/dports/sysutils/py-salt/salt-3004.1/tests/pytests/unit/renderers/ |
H A D | test_gpg.py | 56 assert gpg._decrypt_ciphertexts(crypted) == crypted 68 crypted_map = {"secret": crypted} 71 crypted_list = [crypted] 77 assert gpg._decrypt_object(crypted) == secret 89 crypted = "-----BEGIN PGP MESSAGE-----!@#$%^&*()_+" 96 assert gpg.render(crypted) == secret 115 crypted = dedent( 142 crypted = dedent( 169 crypted = dedent( 199 crypted = dedent( [all …]
|
H A D | test_nacl.py | 16 …crypted = "NACL[MRN3cc+fmdxyQbz6WMF+jq1hKdU5X5BBI7OjK+atvHo1ll+w1gZ7XyWtZVfq9gK9rQaMfkDxmidJKwE0Mw… 19 crypted_map = {"secret": crypted} 22 crypted_list = [crypted] 26 assert nacl._decrypt_object(crypted) == secret 37 …crypted = "NACL[MRN3cc+fmdxyQbz6WMF+jq1hKdU5X5BBI7OjK+atvHo1ll+w1gZ7XyWtZVfq9gK9rQaMfkDxmidJKwE0Mw… 39 assert nacl.render(crypted) == secret
|
/dports/mail/dovecot/dovecot-2.3.17/src/auth/ |
H A D | test-libpassword.c | 32 test_password_scheme(const char *scheme, const char *crypted, in test_password_scheme() argument 45 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_scheme() 46 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 1); in test_password_scheme() 49 test_assert(password_generate_encoded(plaintext, ¶ms, scheme, &crypted)); in test_password_scheme() 50 crypted = t_strdup_printf("{%s}%s", scheme, crypted); in test_password_scheme() 51 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_scheme() 55 scheme2 = password_scheme_detect(plaintext, crypted, ¶ms); in test_password_scheme() 67 const char *crypted = "{PLAIN}invalid"; in test_password_failures() local 81 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_failures() 86 crypted = "{INVALID}invalid"; in test_password_failures() [all …]
|
/dports/mail/roundcube/roundcubemail-1.5.1/plugins/password/ |
H A D | password.php | 525 $crypted = null; 617 $crypted = base64_encode($crypted); 644 $crypted = base64_encode($crypted . $salt); 667 $crypted = base64_encode($crypted . $salt); 687 $crypted = base64_encode($crypted . $salt); 694 $crypted = strtoupper($crypted); 749 $crypted = trim(str_replace('{' . $method . '}', '', $crypted)); 772 $crypted = base64_encode(pack('H*', $crypted)); 789 if ($crypted === null || $crypted === false) { 804 $crypted = $prefix . $crypted; [all …]
|
/dports/audio/murmur/mumble-1.3.3/src/tests/TestCrypt/ |
H A D | TestCrypt.cpp | 47 unsigned char crypted[512][14]; in reverserecovery() local 50 memset(crypted, 0, sizeof(crypted)); in reverserecovery() 73 enc.encrypt(secret, crypted[i], 10); in reverserecovery() 85 enc.encrypt(secret, crypted[i], 10); in reverserecovery() 103 unsigned char crypted[14]; in ivrecovery() local 106 enc.encrypt(secret, crypted, 10); in ivrecovery() 118 enc.encrypt(secret, crypted, 10); in ivrecovery() 126 enc.encrypt(secret, crypted, 10); in ivrecovery() 135 enc.encrypt(secret, crypted, 10); in ivrecovery() 141 enc.encrypt(secret, crypted, 10); in ivrecovery() [all …]
|
/dports/audio/mumble/mumble-1.3.3/src/tests/TestCrypt/ |
H A D | TestCrypt.cpp | 47 unsigned char crypted[512][14]; in reverserecovery() local 50 memset(crypted, 0, sizeof(crypted)); in reverserecovery() 73 enc.encrypt(secret, crypted[i], 10); in reverserecovery() 85 enc.encrypt(secret, crypted[i], 10); in reverserecovery() 103 unsigned char crypted[14]; in ivrecovery() local 106 enc.encrypt(secret, crypted, 10); in ivrecovery() 118 enc.encrypt(secret, crypted, 10); in ivrecovery() 126 enc.encrypt(secret, crypted, 10); in ivrecovery() 135 enc.encrypt(secret, crypted, 10); in ivrecovery() 141 enc.encrypt(secret, crypted, 10); in ivrecovery() [all …]
|
/dports/www/squid/squid-4.15/src/auth/basic/NCSA/ |
H A D | basic_ncsa_auth.cc | 123 char *crypted = NULL; in main() local 129 (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main() 134 if (passwordLength <= 8 && (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main() 138 if (passwordLength > 8 && (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main() 145 if ( (crypted = crypt_md5(passwd, salted)) && stored_pass == crypted) { in main() 149 if ( (crypted = md5sum(passwd)) && stored_pass == crypted) { in main()
|
/dports/sysutils/syslinux/syslinux-6.03/com32/menu/ |
