/busybox-petitboot.config:65:CONFIG_MD5_SIZE_VS_SPEED=2
/busybox-petitboot.config:234:CONFIG_FEATURE_MD5_SHA1_SUM_CHECK=y
/busybox-petitboot.config:490:# CONFIG_FEATURE_HTTPD_AUTH_MD5 is not set
/busybox-1.13.2/docs/Serial-Programming-HOWTO.txt:345: o TIOCM_RNG Ring
/busybox-1.13.2/docs/busybox.net/developer.html:18:
If you don't currently have an ssh version 2 DSA key at least 1024 bits
/busybox-1.13.2/docs/busybox.net/developer.html:20:command ssh-keygen -t dsa and hitting enter at the prompts. This
/busybox-1.13.2/docs/busybox.net/developer.html:21:will create the files ~/.ssh/id_dsa and ~/.ssh/id_dsa.pub
/busybox-1.13.2/docs/busybox.net/developer.html:22:You must then send the content of 'id_dsa.pub' to me so I can set up your
/busybox-1.13.2/docs/busybox.net/developer.html:23:account. (The content of 'id_dsa' should of course be kept secret, anyone
/busybox-1.13.2/docs/busybox.net/developer.html:28:private, you can encrypt your email using
/busybox-1.13.2/docs/busybox.net/oldnews.html:639:
26 July 2004 -- BusyBox 1.0.0-rc2 released
/busybox-1.13.2/docs/busybox.net/tinyutils.html:20:
Dropbear has both an ssh server and an ssh client that together come in around 100k. It has no external
/busybox-1.13.2/docs/busybox.net/tinyutils.html:21:dependencies (I.E. it does not depend on OpenSSL, using a built-in copy of
/busybox-1.13.2/docs/busybox.net/FAQ.html:821:If the first character isn't '$', then it's an old DES style password. If
/busybox-1.13.2/docs/busybox.net/FAQ.html:828: The "type" indicates which encryption algorithm to use: 1 for MD5 and 2 for SHA1.
/busybox-1.13.2/docs/busybox.net/FAQ.html:850:The third field is the encrypted password (plus the salt). For md5 this
/busybox-1.13.2/docs/busybox.net/FAQ.html:853: The busybox function to handle all this is pw_encrypt(clear, salt) in
/busybox-1.13.2/docs/busybox.net/FAQ.html:854:"libbb/pw_encrypt.c". The first argument is the clear text password to be
/busybox-1.13.2/docs/busybox.net/FAQ.html:862: So when checking an existing password, if pw_encrypt(text,
/busybox-1.13.2/docs/busybox.net/FAQ.html:867:second argument to pw_encrypt(text,buffer).
/busybox-1.13.2/docs/draft-coar-cgi-v11-03-clean.html:780: for instance, a resource accessed via an SSL mechanism
/busybox-1.13.2/include/libbb.h:1118:#define pw_encrypt(clear, salt, cleanup) pw_encrypt(clear, salt)
/busybox-1.13.2/include/libbb.h:1120:extern char *pw_encrypt(const char *clear, const char *salt, int cleanup) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1306:typedef struct sha1_ctx_t {
/busybox-1.13.2/include/libbb.h:1310:} sha1_ctx_t;
/busybox-1.13.2/include/libbb.h:1311:void sha1_begin(sha1_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1312:void sha1_hash(const void *data, size_t length, sha1_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1313:void *sha1_end(void *resbuf, sha1_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1315:typedef struct md5_ctx_t {
/busybox-1.13.2/include/libbb.h:1323:} md5_ctx_t;
/busybox-1.13.2/include/libbb.h:1324:void md5_begin(md5_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1325:void md5_hash(const void *data, size_t length, md5_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/libbb.h:1326:void *md5_end(void *resbuf, md5_ctx_t *ctx) FAST_FUNC;
/busybox-1.13.2/include/usage.h:294: "\n -l RNG" \
/busybox-1.13.2/include/usage.h:561: "[-a des|md5] [string]"
/busybox-1.13.2/include/usage.h:566: "\n -a Algorithm to use (default: md5)" \
/busybox-1.13.2/include/usage.h:1559: USE_FEATURE_HTTPD_AUTH_MD5(" [-m pass]") \
/busybox-1.13.2/include/usage.h:1574: USE_FEATURE_HTTPD_AUTH_MD5( \
/busybox-1.13.2/include/usage.h:1575: "\n -m PASS Crypt PASS with md5 algorithm") \
/busybox-1.13.2/include/usage.h:2402: USE_FEATURE_MD5_SHA1_SUM_CHECK("\n or: md5sum [OPTION] -c [FILE]")
/busybox-1.13.2/include/usage.h:2404: "Print" USE_FEATURE_MD5_SHA1_SUM_CHECK(" or check") " MD5 checksums" \
/busybox-1.13.2/include/usage.h:2405: USE_FEATURE_MD5_SHA1_SUM_CHECK( "\n" \
/busybox-1.13.2/include/usage.h:2407: "\n -c Check MD5 sums against given list" \
/busybox-1.13.2/include/usage.h:2409: "\n -w Warn about improperly formatted MD5 checksum lines") \
/busybox-1.13.2/include/usage.h:2955: "\n -a Algorithm to use for password (choices: des, md5)" /* ", sha1)" */ \
/busybox-1.13.2/include/usage.h:2961: USE_GETOPT_LONG("[--md5|--encrypted]") SKIP_GETOPT_LONG("[-m|-e]")
/busybox-1.13.2/include/usage.h:2968: "\n -m,--md5 Use MD5 encryption instead of DES" \
/busybox-1.13.2/include/usage.h:2972: "\n -m Use MD5 encryption instead of DES" \
/busybox-1.13.2/include/usage.h:3125: "$ popmaildir ~/Maildir -- openssl s_client -quiet -connect pop.gmail.com:995 [d_flags, " ");
/busybox-1.13.2/util-linux/mkswap.c:118: // signature on disk (not in cache) during swapon.
