/external/grub/stage2/ |
md5.h | 24 If CHECK is false, crypt KEY and save the result in CRYPTED. 25 CRYPTED must have a salt. */ 26 extern int md5_password (const char *key, char *crypted, int check); 29 #define check_md5_password(key,crypted) md5_password((key), (crypted), 1) 30 #define make_md5_password(key,crypted) md5_password((key), (crypted), 0)
|
md5.c | 204 If CHECK is false, crypt KEY and save the result in CRYPTED. 205 CRYPTED must have a salt. */ 207 md5_password (const char *key, char *crypted, int check) 210 char *salt = crypted + 3; /* skip $1$ header */ 219 /* If our crypted password isn't 3 chars, then it can't be md5 220 crypted. So, they don't match. */ 221 if (strlen(crypted) <= 3) 247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */
|
builtins.c | 2583 char crypted[36]; local [all...] |
/external/openssh/openbsd-compat/ |
xcrypt.c | 63 char *crypted; local 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt); 81 return crypted;
|
/external/openssh/ |
jpake.h | 43 BIGNUM *s; /* Secret (salted, crypted password) */
|
sshconnect2.c | 987 char prompt[256], *password, *crypted; local 996 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) { 1000 crypted = xstrdup(""); 1006 debug3("%s: crypted = %s", __func__, crypted); 1009 if (hash_buffer(crypted, strlen(crypted), EVP_sha256(), 1014 bzero(crypted, strlen(crypted)); 1016 xfree(crypted); [all...] |
/external/zlib/src/contrib/minizip/ |
miniunz.c | 203 " -p extract crypted file using password\n\n"); 262 /* display a '*' if the file is crypted */
|
/external/grub/ |
ChangeLog | [all...] |