Home
last modified time | relevance | path

Searched refs:crypted (Results 1 – 25 of 843) sorted by relevance

12345678910>>...34

/dports/sysutils/py-salt/salt-3004.1/tests/pytests/unit/renderers/
H A Dtest_gpg.py56 assert gpg._decrypt_ciphertexts(crypted) == crypted
68 crypted_map = {"secret": crypted}
71 crypted_list = [crypted]
77 assert gpg._decrypt_object(crypted) == secret
89 crypted = "-----BEGIN PGP MESSAGE-----!@#$%^&*()_+"
96 assert gpg.render(crypted) == secret
115 crypted = dedent(
142 crypted = dedent(
169 crypted = dedent(
199 crypted = dedent(
[all …]
H A Dtest_nacl.py16crypted = "NACL[MRN3cc+fmdxyQbz6WMF+jq1hKdU5X5BBI7OjK+atvHo1ll+w1gZ7XyWtZVfq9gK9rQaMfkDxmidJKwE0Mw…
19 crypted_map = {"secret": crypted}
22 crypted_list = [crypted]
26 assert nacl._decrypt_object(crypted) == secret
37crypted = "NACL[MRN3cc+fmdxyQbz6WMF+jq1hKdU5X5BBI7OjK+atvHo1ll+w1gZ7XyWtZVfq9gK9rQaMfkDxmidJKwE0Mw…
39 assert nacl.render(crypted) == secret
/dports/mail/dovecot/dovecot-2.3.17/src/auth/
H A Dtest-libpassword.c32 test_password_scheme(const char *scheme, const char *crypted, in test_password_scheme() argument
45 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_scheme()
46 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 1); in test_password_scheme()
49 test_assert(password_generate_encoded(plaintext, &params, scheme, &crypted)); in test_password_scheme()
50 crypted = t_strdup_printf("{%s}%s", scheme, crypted); in test_password_scheme()
51 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_scheme()
55 scheme2 = password_scheme_detect(plaintext, crypted, &params); in test_password_scheme()
67 const char *crypted = "{PLAIN}invalid"; in test_password_failures() local
81 test_assert(strcmp(password_get_scheme(&crypted), scheme) == 0); in test_password_failures()
86 crypted = "{INVALID}invalid"; in test_password_failures()
[all …]
/dports/mail/roundcube/roundcubemail-1.5.1/plugins/password/
H A Dpassword.php525 $crypted = null;
617 $crypted = base64_encode($crypted);
644 $crypted = base64_encode($crypted . $salt);
667 $crypted = base64_encode($crypted . $salt);
687 $crypted = base64_encode($crypted . $salt);
694 $crypted = strtoupper($crypted);
749 $crypted = trim(str_replace('{' . $method . '}', '', $crypted));
772 $crypted = base64_encode(pack('H*', $crypted));
789 if ($crypted === null || $crypted === false) {
804 $crypted = $prefix . $crypted;
[all …]
/dports/audio/murmur/mumble-1.3.3/src/tests/TestCrypt/
H A DTestCrypt.cpp47 unsigned char crypted[512][14]; in reverserecovery() local
50 memset(crypted, 0, sizeof(crypted)); in reverserecovery()
73 enc.encrypt(secret, crypted[i], 10); in reverserecovery()
85 enc.encrypt(secret, crypted[i], 10); in reverserecovery()
103 unsigned char crypted[14]; in ivrecovery() local
106 enc.encrypt(secret, crypted, 10); in ivrecovery()
118 enc.encrypt(secret, crypted, 10); in ivrecovery()
126 enc.encrypt(secret, crypted, 10); in ivrecovery()
135 enc.encrypt(secret, crypted, 10); in ivrecovery()
141 enc.encrypt(secret, crypted, 10); in ivrecovery()
[all …]
/dports/audio/mumble/mumble-1.3.3/src/tests/TestCrypt/
H A DTestCrypt.cpp47 unsigned char crypted[512][14]; in reverserecovery() local
50 memset(crypted, 0, sizeof(crypted)); in reverserecovery()
73 enc.encrypt(secret, crypted[i], 10); in reverserecovery()
85 enc.encrypt(secret, crypted[i], 10); in reverserecovery()
103 unsigned char crypted[14]; in ivrecovery() local
106 enc.encrypt(secret, crypted, 10); in ivrecovery()
118 enc.encrypt(secret, crypted, 10); in ivrecovery()
126 enc.encrypt(secret, crypted, 10); in ivrecovery()
135 enc.encrypt(secret, crypted, 10); in ivrecovery()
141 enc.encrypt(secret, crypted, 10); in ivrecovery()
[all …]
/dports/www/squid/squid-4.15/src/auth/basic/NCSA/
H A Dbasic_ncsa_auth.cc123 char *crypted = NULL; in main() local
129 (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main()
134 if (passwordLength <= 8 && (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main()
138 if (passwordLength > 8 && (crypted = crypt(passwd, salted)) && stored_pass == crypted) { in main()
145 if ( (crypted = crypt_md5(passwd, salted)) && stored_pass == crypted) { in main()
149 if ( (crypted = md5sum(passwd)) && stored_pass == crypted) { in main()
/dports/sysutils/syslinux/syslinux-6.03/com32/menu/