/busybox-1.13.2/util-linux/volume_id/unused_isw_raid.c:31:#define ISW_SIGNATURE "Intel Raid ISM Cfg Sig. "
/busybox-1.13.2/util-linux/volume_id/unused_isw_raid.c:50: if (memcmp(isw->sig, ISW_SIGNATURE, sizeof(ISW_SIGNATURE)-1) != 0)
/busybox-1.13.2/util-linux/volume_id/unused_isw_raid.c:54:// memcpy(id->type_version, &isw->sig[sizeof(ISW_SIGNATURE)-1], 6);
/busybox-1.13.2/util-linux/volume_id/cramfs.c:28: uint8_t signature[16];
/busybox-1.13.2/util-linux/volume_id/ocfs2.c:34: uint8_t i_signature[8]; /* Signature for validation */
/busybox-1.13.2/util-linux/volume_id/ocfs2.c:93: if (memcmp(os->i_signature, "OCFSV2", 6) != 0) {
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:24: uint8_t signature[2];
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:30: uint8_t signature[2];
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:52: if (part->signature[0] == 'P' && part->signature[1] == 'M' /* "PM" */
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:63: if (driver->signature[0] == 'E' && driver->signature[1] == 'R') { /* "ER" */
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:76: if (part->signature[0] != 'P' || part->signature[1] != 'M') /* not "PM" */
/busybox-1.13.2/util-linux/volume_id/unused_mac.c:97: if (part->signature[0] != 'P' || part->signature[1] != 'M') /* not "PM" */
/busybox-1.13.2/util-linux/volume_id/reiserfs.c:98: dbg("reiserfs: no signature found");
/busybox-1.13.2/util-linux/volume_id/hfs.c:34: uint8_t signature[2];
/busybox-1.13.2/util-linux/volume_id/hfs.c:102: uint8_t signature[2];
/busybox-1.13.2/util-linux/volume_id/hfs.c:166: if (hfs->signature[0] != 'B' || hfs->signature[1] != 'D')
/busybox-1.13.2/util-linux/volume_id/hfs.c:203: if (hfs->signature[0] == 'H')
/busybox-1.13.2/util-linux/volume_id/hfs.c:204: if (hfs->signature[1] == '+' || hfs->signature[1] == 'X')
/busybox-1.13.2/util-linux/volume_id/unused_lsi_raid.c:27:#define LSI_SIGNATURE "$XIDE$"
/busybox-1.13.2/util-linux/volume_id/unused_lsi_raid.c:45: if (memcmp(lsi->sig, LSI_SIGNATURE, sizeof(LSI_SIGNATURE)-1) != 0)
/busybox-1.13.2/util-linux/volume_id/unused_promise_raid.c:28:#define PDC_SIGNATURE "Promise Technology, Inc."
/busybox-1.13.2/util-linux/volume_id/unused_promise_raid.c:53: if (memcmp(pdc->sig, PDC_SIGNATURE, sizeof(PDC_SIGNATURE)-1) == 0)
/busybox-1.13.2/util-linux/volume_id/unused_nvidia_raid.c:30:#define NVIDIA_SIGNATURE "NVIDIA"
/busybox-1.13.2/util-linux/volume_id/unused_nvidia_raid.c:48: if (memcmp(nv->vendor, NVIDIA_SIGNATURE, sizeof(NVIDIA_SIGNATURE)-1) != 0)
/busybox-1.13.2/util-linux/volume_id/linux_raid.c:74: dbg("found raid signature");
/busybox-1.13.2/util-linux/volume_id/linux_swap.c:42: /* the swap signature is at the end of the PAGE_SIZE */
/busybox-1.13.2/util-linux/volume_id/volume_id.c:91:/* signature in the first block, only small buffer needed */
/busybox-1.13.2/util-linux/volume_id/volume_id.c:171: /* signature in the first block, only small buffer needed */
/busybox-1.13.2/util-linux/volume_id/unused_via_raid.c:24: uint16_t signature;
/busybox-1.13.2/util-linux/volume_id/unused_via_raid.c:37:#define VIA_SIGNATURE 0xAA55
/busybox-1.13.2/util-linux/volume_id/unused_via_raid.c:56: if (via->signature != cpu_to_le16(VIA_SIGNATURE))
/busybox-1.13.2/coreutils/Kbuild:47:lib-$(CONFIG_MD5SUM) += md5_sha1_sum.o
/busybox-1.13.2/coreutils/Kbuild:64:lib-$(CONFIG_SHA1SUM) += md5_sha1_sum.o
/busybox-1.13.2/coreutils/md5_sha1_sum.c:11:typedef enum { HASH_SHA1, HASH_MD5 } hash_algo_t;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:31: sha1_ctx_t sha1;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:32: md5_ctx_t md5;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:45: if (ENABLE_MD5SUM && hash_algo==HASH_MD5) {
/busybox-1.13.2/coreutils/md5_sha1_sum.c:46: md5_begin(&context.md5);
/busybox-1.13.2/coreutils/md5_sha1_sum.c:47: update = (void*)md5_hash;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:48: final = (void*)md5_end;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:50: } else if (ENABLE_SHA1SUM && hash_algo==HASH_SHA1) {
/busybox-1.13.2/coreutils/md5_sha1_sum.c:51: sha1_begin(&context.sha1);
/busybox-1.13.2/coreutils/md5_sha1_sum.c:52: update = (void*)sha1_hash;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:53: final = (void*)sha1_end;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:77:int md5_sha1_sum_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:78:int md5_sha1_sum_main(int argc UNUSED_PARAM, char **argv)
/busybox-1.13.2/coreutils/md5_sha1_sum.c:84: ? (ENABLE_SHA1SUM ? (applet_name[0] == 'm' ? HASH_MD5 : HASH_SHA1) : HASH_MD5)
/busybox-1.13.2/coreutils/md5_sha1_sum.c:85: : HASH_SHA1;
/busybox-1.13.2/coreutils/md5_sha1_sum.c:87: if (ENABLE_FEATURE_MD5_SHA1_SUM_CHECK)
/busybox-1.13.2/coreutils/md5_sha1_sum.c:95: if (ENABLE_FEATURE_MD5_SHA1_SUM_CHECK && !(flags & FLAG_CHECK)) {
/busybox-1.13.2/coreutils/md5_sha1_sum.c:105: if (ENABLE_FEATURE_MD5_SHA1_SUM_CHECK && (flags & FLAG_CHECK)) {
/busybox-1.13.2/coreutils/Config.in:380: md5sum is used to print or check MD5 checksums.
