/dports/textproc/p5-Bloom-Filter/Bloom-Filter-1.2/lib/Bloom/ |
H A D | Filter.pm | 65 salts => [], 100 $self->{salts} = [ keys %collisions ]; 168 sub salts subroutine 171 return unless exists $self->{salts} 172 and ref $self->{salts} 173 and ref $self->{salts} eq 'ARRAY'; 175 return @{ $self->{salts} }; 197 my @salts = @{ $self->{salts} } 285 my @salts = @{ $self->{salts} } 289 foreach my $salt ( @salts ){
|
/dports/www/mediawiki135/mediawiki-1.35.5/includes/api/ |
H A D | ApiQueryTokens.php | 50 $salts = self::getTokenTypeSalts(); 52 $res[$type . 'token'] = self::getToken( $user, $session, $salts[$type] )->toString(); 67 static $salts = null; 68 if ( !$salts ) { 69 $salts = [ 80 $hookRunner->onApiQueryTokensRegisterTypes( $salts ); 81 ksort( $salts ); 84 return $salts;
|
/dports/www/mediawiki137/mediawiki-1.37.1/includes/api/ |
H A D | ApiQueryTokens.php | 50 $salts = self::getTokenTypeSalts(); 52 $res[$type . 'token'] = self::getToken( $user, $session, $salts[$type] )->toString(); 67 static $salts = null; 68 if ( !$salts ) { 69 $salts = [ 80 $hookRunner->onApiQueryTokensRegisterTypes( $salts ); 81 ksort( $salts ); 84 return $salts;
|
/dports/www/mediawiki136/mediawiki-1.36.3/includes/api/ |
H A D | ApiQueryTokens.php | 50 $salts = self::getTokenTypeSalts(); 52 $res[$type . 'token'] = self::getToken( $user, $session, $salts[$type] )->toString(); 67 static $salts = null; 68 if ( !$salts ) { 69 $salts = [ 80 $hookRunner->onApiQueryTokensRegisterTypes( $salts ); 81 ksort( $salts ); 84 return $salts;
|
/dports/mail/cone/cone-1.1/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/security/courier-authlib-base/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/mail/sqwebmail/sqwebmail-6.0.6/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/databases/courier-authlib-pgsql/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/databases/courier-authlib-sqlite/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/databases/courier-authlib-mysql/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/net/courier-authlib-ldap/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/mail/courier-authlib-vchkpw/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/mail/courier-imap/courier-imap-5.1.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/mail/courier/courier-0.65.3/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/databases/courier-authlib-usergdbm/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/databases/courier-authlib-userdb/courier-authlib-0.71.4/libs/md5/ |
H A D | md5test.c | 21 char *salts[4]={"abcdef","01234567","76543210","QWERTY"}; in main() local 41 for (i=0; i<sizeof(salts)/sizeof(salts[0]); i++) in main() 43 salts[i], passwds[i], in main() 44 md5_crypt_redhat(passwds[i], salts[i])); in main()
|
/dports/sysutils/fusefs-cryptofs/cryptofs-0.6.0/src/cryptofs/ |
H A D | crypto.c | 41 guchar **salts; member 94 guchar *salts; in crypto_create_global_ctx() local 117 salts = g_malloc0(num_of_salts * gctx->blocksize); in crypto_create_global_ctx() 118 gcry_cipher_setiv(cipher_hd, salts, gctx->blocksize); in crypto_create_global_ctx() 119 gcry_cipher_encrypt(cipher_hd, salts, num_of_salts * gctx->blocksize, NULL, 0); in crypto_create_global_ctx() 120 gctx->salts = g_new0(guchar *, num_of_salts); in crypto_create_global_ctx() 122 gctx->salts[i] = &salts[i * gctx->blocksize]; in crypto_create_global_ctx() 162 g_free(ctx->global->salts[0]); in crypto_destroy_local_ctx() 163 g_free(ctx->global->salts); in crypto_destroy_local_ctx() 190 gcry_cipher_setiv(ctx->cipher_hd, ctx->global->salts[0], ctx->global->blocksize); in crypto_encrypt_name() [all …]
|
/dports/java/bouncycastle15/crypto-169/core/src/test/java/org/bouncycastle/crypto/test/ |
H A D | SCryptTest.java | 56 byte[][] salts = new byte[3][]; in testPermutations() 58 salts[0] = new byte[16]; in testPermutations() 59 salts[1] = new byte[16]; in testPermutations() 60 salts[2] = new byte[16]; in testPermutations() 63 salts[1][t] = (byte)t; in testPermutations() 64 salts[2][t] = (byte)(16 - t); in testPermutations() 88 for (int k = 0; k != salts.length; k++) in testPermutations() 90 byte[] salt = salts[k]; in testPermutations()
|
H A D | OpenBSDBCryptTest.java | 131 byte[][] salts = new byte[3][]; in testPermutations() 133 salts[0] = new byte[16]; in testPermutations() 134 salts[1] = new byte[16]; in testPermutations() 135 salts[2] = new byte[16]; in testPermutations() 138 salts[1][t] = (byte)t; in testPermutations() 139 salts[2][t] = (byte)(16 - t); in testPermutations() 165 for (int k = 0; k != salts.length; k++) in testPermutations() 167 byte[] salt = salts[k]; in testPermutations()
|
H A D | Argon2Test.java | 112 byte[][] salts = new byte[3][]; in testPermutations() 114 salts[0] = new byte[16]; in testPermutations() 115 salts[1] = new byte[16]; in testPermutations() 116 salts[2] = new byte[16]; in testPermutations() 119 salts[1][t] = (byte)t; in testPermutations() 120 salts[2][t] = (byte)(16 - t); in testPermutations() 145 for (int k = 0; k != salts.length; k++) in testPermutations() 147 byte[] salt = salts[k]; in testPermutations()
|
/dports/science/rdkit/rdkit-Release_2021_03_5/rdkit/Chem/ |
H A D | SaltRemover.py | 90 self.salts = None 123 self.salts = [] 134 self.salts.append(salt) 137 self.salts = [mol for mol in _getSmartsSaltsFromFile(self.defnFilename)] 139 self.salts = [mol for mol in SDMolSupplier(self.defnFilename)] 141 self.salts = [mol for mol in SmilesMolSupplier(self.defnFilename)] 282 for salt in self.salts:
|
/dports/textproc/p5-Bloom-Filter/Bloom-Filter-1.2/t/ |
H A D | check.t | 11 my @salts = $bf->salts(); 12 is( scalar @salts, 10, "Correct default number of salts" );
|
H A D | add.t | 11 my @salts = $bf->salts(); 12 is( scalar @salts, 10, "Correct default number of salts" );
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | bench.c | 75 db->salts = NULL; in _ldr_init_database() 507 if (salts) { in benchmark_format() 511 salts = 1; in benchmark_format() 566 if (salts <= 1) in benchmark_format() 570 index = salts; in benchmark_format() 580 index = salts; in benchmark_format() 603 (salts_done < (wait ? salts : MIN(salts, 2)))) && in benchmark_format() 738 int salts; in benchmark_all() local 862 salts = 0; in benchmark_all() 867 salts = BENCHMARK_MANY; in benchmark_all() [all …]
|
/dports/security/gnutls/gnutls-3.6.16/doc/functions/ |
H A D | gnutls_srp_set_server_fake_salt_seed | 11 @var{salt_length}: is the length of the generated fake salts 13 This function sets the seed that is used to generate salts for 28 Generating fake salts longer than 20 bytes is not supported. 31 @code{gnutls_srp_server_credentials_t} is allocated and fake salts are
|