Searched refs:setting (Results 1 - 9 of 9) sorted by relevance
/seL4-test-master/projects/musllibc/src/crypt/ |
H A D | crypt_blowfish.c | 599 static char *BF_crypt(const char *key, const char *setting, argument 616 if (setting[0] != '$' || 617 setting[1] != '2' || 618 setting[2] - 'a' > 25U || 619 !flags_by_subtype[setting[2] - 'a'] || 620 setting[3] != '$' || 621 setting[4] - '0' > 1U || 622 setting[5] - '0' > 9U || 623 setting[6] != '$') { 627 count = (BF_word)1 << ((setting[ 745 __crypt_blowfish(const char *key, const char *setting, char *output) argument [all...] |
H A D | crypt_md5.c | 197 static char *md5crypt(const char *key, const char *setting, char *output) argument 210 /* setting: $1$salt$ (closing $ is optional) */ 211 if (strncmp(setting, "$1$", 3) != 0) 213 salt = setting + 3; 227 md5_update(&ctx, setting, 3 + slen); 258 memcpy(output, setting, 3 + slen); 271 char *__crypt_md5(const char *key, const char *setting, char *output) argument 279 p = md5crypt(key, setting, output);
|
H A D | crypt_des.c | 880 const unsigned char *setting = (const unsigned char *)_setting; local 899 if (*setting == _PASSWORD_EFMT1) { 902 * setting - underscore, 4 chars of count, 4 chars of salt 906 uint32_t value = ascii_to_bin(setting[i]); 907 if (ascii64[value] != setting[i]) 915 uint32_t value = ascii_to_bin(setting[i]); 916 if (ascii64[value] != setting[i]) 935 memcpy(output, setting, 9); 941 * setting - 2 chars of salt 946 if (ascii_is_unsafe(setting[ 986 __crypt_des(const char *key, const char *setting, char *output) argument [all...] |
H A D | crypt_sha256.c | 7 * in the salt and rounds= setting must contain a valid iteration count, 187 static char *sha256crypt(const char *key, const char *setting, char *output) argument 201 /* setting: $5$rounds=n$salt$ (rounds=n$ and closing $ are optional) */ 202 if (strncmp(setting, "$5$", 3) != 0) 204 salt = setting + 3; 213 * bad rounds setting is rejected if it is 308 char *__crypt_sha256(const char *key, const char *setting, char *output) argument 316 p = sha256crypt(key, setting, output);
|
H A D | crypt_sha512.c | 7 * in the salt and rounds= setting must contain a valid iteration count, 208 static char *sha512crypt(const char *key, const char *setting, char *output) argument 223 /* setting: $6$rounds=n$salt$ (rounds=n$ and closing $ are optional) */ 224 if (strncmp(setting, "$6$", 3) != 0) 226 salt = setting + 3; 235 * bad rounds setting is rejected if it is 357 char *__crypt_sha512(const char *key, const char *setting, char *output) argument 365 p = sha512crypt(key, setting, output);
|
/seL4-test-master/kernel/src/arch/x86/32/ |
H A D | head.S | 30 # Enable paging by setting bit 31 of CR0
|
/seL4-test-master/kernel/manual/parts/ |
H A D | notifications.tex | 41 invoker blocks. Else, the call returns immediately, setting the
|
H A D | threads.tex | 43 is configured by setting its CSpace and VSpace with the 47 pointer. The thread can then be activated either by setting the 514 an instruction breakpoint, to use when setting up the single-stepping
|
/seL4-test-master/kernel/src/arch/x86/64/ |
H A D | traps.S | 511 * setting EFLAGS.TF before SYSEXIT so that single-stepping resumes in the
|
Completed in 121 milliseconds