/busybox-1.13.2/coreutils/Config.in:510: Compute and check SHA1 message digest
/busybox-1.13.2/coreutils/Config.in:817:config FEATURE_MD5_SHA1_SUM_CHECK
/busybox-1.13.2/scripts/defconfig:81:CONFIG_MD5_SIZE_VS_SPEED=2
/busybox-1.13.2/scripts/defconfig:268:CONFIG_FEATURE_MD5_SHA1_SUM_CHECK=y
/busybox-1.13.2/scripts/defconfig:638:CONFIG_FEATURE_HTTPD_AUTH_MD5=y
/busybox-1.13.2/scripts/bb_release:3:# Create signed release tarballs and signature files from current svn.
/busybox-1.13.2/scripts/bb_release:25:MD5: `md5sum $1`
/busybox-1.13.2/scripts/bb_release:26:SHA1: `sha1sum $1`
/busybox-1.13.2/scripts/bb_release:28:To verify this signature, you can obtain my public key
/busybox-1.13.2/TODO_config_nommu:79:CONFIG_MD5_SIZE_VS_SPEED=2
/busybox-1.13.2/TODO_config_nommu:266:CONFIG_FEATURE_MD5_SHA1_SUM_CHECK=y
/busybox-1.13.2/TODO_config_nommu:636:CONFIG_FEATURE_HTTPD_AUTH_MD5=y
/busybox-1.13.2/mailutils/popmaildir.c:99: md5_ctx_t md5;
/busybox-1.13.2/mailutils/popmaildir.c:105: // get md5 sum of
/busybox-1.13.2/mailutils/popmaildir.c:106: md5_begin(&md5);
/busybox-1.13.2/mailutils/popmaildir.c:107: md5_hash(s, strlen(s), &md5);
/busybox-1.13.2/mailutils/popmaildir.c:108: md5_end(s, &md5);
/busybox-1.13.2/mailutils/popmaildir.c:109: // NOTE: md5 struct contains enough space
/busybox-1.13.2/mailutils/popmaildir.c:110: // so we reuse md5 space instead of xzalloc(16*2+1)
/busybox-1.13.2/mailutils/popmaildir.c:111:#define md5_hex ((uint8_t *)&md5)
/busybox-1.13.2/mailutils/popmaildir.c:112:// uint8_t *md5_hex = (uint8_t *)&md5;
/busybox-1.13.2/mailutils/popmaildir.c:113: *bin2hex((char *)md5_hex, s, 16) = '\0';
/busybox-1.13.2/mailutils/popmaildir.c:115: s = xasprintf("%s %s", G.user, md5_hex);
/busybox-1.13.2/mailutils/popmaildir.c:116:#undef md5_hex
/busybox-1.13.2/mailutils/sendmail.c:147: // N.B. if we used openssl the initial 220 answer is already swallowed during openssl TLS init procedure
/busybox-1.13.2/mailutils/sendmail.c:150: // 220 on plain connection, 250 on openssl-helped TLS session
/busybox-1.13.2/loginutils/chpasswd.c:14: "md5\0" No_argument "m"
/busybox-1.13.2/loginutils/chpasswd.c:19:#define OPT_MD5 2
/busybox-1.13.2/loginutils/chpasswd.c:46: if (opt & OPT_MD5) {
/busybox-1.13.2/loginutils/chpasswd.c:50: pass = pw_encrypt(pass, salt, 0);
/busybox-1.13.2/loginutils/vlock.c:16: * It now works with md5, sha1, etc passwords. */
/busybox-1.13.2/loginutils/cryptpw.c:17: n=`./busybox cryptpw -a des -- "$line"`
/busybox-1.13.2/loginutils/cryptpw.c:18: o=`./busybox_org cryptpw -a des -- "$line"`
/busybox-1.13.2/loginutils/cryptpw.c:44: crypt_make_salt(salt + 3, 4, 0); /* md5 */
/busybox-1.13.2/loginutils/cryptpw.c:49: crypt_make_salt(salt, 1, 0); /* des */
/busybox-1.13.2/loginutils/cryptpw.c:55: puts(pw_encrypt(argv[optind] ? argv[optind] : xmalloc_fgetline(stdin), salt, 1));
/busybox-1.13.2/loginutils/passwd.c:28: encrypted = pw_encrypt(orig, pw->pw_passwd, 1); /* returns malloced str */
/busybox-1.13.2/loginutils/passwd.c:55: crypt_make_salt(salt, 1, 0); /* des */
/busybox-1.13.2/loginutils/passwd.c:56: if (algo) { /* MD5 */
/busybox-1.13.2/loginutils/passwd.c:60: /* pw_encrypt returns malloced str */
/busybox-1.13.2/loginutils/passwd.c:61: ret = pw_encrypt(newp, salt, 1);
/busybox-1.13.2/loginutils/passwd.c:82: STATE_ALGO_md5 = 0x10,
/busybox-1.13.2/loginutils/passwd.c:83: //STATE_ALGO_des = 0x20, not needed yet
/busybox-1.13.2/loginutils/passwd.c:108: if (strcasecmp(opt_a, "des") != 0) /* -a */
/busybox-1.13.2/loginutils/passwd.c:109: opt |= STATE_ALGO_md5;
/busybox-1.13.2/loginutils/passwd.c:111: // opt |= STATE_ALGO_des;
/busybox-1.13.2/loginutils/passwd.c:156: newp = new_password(pw, myuid, opt & STATE_ALGO_md5);
/busybox-1.13.2/loginutils/sulogin.c:88: encrypted = pw_encrypt(cp, pwd->pw_passwd, 1);
/busybox-1.13.2/loginutils/Config.in:61: bool "Use internal DES and MD5 crypt functions"
/busybox-1.13.2/loginutils/Config.in:64: Busybox has internal DES and MD5 crypt functions.
