/dports/net/openradius/openradius-0.9.12c/tools/ |
H A D | genmd5hexpasswd | 19 SALT=`expr substr ${2}ABCD 1 4` 22 SALT=`tempfile` ; rm -f $SALT 23 SALT=`expr substr \( quote ABCD${SALT} \) \( \( length \( quote ABCD${SALT} \) \) - 3 \) 4` 26 echo "Md5-Hex-Password: ${SALT}\$"`echo -n ${CLEAR}${SALT} | md5sum`
|
/dports/dns/bind916/bind-9.16.27/bin/tests/system/nsec3/ |
H A D | tests.sh | 47 SALT="" 53 …grep "${ZONE}\..*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.wait" > /dev/null |… 119 …grep "${ZONE}.*0.*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nsec3param.$ZONE" … 121 if [ -z "$SALT" ]; then 122 SALT=`awk '$4 == "NSEC3PARAM" { print $8 }' dig.out.test$n.nsec3param.$ZONE` 130 …grep ".*\.${ZONE}.*IN.*NSEC3.*1.${FLAGS}.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nxdomain.$ZONE" … 144 …echo_i "check NXDOMAIN response has correct NSEC3 1 ${FLAGS} ${ITERATIONS} ${SALT} for zone ${ZONE… 320 prevsalt="${SALT}" 323 SALT="${prevsalt}" 324 echo_i "check zone ${ZONE} after restart has salt ${SALT}"
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/system/nsec3/ |
H A D | tests.sh | 47 SALT="" 53 …grep "${ZONE}\..*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.wait" > /dev/null |… 119 …grep "${ZONE}.*0.*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nsec3param.$ZONE" … 121 if [ -z "$SALT" ]; then 122 SALT=`awk '$4 == "NSEC3PARAM" { print $8 }' dig.out.test$n.nsec3param.$ZONE` 130 …grep ".*\.${ZONE}.*IN.*NSEC3.*1.${FLAGS}.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nxdomain.$ZONE" … 144 …echo_i "check NXDOMAIN response has correct NSEC3 1 ${FLAGS} ${ITERATIONS} ${SALT} for zone ${ZONE… 320 prevsalt="${SALT}" 323 SALT="${prevsalt}" 324 echo_i "check zone ${ZONE} after restart has salt ${SALT}"
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/bin/tests/system/nsec3/ |
H A D | tests.sh | 45 SALT="" 51 …grep "${ZONE}\..*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.wait" > /dev/null |… 117 …grep "${ZONE}.*0.*IN.*NSEC3PARAM.*1.*0.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nsec3param.$ZONE" … 119 if [ -z "$SALT" ]; then 120 SALT=`awk '$4 == "NSEC3PARAM" { print $8 }' dig.out.test$n.nsec3param.$ZONE` 128 …grep ".*\.${ZONE}.*IN.*NSEC3.*1.${FLAGS}.*${ITERATIONS}.*${SALT}" "dig.out.test$n.nxdomain.$ZONE" … 142 …echo_i "check NXDOMAIN response has correct NSEC3 1 ${FLAGS} ${ITERATIONS} ${SALT} for zone ${ZONE… 318 prevsalt="${SALT}" 321 SALT="${prevsalt}" 322 echo_i "check zone ${ZONE} after restart has salt ${SALT}"
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/unittest/gunit/xplugin/xpl/ |
H A D | sasl_challenge_response_auth_t.cc | 41 const char *const SALT = "SALT"; variable 100 .WillOnce(::testing::ReturnRefOfCopy(std::string(SALT))); in TEST_P() 103 Response(iface::Authentication::Status::k_ongoing, ER_SUCCESS, SALT), in TEST_P() 113 .WillOnce(::testing::ReturnRefOfCopy(std::string(SALT))); in TEST_P() 116 Response(iface::Authentication::Status::k_ongoing, ER_SUCCESS, SALT), in TEST_P() 136 .WillOnce(::testing::ReturnRefOfCopy(std::string(SALT))); in TEST_P() 139 Response(iface::Authentication::Status::k_ongoing, ER_SUCCESS, SALT), in TEST_P() 156 .WillOnce(::testing::ReturnRefOfCopy(std::string(SALT))); in TEST_P() 159 Response(iface::Authentication::Status::k_ongoing, ER_SUCCESS, SALT), in TEST_P()
|
/dports/security/cloak/cloak-0.2.0/cargo-crates/argon2rs-0.2.5/benches/ |