H A D | passwd.c | 52 const char *crypted = crypt_md5(entry, passwd + 3); in passwd_compare_md5() local 53 int len = strlen(crypted); in passwd_compare_md5() 55 return !strncmp(crypted, passwd, len) && in passwd_compare_md5() 61 const char *crypted = sha256_crypt(entry, passwd + 3); in passwd_compare_sha256() local 62 int len = strlen(crypted); in passwd_compare_sha256() 64 return !strncmp(crypted, passwd, len) && in passwd_compare_sha256() 70 const char *crypted = sha512_crypt(entry, passwd + 3); in passwd_compare_sha512() local 71 int len = strlen(crypted); in passwd_compare_sha512() 73 return !strncmp(crypted, passwd, len) && in passwd_compare_sha512()
|
/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/openbsd-compat/ |
H A D | xcrypt.c | 63 char *crypted; in xcrypt() local 67 crypted = md5_crypt(password, salt); in xcrypt() 69 crypted = crypt(password, salt); in xcrypt() 72 crypted = bigcrypt(password, salt); in xcrypt() 74 crypted = crypt(password, salt); in xcrypt() 76 crypted = bigcrypt(password, salt); in xcrypt() 78 crypted = crypt(password, salt); in xcrypt() 81 return crypted; in xcrypt()
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/openbsd-compat/ |
H A D | xcrypt.c | 68 char *crypted; in xcrypt() local 72 crypted = md5_crypt(password, salt); in xcrypt() 74 crypted = crypt(password, salt); in xcrypt() 77 crypted = bigcrypt(password, salt); in xcrypt() 79 crypted = crypt(password, salt); in xcrypt() 81 crypted = bigcrypt(password, salt); in xcrypt() 83 crypted = crypt(password, salt); in xcrypt() 86 return crypted; in xcrypt()
|
/dports/www/uwsgi/uwsgi-2.0.20/plugins/router_basicauth/ |
H A D | router_basicauth.c | 27 char *crypted = uwsgi_concat3n("{SHA}", 5, b64, len, "\n", 1); in htpasswd_check_sha1() local 29 return crypted; in htpasswd_check_sha1() 49 char *crypted = NULL; in htpasswd_check() local 60 crypted = htpasswd_check_sha1(colon+1); in htpasswd_check() 61 if (crypted) need_free = 1; in htpasswd_check() 80 crypted = crypt_r( colon+1, cpwd, &cd); in htpasswd_check() 83 crypted = crypt( colon+1, cpwd); in htpasswd_check() 87 if (!crypted) continue; in htpasswd_check() 89 if (!strcmp( crypted, cpwd )) { in htpasswd_check() 92 if (need_free) free(crypted); in htpasswd_check() [all …]
|
/dports/security/openssh-portable/openssh-8.8p1/openbsd-compat/ |
H A D | xcrypt.c | 102 char *crypted; in xcrypt() local 113 crypted = md5_crypt(password, salt); in xcrypt() 115 crypted = crypt(password, salt); in xcrypt() 118 crypted = bigcrypt(password, salt); in xcrypt() 120 crypted = crypt(password, salt); in xcrypt() 122 crypted = bigcrypt(password, salt); in xcrypt() 124 crypted = crypt(password, salt); in xcrypt() 127 return crypted; in xcrypt()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/auth/ |
H A D | auth_unix.c | 500 const char *crypted, const char *salt) in password_check() argument 599 char *crypted; in check_unix_password() local 614 crypted = pws->pw_passwd; in check_unix_password() 629 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 644 crypted = talloc_strdup(ctx, ia_password); in check_unix_password() 645 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 655 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 666 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 680 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 693 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() [all …]
|
/dports/multimedia/tivodecode/tivodecode-0.2pre4/ |
H A D | tivodecoder.c | 78 static int do_header(BYTE * arg_0, int * block_no, int * arg_8, int * crypted, int * arg_10, int * … in do_header() argument 128 if (crypted) in do_header() 130 *crypted = (arg_0[0xb] & 0x03) << 0x1e; in do_header() 131 *crypted |= (arg_0[0xc] & 0xff) << 0x16; in do_header() 132 *crypted |= (arg_0[0xd] & 0xfc) << 0xe; in do_header() 137 *crypted |= (arg_0[0xd] & 0x01) << 0xf; in do_header() 138 *crypted |= (arg_0[0xe] & 0xff) << 0x7; in do_header() 139 *crypted |= (arg_0[0xf] & 0xfe) >> 0x1; in do_header() 230 int block_no, crypted; in process_frame() local 232 … if (do_header (&bytes[off], &block_no, NULL, &crypted, NULL, NULL)) in process_frame() [all …]
|
/dports/security/kpmenu/kpmenu-1.4.0/vendor/github.com/tobischo/gokeepasslib/v3/ |
H A D | crypto_test.go | 13 crypted := c.Pack(payload) 17 decrypted := c2.Unpack(crypted) 30 crypted := c.Pack(payload) 34 decrypted := c2.Unpack(crypted) 47 crypted := c.Pack(payload) 51 decrypted := c2.Unpack(crypted)