/busybox-1.13.2/loginutils/Config.in:71: DES encryption/decryption.
/busybox-1.13.2/loginutils/Config.in:75: DES encryption/decryption and can do with smaller code.
/busybox-1.13.2/miscutils/hdparm.c:226:#define SIG 0x00ff /* signature location */
/busybox-1.13.2/miscutils/hdparm.c:227:#define SIG_VAL 0x00a5 /* signature value */
/busybox-1.13.2/miscutils/hdparm.c:1189: id->sector_bytes, id->ecc_bytes,
/busybox-1.13.2/networking/zcip.c:126: memcpy(&p.arp.arp_sha, source_eth, ETH_ALEN);
/busybox-1.13.2/networking/zcip.c:470: struct ether_addr *sha = (struct ether_addr *) p.arp.arp_sha;
/busybox-1.13.2/networking/zcip.c:478: ether_ntoa(sha),
/busybox-1.13.2/networking/zcip.c:493: && memcmp(&p.arp.arp_sha, ð_addr, ETH_ALEN) != 0
/busybox-1.13.2/networking/httpd.c:1714: if (ENABLE_FEATURE_HTTPD_AUTH_MD5) {
/busybox-1.13.2/networking/httpd.c:1715: char *md5_passwd;
/busybox-1.13.2/networking/httpd.c:1717: md5_passwd = strchr(cur->after_colon, ':');
/busybox-1.13.2/networking/httpd.c:1718: if (md5_passwd && md5_passwd[1] == '$' && md5_passwd[2] == '1'
/busybox-1.13.2/networking/httpd.c:1719: && md5_passwd[3] == '$' && md5_passwd[4]
/busybox-1.13.2/networking/httpd.c:1724: md5_passwd++;
/busybox-1.13.2/networking/httpd.c:1725: user_len_p1 = md5_passwd - cur->after_colon;
/busybox-1.13.2/networking/httpd.c:1731: encrypted = pw_encrypt(
/busybox-1.13.2/networking/httpd.c:1733: md5_passwd /*salt */, 1 /* cleanup */);
/busybox-1.13.2/networking/httpd.c:1734: r = strcmp(encrypted, md5_passwd);
/busybox-1.13.2/networking/httpd.c:2290: USE_FEATURE_HTTPD_AUTH_MD5( m_opt_md5 ,)
/busybox-1.13.2/networking/httpd.c:2301: OPT_MD5 = USE_FEATURE_HTTPD_AUTH_MD5( (1 << m_opt_md5 )) + 0,
/busybox-1.13.2/networking/httpd.c:2319: USE_FEATURE_HTTPD_AUTH_MD5(const char *pass;)
/busybox-1.13.2/networking/httpd.c:2337: USE_FEATURE_HTTPD_AUTH_MD5("m:")
/busybox-1.13.2/networking/httpd.c:2343: USE_FEATURE_HTTPD_AUTH_MD5(, &pass)
/busybox-1.13.2/networking/httpd.c:2358:#if ENABLE_FEATURE_HTTPD_AUTH_MD5
/busybox-1.13.2/networking/httpd.c:2359: if (opt & OPT_MD5) {
/busybox-1.13.2/networking/httpd.c:2360: puts(pw_encrypt(pass, "$1$", 1));
/busybox-1.13.2/networking/tcpudp.c:42:#include "ssl_io.h"
/busybox-1.13.2/networking/tcpudp.c:254: fatal("cannot initialize ssl");
/busybox-1.13.2/networking/tcpudp.c:260: if (matrixSslNewSession(&ssl, keys, 0, SSL_FLAGS_SERVER) < 0)
/busybox-1.13.2/networking/tcpudp.c:261: fatal("cannot create ssl session");
/busybox-1.13.2/networking/tcpudp.c:507: ssl_io(0, argv);
/busybox-1.13.2/networking/Config.in:170:config FEATURE_HTTPD_AUTH_MD5
/busybox-1.13.2/networking/Config.in:171: bool "Support MD5 crypted passwords for http Authentication"
/busybox-1.13.2/networking/Config.in:176: using md5 passwords.
/busybox-1.13.2/networking/Config.in:738: http://matt.ucc.asn.au/dropbear/dropbear.html
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/blkid/probe.h:117: __u8 signature[16];
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/blkid/probe.h:234: unsigned char signature[128];
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/blkid/probe.h:257: unsigned char signature[8];
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/blkid/probe.h:269:#define OCFS2_SUPER_BLOCK_SIGNATURE "OCFSV2"
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/blkid/probe.c:347: * bytes, although the swap signature itself is located at the
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2p/hashstr.c:27: { EXT2_HASH_HALF_MD4, "half_md4" },
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2p/hashstr.c:28: { EXT2_HASH_TEA, "tea" },
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2fsck.c:1888: /* Leave a valid existing V1 superblock signature alone.
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2fsck.c:1890: * signature. */
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2fsck.c:4091: (root->hash_version != EXT2_HASH_HALF_MD4) &&
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2fsck.c:4092: (root->hash_version != EXT2_HASH_TEA) &&
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/e2fsck.c:12999: "\tea_ver=\n\n");
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:22: * Keyed 32-bit hash function using TEA in a Davis-Meyer function
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:34:static void TEA_transform(__u32 buf[4], __u32 const in[])
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:51:/* F, G and H are basic MD4 functions: selection, majority, parity */
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:69: * Basic cut-down MD4 transform. Returns only 32 bits of result.
