HomeSort by relevance Sort by last modified time
    Searched refs:crypted (Results 1 - 6 of 6) sorted by null

  /external/grub/stage2/
md5.h 24 If CHECK is false, crypt KEY and save the result in CRYPTED.
25 CRYPTED must have a salt. */
26 extern int md5_password (const char *key, char *crypted, int check);
29 #define check_md5_password(key,crypted) md5_password((key), (crypted), 1)
30 #define make_md5_password(key,crypted) md5_password((key), (crypted), 0)
md5.c 204 If CHECK is false, crypt KEY and save the result in CRYPTED.
205 CRYPTED must have a salt. */
207 md5_password (const char *key, char *crypted, int check)
210 char *salt = crypted + 3; /* skip $1$ header */
219 /* If our crypted password isn't 3 chars, then it can't be md5
220 crypted. So, they don't match. */
221 if (strlen(crypted) <= 3)
247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */
builtins.c 2583 char crypted[36]; local
    [all...]
  /external/openssh/openbsd-compat/
xcrypt.c 63 char *crypted; local
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
81 return crypted;
  /external/lzma/CPP/7zip/UI/Common/
Extract.cpp 194 bool crypted = false;
196 crypted = openCallback->Open_WasPasswordAsked();
199 RINOK(extractCallback->OpenResult(arcPath, result, crypted));
  /external/openssh/
sshconnect2.c 987 char prompt[256], *password, *crypted; local
996 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) {
1000 crypted = xstrdup("");
1006 debug3("%s: crypted = %s", __func__, crypted);
1009 if (hash_buffer(crypted, strlen(crypted), EVP_sha256(),
1014 bzero(crypted, strlen(crypted));
1016 xfree(crypted);
    [all...]

Completed in 78 milliseconds