|
/dports/security/p5-Crypt-UnixCrypt/Crypt-UnixCrypt-1.0/ |
H A D | test.pl | 28 my $crypted = crypt $pass, $_; 29 print "# Expected $_ got $crypted ($pass)\nnot " 30 if $_ ne $crypted; 35 $crypted = crypt $pass, $_; 37 if $_ eq $crypted;
|
/dports/www/squid/squid-4.15/src/auth/basic/getpwnam/ |
H A D | basic_getpwnam_auth.cc | 62 char *crypted = crypt(passwd, pwd->pw_passwd); in passwd_auth() local 63 if (!crypted || strcmp(pwd->pw_passwd, crypted)) { in passwd_auth() 80 char *crypted = crypt(passwd, pwd->sp_pwdp); in shadow_auth() local 81 if (!crypted || strcmp(pwd->sp_pwdp, crypted)) { in shadow_auth()
|
/dports/irc/bitlbee/bitlbee-3.6/tests/ |
H A D | check_arc.c | 26 unsigned char *crypted; in check_codec() local 30 len = arc_encode(clear_tests[i], 0, &crypted, password, 12); in check_codec() 31 len = arc_decode(crypted, len, &decrypted, password); in check_codec() 36 g_free(crypted); in check_codec() 42 unsigned char crypted[30]; member 84 len = arc_decode(decrypt_tests[i].crypted, decrypt_tests[i].len, in check_decod()
|
/dports/net/samba412/samba-4.12.15/source4/auth/ntlm/ |
H A D | auth_unix.c | 515 const char *crypted, const char *salt) in password_check() argument 578 char *crypted; in check_unix_password() local 592 crypted = pws->pw_passwd; in check_unix_password() 606 crypted = talloc_strdup(ctx, spass->sp_pwdp); in check_unix_password() 607 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 622 crypted = talloc_strdup(ctx, ia_password); in check_unix_password() 623 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 635 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 649 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() 662 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password() [all …]
|
/dports/net-im/kopete/kopete-21.12.3/protocols/qq/ |
H A D | evautil.cpp | 31 uchar* key, uchar* crypted, uchar* crypted_pre, in encrypt64() argument 39 TEA::encipher( (uint*) plain, (uint*) key, (uint*) crypted ); in encrypt64() 42 crypted[i] ^= plain_pre[i]; in encrypt64() 45 memcpy( crypted_pre, crypted, 8 ); in encrypt64() 66 crypted[8], /* crypted text*/ in encrypt() local 93 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt() 95 encoded.append( (uchar*)crypted, 8 ); in encrypt() 106 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt() 108 encoded.append( (uchar*)crypted, 8 ); in encrypt() 119 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt() [all …]
|
/dports/math/vtk6/VTK-6.2.0/ThirdParty/Twisted/twisted/conch/test/ |
H A D | test_checkers.py | 64 crypted = crypt.crypt(password, salt) 68 crypted, password)) 78 crypted = crypt.crypt(password, salt) 82 crypted, password)) 92 crypted = crypt.crypt(password, password) 96 crypted, wrong)) 457 def crypted(username, password): function 460 return crypted 528 def verifyCryptedPassword(crypted, pw): argument 529 return crypted == pw [all …]
|
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/plugins/ |
H A D | cred_unix.py | 21 def verifyCryptedPassword(crypted, pw): argument 42 if isinstance(crypted, bytes): 43 crypted = crypted.decode("utf-8") 45 crypted_check = crypt.crypt(pw, crypted) 48 return crypted_check == crypted
|
/dports/security/pam_ssh/pam_ssh-8.0/openbsd-compat/ |
H A D | xcrypt.c | 91 char *crypted; in xcrypt() local 102 crypted = md5_crypt(password, salt); in xcrypt() 104 crypted = crypt(password, salt); in xcrypt() 106 crypted = crypt(password, salt); in xcrypt() 109 return crypted; in xcrypt()
|
/dports/www/ilias/ILIAS-5.4.25/libs/composer/vendor/simplesamlphp/simplesamlphp/modules/authcrypt/lib/Auth/Source/ |
H A D | Htpasswd.php | 88 $crypted = $matches[1]; 94 if (SimpleSAML\Utils\Crypto::secureCompare($crypted, crypt($password, $crypted))) { 103 if (APR1_MD5::check($password, $crypted)) { 109 if (SimpleSAML\Utils\Crypto::pwValid($crypted, $password)) {
|
/dports/deskutils/egroupware/egroupware/vendor/simplesamlphp/simplesamlphp/modules/authcrypt/lib/Auth/Source/ |
H A D | Htpasswd.php | 91 $crypted = $matches[1]; 97 if (Crypto::secureCompare($crypted, crypt($password, $crypted))) { 106 if (APR1_MD5::check($password, $crypted)) { 112 if (Crypto::pwValid($crypted, $password)) {
|