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:204: case EXT2_HASH_HALF_MD4:
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:215: case EXT2_HASH_TEA:
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/dirhash.c:219: TEA_transform(buf, in);
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/ext2_fs.h:134:#define EXT2_HASH_HALF_MD4 1
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/ext2_fs.h:135:#define EXT2_HASH_TEA 2
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/ext2fs/ext2_fs.h:381: __u16 s_magic; /* Magic signature */
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/tune2fs.c:302: sb->s_def_hash_version = EXT2_HASH_TEA;
/busybox-1.13.2/e2fsprogs/old_e2fsprogs/mke2fs.c:1221: fs->super->s_def_hash_version = EXT2_HASH_TEA;
/busybox-1.13.2/e2fsprogs/e2fs_defs.h:125:#define EXT2_HASH_HALF_MD4 1
/busybox-1.13.2/e2fsprogs/e2fs_defs.h:126:#define EXT2_HASH_TEA 2
/busybox-1.13.2/e2fsprogs/e2fs_defs.h:372: uint16_t s_magic; /* Magic signature */
Binární soubor /home/mitr/hash/grep-many/source/busybox-1.13.2/shell/susv3_doc.tar.bz2 odpovídá
/busybox-1.13.2/libbb/pw_encrypt_des.c:12: * this file should now *only* export crypt_des(), in order to make
/busybox-1.13.2/libbb/pw_encrypt_des.c:39: * This is an original implementation of the DES and the crypt(3) interfaces
/busybox-1.13.2/libbb/pw_encrypt_des.c:48: * Note that in that book's description of DES the lookups for the initial,
/busybox-1.13.2/libbb/pw_encrypt_des.c:226:struct const_des_ctx {
/busybox-1.13.2/libbb/pw_encrypt_des.c:238:static struct const_des_ctx*
/busybox-1.13.2/libbb/pw_encrypt_des.c:239:const_des_init(void)
/busybox-1.13.2/libbb/pw_encrypt_des.c:242: struct const_des_ctx *cctx;
/busybox-1.13.2/libbb/pw_encrypt_des.c:307:struct des_ctx {
/busybox-1.13.2/libbb/pw_encrypt_des.c:308: const struct const_des_ctx *const_ctx;
/busybox-1.13.2/libbb/pw_encrypt_des.c:352:static struct des_ctx*
/busybox-1.13.2/libbb/pw_encrypt_des.c:353:des_init(struct des_ctx *ctx, const struct const_des_ctx *cctx)
/busybox-1.13.2/libbb/pw_encrypt_des.c:487:setup_salt(struct des_ctx *ctx, uint32_t salt)
/busybox-1.13.2/libbb/pw_encrypt_des.c:510:des_setkey(struct des_ctx *ctx, const char *key)
/busybox-1.13.2/libbb/pw_encrypt_des.c:594:do_des(struct des_ctx *ctx, /*uint32_t l_in, uint32_t r_in,*/ uint32_t *l_out, uint32_t *r_out, int count)
/busybox-1.13.2/libbb/pw_encrypt_des.c:596: const struct const_des_ctx *cctx = const_ctx;
/busybox-1.13.2/libbb/pw_encrypt_des.c:632:#else /* using the fact that ip_maskX[] is constant (written to by des_init) */
/busybox-1.13.2/libbb/pw_encrypt_des.c:697:#define DES_OUT_BUFSIZE 21
/busybox-1.13.2/libbb/pw_encrypt_des.c:701:des_crypt(struct des_ctx *ctx, char output[DES_OUT_BUFSIZE],
/busybox-1.13.2/libbb/pw_encrypt_des.c:718: des_setkey(ctx, (char *)keybuf);
/busybox-1.13.2/libbb/pw_encrypt_des.c:742: do_des(ctx, /*0, 0,*/ &r0, &r1, 25 /* count */);
/busybox-1.13.2/libbb/loop.c:37: int lo_encrypt_type;
/busybox-1.13.2/libbb/loop.c:38: int lo_encrypt_key_size;
/busybox-1.13.2/libbb/loop.c:41: unsigned char lo_encrypt_key[LO_KEY_SIZE];
/busybox-1.13.2/libbb/Kbuild:60:lib-y += md5.o
/busybox-1.13.2/libbb/Kbuild:88:lib-y += sha1.o
/busybox-1.13.2/libbb/Kbuild:121:lib-$(CONFIG_PASSWD) += pw_encrypt.o crypt_make_salt.o update_passwd.o
/busybox-1.13.2/libbb/Kbuild:122:lib-$(CONFIG_CHPASSWD) += pw_encrypt.o crypt_make_salt.o update_passwd.o
/busybox-1.13.2/libbb/Kbuild:123:lib-$(CONFIG_CRYPTPW) += pw_encrypt.o crypt_make_salt.o
/busybox-1.13.2/libbb/Kbuild:124:lib-$(CONFIG_SULOGIN) += pw_encrypt.o
/busybox-1.13.2/libbb/Kbuild:125:lib-$(CONFIG_FEATURE_HTTPD_AUTH_MD5) += pw_encrypt.o
/busybox-1.13.2/libbb/Kbuild:126:lib-$(CONFIG_VLOCK) += pw_encrypt.o correct_password.o
/busybox-1.13.2/libbb/Kbuild:127:lib-$(CONFIG_SU) += pw_encrypt.o correct_password.o
/busybox-1.13.2/libbb/Kbuild:128:lib-$(CONFIG_LOGIN) += pw_encrypt.o correct_password.o
/busybox-1.13.2/libbb/read.c:332: /* .lzma has no header/signature, just trust it */
/busybox-1.13.2/libbb/read.c:338: /* .gz and .bz2 both have 2-byte signature, and their
/busybox-1.13.2/libbb/pw_encrypt_md5.c:2: * MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm
/busybox-1.13.2/libbb/pw_encrypt_md5.c:4: * Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
/busybox-1.13.2/libbb/pw_encrypt_md5.c:8: * is identified as the "RSA Data Security, Inc. MD5 Message-Digest
/busybox-1.13.2/libbb/pw_encrypt_md5.c:13: * that such works are identified as "derived from the RSA Data
/busybox-1.13.2/libbb/pw_encrypt_md5.c:14: * Security, Inc. MD5 Message-Digest Algorithm" in all material
/busybox-1.13.2/libbb/pw_encrypt_md5.c:17: * RSA Data Security, Inc. makes no representations concerning either
/busybox-1.13.2/libbb/pw_encrypt_md5.c:27: * This code is the same as the code published by RSA Inc. It has been