H A D | versus_cargon.rs | 15 const SALT: &'static [u8] = b"cargo test --release"; const 21 b.iter(|| a2.hash(&mut out, PASSWORD, SALT, &[], &[])); in bench_argon2rs_i() 28 let mut ctx = mk_cargon(a2, &mut out, PASSWORD, SALT, &[], &[]); in bench_cargon_i() 36 b.iter(|| a2.hash(&mut out, PASSWORD, SALT, &[], &[])); in bench_argon2rs_threaded() 43 let mut ctx = mk_cargon(a2, &mut out, PASSWORD, SALT, &[], &[]); in bench_cargon_threaded() 80 a2.hash(&mut outrs, PASSWORD, SALT, &[], &[]); in ensure_identical_hashes() 82 let mut ctx = mk_cargon(a2, &mut outca, PASSWORD, SALT, &[], &[]); in ensure_identical_hashes()
|
/dports/editors/xi-core/xi-editor-0.3.0/rust/cargo-crates/argon2rs-0.2.5/benches/ |
H A D | versus_cargon.rs | 15 const SALT: &'static [u8] = b"cargo test --release"; const 21 b.iter(|| a2.hash(&mut out, PASSWORD, SALT, &[], &[])); in bench_argon2rs_i() 28 let mut ctx = mk_cargon(a2, &mut out, PASSWORD, SALT, &[], &[]); in bench_cargon_i() 36 b.iter(|| a2.hash(&mut out, PASSWORD, SALT, &[], &[])); in bench_argon2rs_threaded() 43 let mut ctx = mk_cargon(a2, &mut out, PASSWORD, SALT, &[], &[]); in bench_cargon_threaded() 80 a2.hash(&mut outrs, PASSWORD, SALT, &[], &[]); in ensure_identical_hashes() 82 let mut ctx = mk_cargon(a2, &mut outca, PASSWORD, SALT, &[], &[]); in ensure_identical_hashes()
|
/dports/net/pichi/pichi-1.4.0/test/ |
H A D | hkdf.cpp | 22 static vector<uint8_t> const SALT; member 31 template <> vector<uint8_t> const RFC5869<1>::SALT = hex2bin("000102030405060708090a0b0c"); member in pichi::unit_test::RFC5869<1> 44 vector<uint8_t> const RFC5869<2>::SALT = member in pichi::unit_test::RFC5869<2> 59 template <> vector<uint8_t> const RFC5869<3>::SALT = {}; member in pichi::unit_test::RFC5869<3> 68 template <> vector<uint8_t> const RFC5869<4>::SALT = hex2bin("000102030405060708090a0b0c"); member in pichi::unit_test::RFC5869<4> 81 vector<uint8_t> const RFC5869<5>::SALT = member in pichi::unit_test::RFC5869<5> 96 template <> vector<uint8_t> const RFC5869<6>::SALT = {}; member in pichi::unit_test::RFC5869<6> 105 template <> vector<uint8_t> const RFC5869<7>::SALT = vector<uint8_t>(42, 0); member in pichi::unit_test::RFC5869<7> 156 hkdf<Case::ALGORITHM>(okm, Case::IKM, Case::SALT, Case::INFO); in BOOST_AUTO_TEST_CASE_TEMPLATE()
|
/dports/dns/bind-tools/bind-9.16.27/lib/dns/tests/ |
H A D | nsec3param_test.c | 42 #define SALT "FEDCBA98" macro 176 decode_salt(SALT, salt, SALTLEN); in nsec3param_change_test() 201 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 217 { rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), in nsec3param_change() 218 rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), false, in nsec3param_change() 247 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change() 248 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 254 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change()
|
/dports/dns/bind916/bind-9.16.27/lib/dns/tests/ |
H A D | nsec3param_test.c | 42 #define SALT "FEDCBA98" macro 176 decode_salt(SALT, salt, SALTLEN); in nsec3param_change_test() 201 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 217 { rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), in nsec3param_change() 218 rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), false, in nsec3param_change() 247 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change() 248 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 254 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change()
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/tests/ |
