcrypt_sha256.c7 * in the salt and rounds= setting must contain a valid iteration count,
187 static char *sha256crypt(const char *key, const char *setting, char *output) argument
201 /* setting: $5$rounds=n$salt$ (rounds=n$ and closing $ are optional) */
202 if (strncmp(setting, "$5$", 3) != 0)
204 salt = setting + 3;
213 * bad rounds setting is rejected if it is
308 char *__crypt_sha256(const char *key, const char *setting, char *output) argument
316 p = sha256crypt(key, setting, output);
H A Dcrypt_sha512.c7 * in the salt and rounds= setting must contain a valid iteration count,
208 static char *sha512crypt(const char *key, const char *setting, char *output) argument
223 /* setting: $6$rounds=n$salt$ (rounds=n$ and closing $ are optional) */
224 if (strncmp(setting, "$6$", 3) != 0)
226 salt = setting + 3;
235 * bad rounds setting is rejected if it is
357 char *__crypt_sha512(const char *key, const char *setting, char *output) argument
365 p = sha512crypt(key, setting, output);
/seL4-test-master/kernel/src/arch/x86/32/
H A Dhead.S30 # Enable paging by setting bit 31 of CR0
/seL4-test-master/kernel/manual/parts/
H A Dnotifications.tex41 invoker blocks. Else, the call returns immediately, setting the
H A Dthreads.tex43 is configured by setting its CSpace and VSpace with the
47 pointer. The thread can then be activated either by setting the
514 an instruction breakpoint, to use when setting up the single-stepping
/seL4-test-master/kernel/src/arch/x86/64/
H A Dtraps.S511 * setting EFLAGS.TF before SYSEXIT so that single-stepping resumes in the

Completed in 121 milliseconds