/busybox-1.13.2/libbb/pw_encrypt_md5.c:31: * The md5_crypt() function was taken from freeBSD's libcrypt and contains
/busybox-1.13.2/libbb/pw_encrypt_md5.c:41: * On April 19th, 2001 md5_crypt() was modified to make it reentrant
/busybox-1.13.2/libbb/pw_encrypt_md5.c:54: * Reintroduced the loop unrolling in MD5_Transform and added the
/busybox-1.13.2/libbb/pw_encrypt_md5.c:55: * MD5_SIZE_OVER_SPEED option for configurability. Define below as:
/busybox-1.13.2/libbb/pw_encrypt_md5.c:72:#define MD5_SIZE_OVER_SPEED 3
/busybox-1.13.2/libbb/pw_encrypt_md5.c:76:/* MD5 context. */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:83:static void __md5_Init(struct MD5Context *);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:84:static void __md5_Update(struct MD5Context *, const unsigned char *, unsigned int);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:85:static void __md5_Pad(struct MD5Context *);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:86:static void __md5_Final(unsigned char [16], struct MD5Context *);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:87:static void __md5_Transform(uint32_t [4], const unsigned char [64]);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:90:#define MD5_MAGIC_STR "$1$"
/busybox-1.13.2/libbb/pw_encrypt_md5.c:91:#define MD5_MAGIC_LEN (sizeof(MD5_MAGIC_STR) - 1)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:92:static const unsigned char __md5__magic[] = MD5_MAGIC_STR;
/busybox-1.13.2/libbb/pw_encrypt_md5.c:96:#define __md5_Encode memcpy
/busybox-1.13.2/libbb/pw_encrypt_md5.c:97:#define __md5_Decode memcpy
/busybox-1.13.2/libbb/pw_encrypt_md5.c:101: * __md5_Encodes input (uint32_t) into output (unsigned char). Assumes len is
/busybox-1.13.2/libbb/pw_encrypt_md5.c:105:__md5_Encode(unsigned char *output, uint32_t *input, unsigned int len)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:118: * __md5_Decodes input (unsigned char) into output (uint32_t). Assumes len is
/busybox-1.13.2/libbb/pw_encrypt_md5.c:122:__md5_Decode(uint32_t *output, const unsigned char *input, unsigned int len)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:132:/* F, G, H and I are basic MD5 functions. */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:166:/* MD5 initialization. Begins an MD5 operation, writing a new context. */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:167:static void __md5_Init(struct MD5Context *context)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:179: * MD5 block update operation. Continues an MD5 message-digest
/busybox-1.13.2/libbb/pw_encrypt_md5.c:183:static void __md5_Update(struct MD5Context *context, const unsigned char *input, unsigned int inputLen)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:201: __md5_Transform(context->state, context->buffer);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:204: __md5_Transform(context->state, &input[i]);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:215: * MD5 padding. Adds padding followed by original length.
/busybox-1.13.2/libbb/pw_encrypt_md5.c:217:static void __md5_Pad(struct MD5Context *context)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:227: __md5_Encode(bits, context->count, 8);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:232: __md5_Update(context, PADDING, padLen);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:235: __md5_Update(context, bits, 8);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:239: * MD5 finalization. Ends an MD5 message-digest operation, writing the
/busybox-1.13.2/libbb/pw_encrypt_md5.c:242:static void __md5_Final(unsigned char digest[16], struct MD5Context *context)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:245: __md5_Pad(context);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:248: __md5_Encode(digest, context->state, 16);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:254:/* MD5 basic transformation. Transforms state based on block. */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:255:static void __md5_Transform(uint32_t state[4], const unsigned char block[64])
/busybox-1.13.2/libbb/pw_encrypt_md5.c:258:#if MD5_SIZE_OVER_SPEED > 1
/busybox-1.13.2/libbb/pw_encrypt_md5.c:268:#endif /* MD5_SIZE_OVER_SPEED > 1 */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:270:#if MD5_SIZE_OVER_SPEED > 0
/busybox-1.13.2/libbb/pw_encrypt_md5.c:305:#endif /* MD5_SIZE_OVER_SPEED > 0 */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:307: __md5_Decode(x, block, 64);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:311:#if MD5_SIZE_OVER_SPEED > 2
/busybox-1.13.2/libbb/pw_encrypt_md5.c:336:#elif MD5_SIZE_OVER_SPEED > 1
/busybox-1.13.2/libbb/pw_encrypt_md5.c:364:#elif MD5_SIZE_OVER_SPEED > 0
/busybox-1.13.2/libbb/pw_encrypt_md5.c:498:__md5_to64(char *s, unsigned v, int n)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:510: * Use MD5 for what it is best at...