H A Dpasswd.c52 const char *crypted = crypt_md5(entry, passwd + 3); in passwd_compare_md5() local
53 int len = strlen(crypted); in passwd_compare_md5()
55 return !strncmp(crypted, passwd, len) && in passwd_compare_md5()
61 const char *crypted = sha256_crypt(entry, passwd + 3); in passwd_compare_sha256() local
62 int len = strlen(crypted); in passwd_compare_sha256()
64 return !strncmp(crypted, passwd, len) && in passwd_compare_sha256()
70 const char *crypted = sha512_crypt(entry, passwd + 3); in passwd_compare_sha512() local
71 int len = strlen(crypted); in passwd_compare_sha512()
73 return !strncmp(crypted, passwd, len) && in passwd_compare_sha512()
/dports/security/pam_ssh_agent_auth/pam_ssh_agent_auth-7ff7858/openbsd-compat/
H A Dxcrypt.c63 char *crypted; in xcrypt() local
67 crypted = md5_crypt(password, salt); in xcrypt()
69 crypted = crypt(password, salt); in xcrypt()
72 crypted = bigcrypt(password, salt); in xcrypt()
74 crypted = crypt(password, salt); in xcrypt()
76 crypted = bigcrypt(password, salt); in xcrypt()
78 crypted = crypt(password, salt); in xcrypt()
81 return crypted; in xcrypt()
/dports/security/gnome-ssh-askpass/openssh-6.6p1/openbsd-compat/
H A Dxcrypt.c68 char *crypted; in xcrypt() local
72 crypted = md5_crypt(password, salt); in xcrypt()
74 crypted = crypt(password, salt); in xcrypt()
77 crypted = bigcrypt(password, salt); in xcrypt()
79 crypted = crypt(password, salt); in xcrypt()
81 crypted = bigcrypt(password, salt); in xcrypt()
83 crypted = crypt(password, salt); in xcrypt()
86 return crypted; in xcrypt()
/dports/www/uwsgi/uwsgi-2.0.20/plugins/router_basicauth/
H A Drouter_basicauth.c27 char *crypted = uwsgi_concat3n("{SHA}", 5, b64, len, "\n", 1); in htpasswd_check_sha1() local
29 return crypted; in htpasswd_check_sha1()
49 char *crypted = NULL; in htpasswd_check() local
60 crypted = htpasswd_check_sha1(colon+1); in htpasswd_check()
61 if (crypted) need_free = 1; in htpasswd_check()
80 crypted = crypt_r( colon+1, cpwd, &cd); in htpasswd_check()
83 crypted = crypt( colon+1, cpwd); in htpasswd_check()
87 if (!crypted) continue; in htpasswd_check()
89 if (!strcmp( crypted, cpwd )) { in htpasswd_check()
92 if (need_free) free(crypted); in htpasswd_check()
[all …]
/dports/security/openssh-portable/openssh-8.8p1/openbsd-compat/
H A Dxcrypt.c102 char *crypted; in xcrypt() local
113 crypted = md5_crypt(password, salt); in xcrypt()
115 crypted = crypt(password, salt); in xcrypt()
118 crypted = bigcrypt(password, salt); in xcrypt()
120 crypted = crypt(password, salt); in xcrypt()
122 crypted = bigcrypt(password, salt); in xcrypt()
124 crypted = crypt(password, salt); in xcrypt()
127 return crypted; in xcrypt()
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/auth/
H A Dauth_unix.c500 const char *crypted, const char *salt) in password_check() argument
599 char *crypted; in check_unix_password() local
614 crypted = pws->pw_passwd; in check_unix_password()
629 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
644 crypted = talloc_strdup(ctx, ia_password); in check_unix_password()
645 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
655 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
666 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
680 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
693 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
[all …]
/dports/multimedia/tivodecode/tivodecode-0.2pre4/
H A Dtivodecoder.c78 static int do_header(BYTE * arg_0, int * block_no, int * arg_8, int * crypted, int * arg_10, int * … in do_header() argument
128 if (crypted) in do_header()
130 *crypted = (arg_0[0xb] & 0x03) << 0x1e; in do_header()
131 *crypted |= (arg_0[0xc] & 0xff) << 0x16; in do_header()
132 *crypted |= (arg_0[0xd] & 0xfc) << 0xe; in do_header()
137 *crypted |= (arg_0[0xd] & 0x01) << 0xf; in do_header()
138 *crypted |= (arg_0[0xe] & 0xff) << 0x7; in do_header()
139 *crypted |= (arg_0[0xf] & 0xfe) >> 0x1; in do_header()
230 int block_no, crypted; in process_frame() local
232 … if (do_header (&bytes[off], &block_no, NULL, &crypted, NULL, NULL)) in process_frame()
[all …]
/dports/security/kpmenu/kpmenu-1.4.0/vendor/github.com/tobischo/gokeepasslib/v3/
H A Dcrypto_test.go13 crypted := c.Pack(payload)
17 decrypted := c2.Unpack(crypted)