H A D | nsec3param_test.c | 40 #define SALT "FEDCBA98" macro 174 decode_salt(SALT, salt, SALTLEN); in nsec3param_change_test() 199 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 215 { rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), in nsec3param_change() 216 rdata_fromparams(HASH, FLAGS, 10, SALTLEN, SALT), false, in nsec3param_change() 245 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change() 246 rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), false, in nsec3param_change() 252 { rdata_fromparams(HASH, FLAGS, ITER, SALTLEN, SALT), in nsec3param_change()
|
/dports/security/john/john-1.9.0-jumbo-1/run/ |
H A D | itunes_backup2john.pl | 180 my ($WPKY, $SALT, $ITER, $DPIC, $DPSL) = parse_manifest_file ($file_content); 189 if (! defined ($SALT)) 210 if (length ($SALT) != 20) 233 …_backup\$*10*%s*%i*%s*%i*%s", unpack ("H*", $WPKY), $ITER, unpack ("H*", $SALT), $DPIC, unpack ("H… 237 …sh = sprintf ("\$itunes_backup\$*9*%s*%i*%s**", unpack ("H*", $WPKY), $ITER, unpack ("H*", $SALT));
|
/dports/security/pecl-crypto/crypto-0.3.1/tests/ |
H A D | PBKDF2___construct_basic.phpt | 26 echo "HASH AND SALT\n"; 30 echo "HASH, SALT AND ITERATIONS\n"; 36 HASH AND SALT 37 HASH, SALT AND ITERATIONS
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/commoncrypto-sys-0.2.0/tests/ |
H A D | pbkdf2.rs | 9 const SALT: &'static str = "salt"; const 42 test_pbkdf2!(pbkdf2_1, kCCPRFHmacAlgSHA1, PASSWORD, SALT, 1, DERIVED1); 46 SALT,
|
/dports/lang/rust/rustc-1.58.1-src/vendor/commoncrypto-sys/tests/ |
H A D | pbkdf2.rs | 9 const SALT: &'static str = "salt"; const 42 test_pbkdf2!(pbkdf2_1, kCCPRFHmacAlgSHA1, PASSWORD, SALT, 1, DERIVED1); 46 SALT,
|
/dports/devel/cargo-generate/cargo-generate-0.9.0/cargo-crates/commoncrypto-sys-0.2.0/tests/ |
H A D | pbkdf2.rs | 9 const SALT: &'static str = "salt"; const 42 test_pbkdf2!(pbkdf2_1, kCCPRFHmacAlgSHA1, PASSWORD, SALT, 1, DERIVED1); 46 SALT,
|
/dports/www/owncloud/owncloud/lib/private/Security/ |
H A D | Crypto.php | 47 public const SALT = 'phpseclib'; define in OC\\Security\\Crypto 102 $this->cipher->setPassword($password, self::CRYPT_METHOD, self::CRYPT_HASH, self::SALT); 131 $this->cipher->setPassword($password, self::CRYPT_METHOD, self::CRYPT_HASH, self::SALT); 147 $this->cipher->setPassword($password, self::CRYPT_METHOD, self::CRYPT_HASH, self::SALT);
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|
/dports/mail/phplist/phplist-3.6.6/public_html/lists/base/vendor/symfony/symfony/src/Symfony/Component/Security/Core/Tests/Validator/Constraints/ |
H A D | UserPasswordValidatorTest.php | 27 const SALT = '^S4lt$'; define in Symfony\\Component\\Security\\Core\\Tests\\Validator\\Constraints\\UserPasswordValidatorTest 67 ->with(static::PASSWORD, 'secret', static::SALT) 83 ->with(static::PASSWORD, 'secret', static::SALT) 140 ->willReturn(static::SALT)
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|
/dports/finance/prestashop/prestashop/vendor/symfony/symfony/src/Symfony/Component/Security/Core/Tests/Validator/Constraints/ |
H A D | UserPasswordValidatorTest.php | 27 const SALT = '^S4lt$'; define in Symfony\\Component\\Security\\Core\\Tests\\Validator\\Constraints\\UserPasswordValidatorTest 67 ->with(static::PASSWORD, 'secret', static::SALT) 83 ->with(static::PASSWORD, 'secret', static::SALT) 140 ->willReturn(static::SALT)
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/test/jdk/java/security/KeyStore/PKCS12/ |
H A D | EntryProtectionTest.java | 51 private static final byte[] SALT = new byte[8]; field in EntryProtectionTest 103 rand.nextBytes(SALT); in setUp() 105 for (byte b : SALT) { in setUp() 111 "PBEWithMD5AndDES", new PBEParameterSpec(SALT, in setUp()
|