/busybox-1.13.2/libbb/pw_encrypt_md5.c:512:#define MD5_OUT_BUFSIZE 36
/busybox-1.13.2/libbb/pw_encrypt_md5.c:515:md5_crypt(char passwd[MD5_OUT_BUFSIZE], const unsigned char *pw, const unsigned char *salt)
/busybox-1.13.2/libbb/pw_encrypt_md5.c:528:// if (!strncmp(sp, __md5__magic, MD5_MAGIC_LEN))
/busybox-1.13.2/libbb/pw_encrypt_md5.c:529: sp += MD5_MAGIC_LEN;
/busybox-1.13.2/libbb/pw_encrypt_md5.c:538: __md5_Init(&ctx);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:542: __md5_Update(&ctx, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:545: __md5_Update(&ctx, __md5__magic, MD5_MAGIC_LEN);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:548: __md5_Update(&ctx, sp, sl);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:550: /* Then just as many characters of the MD5(pw, salt, pw) */
/busybox-1.13.2/libbb/pw_encrypt_md5.c:551: __md5_Init(&ctx1);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:552: __md5_Update(&ctx1, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:553: __md5_Update(&ctx1, sp, sl);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:554: __md5_Update(&ctx1, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:555: __md5_Final(final, &ctx1);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:557: __md5_Update(&ctx, final, pl > 16 ? 16 : pl);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:565: __md5_Update(&ctx, ((i & 1) ? final : (const unsigned char *) pw), 1);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:575: __md5_Final(final, &ctx);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:583: __md5_Init(&ctx1);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:585: __md5_Update(&ctx1, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:587: __md5_Update(&ctx1, final, 16);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:590: __md5_Update(&ctx1, sp, sl);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:593: __md5_Update(&ctx1, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:596: __md5_Update(&ctx1, final, 16);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:598: __md5_Update(&ctx1, pw, pw_len);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:599: __md5_Final(final, &ctx1);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:608: p = __md5_to64(p, l, 4);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:610: p = __md5_to64(p, final[11], 2);
/busybox-1.13.2/libbb/pw_encrypt_md5.c:619:#undef MD5_SIZE_OVER_SPEED
/busybox-1.13.2/libbb/pw_encrypt_md5.c:620:#undef MD5_MAGIC_STR
/busybox-1.13.2/libbb/pw_encrypt_md5.c:621:#undef MD5_MAGIC_LEN
/busybox-1.13.2/libbb/pw_encrypt_md5.c:622:#undef __md5_Encode
/busybox-1.13.2/libbb/pw_encrypt_md5.c:623:#undef __md5_Decode
/busybox-1.13.2/libbb/getopt32.c:270: $ id; id -u; id -g; id -ru; id -nu; id -rg; id -ng; id -rnu; id -rng
/busybox-1.13.2/libbb/correct_password.c:75: encrypted = pw_encrypt(unencrypted, correct, 1);
/busybox-1.13.2/libbb/md5.c:3: * md5.c - Compute MD5 checksum of strings according to the
/busybox-1.13.2/libbb/md5.c:4: * definition of MD5 in RFC 1321 from April 1992.
/busybox-1.13.2/libbb/md5.c:18:#if CONFIG_MD5_SIZE_VS_SPEED < 0 || CONFIG_MD5_SIZE_VS_SPEED > 3
/busybox-1.13.2/libbb/md5.c:19:# define MD5_SIZE_VS_SPEED 2
/busybox-1.13.2/libbb/md5.c:21:# define MD5_SIZE_VS_SPEED CONFIG_MD5_SIZE_VS_SPEED
/busybox-1.13.2/libbb/md5.c:27:void FAST_FUNC md5_begin(md5_ctx_t *ctx)
/busybox-1.13.2/libbb/md5.c:38:/* These are the four functions used in the four steps of the MD5 algorithm
/busybox-1.13.2/libbb/md5.c:49:static void md5_hash_block(const void *buffer, md5_ctx_t *ctx)
/busybox-1.13.2/libbb/md5.c:54:# if MD5_SIZE_VS_SPEED > 0
/busybox-1.13.2/libbb/md5.c:79:# if MD5_SIZE_VS_SPEED > 1
/busybox-1.13.2/libbb/md5.c:81:# endif /* MD5_SIZE_VS_SPEED > 1 */
/busybox-1.13.2/libbb/md5.c:87:# if MD5_SIZE_VS_SPEED > 1
/busybox-1.13.2/libbb/md5.c:94:# endif /* MD5_SIZE_VS_SPEED > 1 */
/busybox-1.13.2/libbb/md5.c:110:# if MD5_SIZE_VS_SPEED > 1
/busybox-1.13.2/libbb/md5.c:124:# if MD5_SIZE_VS_SPEED > 2
/busybox-1.13.2/libbb/md5.c:200:# endif /* MD5_SIZE_VS_SPEED > 2 */
/busybox-1.13.2/libbb/md5.c:228:# if MD5_SIZE_VS_SPEED == 1
/busybox-1.13.2/libbb/md5.c:232:# endif /* MD5_SIZE_VS_SPEED */
/busybox-1.13.2/libbb/md5.c:235:# if MD5_SIZE_VS_SPEED == 1
/busybox-1.13.2/libbb/md5.c:260:# endif /* MD5_SIZE_VS_SPEED == 1 */