30 crypted := c.Pack(payload)
34 decrypted := c2.Unpack(crypted)
47 crypted := c.Pack(payload)
51 decrypted := c2.Unpack(crypted)
/dports/security/p5-Crypt-UnixCrypt/Crypt-UnixCrypt-1.0/
H A Dtest.pl28 my $crypted = crypt $pass, $_;
29 print "# Expected $_ got $crypted ($pass)\nnot "
30 if $_ ne $crypted;
35 $crypted = crypt $pass, $_;
37 if $_ eq $crypted;
/dports/www/squid/squid-4.15/src/auth/basic/getpwnam/
H A Dbasic_getpwnam_auth.cc62 char *crypted = crypt(passwd, pwd->pw_passwd); in passwd_auth() local
63 if (!crypted || strcmp(pwd->pw_passwd, crypted)) { in passwd_auth()
80 char *crypted = crypt(passwd, pwd->sp_pwdp); in shadow_auth() local
81 if (!crypted || strcmp(pwd->sp_pwdp, crypted)) { in shadow_auth()
/dports/irc/bitlbee/bitlbee-3.6/tests/
H A Dcheck_arc.c26 unsigned char *crypted; in check_codec() local
30 len = arc_encode(clear_tests[i], 0, &crypted, password, 12); in check_codec()
31 len = arc_decode(crypted, len, &decrypted, password); in check_codec()
36 g_free(crypted); in check_codec()
42 unsigned char crypted[30]; member
84 len = arc_decode(decrypt_tests[i].crypted, decrypt_tests[i].len, in check_decod()
/dports/net/samba412/samba-4.12.15/source4/auth/ntlm/
H A Dauth_unix.c515 const char *crypted, const char *salt) in password_check() argument
578 char *crypted; in check_unix_password() local
592 crypted = pws->pw_passwd; in check_unix_password()
606 crypted = talloc_strdup(ctx, spass->sp_pwdp); in check_unix_password()
607 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
622 crypted = talloc_strdup(ctx, ia_password); in check_unix_password()
623 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
635 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
649 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
662 NT_STATUS_HAVE_NO_MEMORY(crypted); in check_unix_password()
[all …]
/dports/net-im/kopete/kopete-21.12.3/protocols/qq/
H A Devautil.cpp31 uchar* key, uchar* crypted, uchar* crypted_pre, in encrypt64() argument
39 TEA::encipher( (uint*) plain, (uint*) key, (uint*) crypted ); in encrypt64()
42 crypted[i] ^= plain_pre[i]; in encrypt64()
45 memcpy( crypted_pre, crypted, 8 ); in encrypt64()
66 crypted[8], /* crypted text*/ in encrypt() local
93 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt()
95 encoded.append( (uchar*)crypted, 8 ); in encrypt()
106 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt()
108 encoded.append( (uchar*)crypted, 8 ); in encrypt()
119 encrypt64( plain, plain_pre, (uchar*)key.data(), crypted, crypted_pre, isHeader ); in encrypt()
[all …]
/dports/math/vtk6/VTK-6.2.0/ThirdParty/Twisted/twisted/conch/test/
H A Dtest_checkers.py64 crypted = crypt.crypt(password, salt)
68 crypted, password))
78 crypted = crypt.crypt(password, salt)
82 crypted, password))
92 crypted = crypt.crypt(password, password)
96 crypted, wrong))
457 def crypted(username, password): function
460 return crypted
528 def verifyCryptedPassword(crypted, pw): argument
529 return crypted == pw
[all …]
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/plugins/
H A Dcred_unix.py21 def verifyCryptedPassword(crypted, pw): argument
42 if isinstance(crypted, bytes):
43 crypted = crypted.decode("utf-8")
45 crypted_check = crypt.crypt(pw, crypted)
48 return crypted_check == crypted
/dports/security/pam_ssh/pam_ssh-8.0/openbsd-compat/
H A Dxcrypt.c91 char *crypted; in xcrypt() local
102 crypted = md5_crypt(password, salt); in xcrypt()
104 crypted = crypt(password, salt); in xcrypt()
106 crypted = crypt(password, salt); in xcrypt()
109 return crypted; in xcrypt()
/dports/www/ilias/ILIAS-5.4.25/libs/composer/vendor/simplesamlphp/simplesamlphp/modules/authcrypt/lib/Auth/Source/
H A DHtpasswd.php88 $crypted = $matches[1];
94 if (SimpleSAML\Utils\Crypto::secureCompare($crypted, crypt($password, $crypted))) {
103 if (APR1_MD5::check($password, $crypted)) {
109 if (SimpleSAML\Utils\Crypto::pwValid($crypted, $password)) {
/dports/deskutils/egroupware/egroupware/vendor/simplesamlphp/simplesamlphp/modules/authcrypt/lib/Auth/Source/
H A DHtpasswd.php91 $crypted = $matches[1];
97 if (Crypto::secureCompare($crypted, crypt($password, $crypted))) {
106 if (APR1_MD5::check($password, $crypted)) {
112 if (Crypto::pwValid($crypted, $password)) {

12345678910>>...34