/busybox-1.13.2/libbb/md5.c:274:# if MD5_SIZE_VS_SPEED == 1
/busybox-1.13.2/libbb/md5.c:299:# endif /* MD5_SIZE_VS_SPEED == 1 */
/busybox-1.13.2/libbb/md5.c:302:# if MD5_SIZE_VS_SPEED == 1
/busybox-1.13.2/libbb/md5.c:326:# endif /* MD5_SIZE_VS_SPEED == 1 */
/busybox-1.13.2/libbb/md5.c:329:# if MD5_SIZE_VS_SPEED == 1
/busybox-1.13.2/libbb/md5.c:353:# endif /* MD5_SIZE_VS_SPEED == 1 */
/busybox-1.13.2/libbb/md5.c:354:# endif /* MD5_SIZE_VS_SPEED > 1 */
/busybox-1.13.2/libbb/md5.c:369:/* Feed data through a temporary buffer to call md5_hash_aligned_block()
/busybox-1.13.2/libbb/md5.c:372: * bytes worth to pass on. Call md5_end() to flush this buffer. */
/busybox-1.13.2/libbb/md5.c:374:void FAST_FUNC md5_hash(const void *buffer, size_t len, md5_ctx_t *ctx)
/busybox-1.13.2/libbb/md5.c:399: md5_hash_block(ctx->buffer, ctx);
/busybox-1.13.2/libbb/md5.c:413:void* FAST_FUNC md5_end(void *resbuf, md5_ctx_t *ctx)
/busybox-1.13.2/libbb/md5.c:429: if (buf != ctx->buffer) md5_hash_block(ctx->buffer, ctx);
/busybox-1.13.2/libbb/md5.c:430: md5_hash_block(buf, ctx);
/busybox-1.13.2/libbb/sha1.c:4: * Majorly hacked up to use Dr Brian Gladman's sha1 code
/busybox-1.13.2/libbb/sha1.c:15: * This is a byte oriented version of SHA1 that operates on arrays of bytes
/busybox-1.13.2/libbb/sha1.c:21:#define SHA1_BLOCK_SIZE 64
/busybox-1.13.2/libbb/sha1.c:22:#define SHA1_DIGEST_SIZE 20
/busybox-1.13.2/libbb/sha1.c:23:#define SHA1_HASH_SIZE SHA1_DIGEST_SIZE
/busybox-1.13.2/libbb/sha1.c:29:#define SHA1_MASK (SHA1_BLOCK_SIZE - 1)
/busybox-1.13.2/libbb/sha1.c:44:static void sha1_compile(sha1_ctx_t *ctx)
/busybox-1.13.2/libbb/sha1.c:51: for (i = 0; i < SHA1_BLOCK_SIZE / 4; ++i)
/busybox-1.13.2/libbb/sha1.c:54: for (i = SHA1_BLOCK_SIZE / 4; i < 80; ++i)
/busybox-1.13.2/libbb/sha1.c:86:void FAST_FUNC sha1_begin(sha1_ctx_t *ctx)
/busybox-1.13.2/libbb/sha1.c:96:/* SHA1 hash data in an array of bytes into hash buffer and call the */
/busybox-1.13.2/libbb/sha1.c:98:void FAST_FUNC sha1_hash(const void *data, size_t length, sha1_ctx_t *ctx)
/busybox-1.13.2/libbb/sha1.c:100: uint32_t pos = (uint32_t) (ctx->count[0] & SHA1_MASK);
/busybox-1.13.2/libbb/sha1.c:101: uint32_t freeb = SHA1_BLOCK_SIZE - pos;
/busybox-1.13.2/libbb/sha1.c:111: freeb = SHA1_BLOCK_SIZE;
/busybox-1.13.2/libbb/sha1.c:113: sha1_compile(ctx);
/busybox-1.13.2/libbb/sha1.c:119:void* FAST_FUNC sha1_end(void *resbuf, sha1_ctx_t *ctx)
/busybox-1.13.2/libbb/sha1.c:121: /* SHA1 Final padding and digest calculation */
/busybox-1.13.2/libbb/sha1.c:131: uint32_t i, cnt = (uint32_t) (ctx->count[0] & SHA1_MASK);
/busybox-1.13.2/libbb/sha1.c:144: if (cnt > SHA1_BLOCK_SIZE - 9) {
/busybox-1.13.2/libbb/sha1.c:147: sha1_compile(ctx);
/busybox-1.13.2/libbb/sha1.c:161: sha1_compile(ctx);
/busybox-1.13.2/libbb/sha1.c:166: for (i = 0; i < SHA1_DIGEST_SIZE; ++i)
/busybox-1.13.2/libbb/Config.in:15:config MD5_SIZE_VS_SPEED
/busybox-1.13.2/libbb/Config.in:16: int "MD5: Trade Bytes for Speed"
/busybox-1.13.2/libbb/pw_encrypt.c:15: * DES and MD5 crypt implementations are taken from uclibc.
/busybox-1.13.2/libbb/pw_encrypt.c:20:#include "pw_encrypt_des.c"
/busybox-1.13.2/libbb/pw_encrypt.c:21:#include "pw_encrypt_md5.c"
/busybox-1.13.2/libbb/pw_encrypt.c:24:/* $2$ or $2a$: Blowfish */
/busybox-1.13.2/libbb/pw_encrypt.c:25:/* $5$: SHA-256 */
/busybox-1.13.2/libbb/pw_encrypt.c:26:/* $6$: SHA-512 */
/busybox-1.13.2/libbb/pw_encrypt.c:27:/* TODO: implement SHA - http://people.redhat.com/drepper/SHA-crypt.txt */
/busybox-1.13.2/libbb/pw_encrypt.c:29:static struct const_des_ctx *des_cctx;
/busybox-1.13.2/libbb/pw_encrypt.c:30:static struct des_ctx *des_ctx;
/busybox-1.13.2/libbb/pw_encrypt.c:35: /* First, check if we are supposed to be using the MD5 replacement
/busybox-1.13.2/libbb/pw_encrypt.c:36: * instead of DES... */
/busybox-1.13.2/libbb/pw_encrypt.c:38: return md5_crypt(xzalloc(MD5_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
/busybox-1.13.2/libbb/pw_encrypt.c:42: if (!des_cctx)
/busybox-1.13.2/libbb/pw_encrypt.c:43: des_cctx = const_des_init();
/busybox-1.13.2/libbb/pw_encrypt.c:44: des_ctx = des_init(des_ctx, des_cctx);
/busybox-1.13.2/libbb/pw_encrypt.c:45: return des_crypt(des_ctx, xzalloc(DES_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
/busybox-1.13.2/libbb/pw_encrypt.c:52: free(des_cctx);
/busybox-1.13.2/libbb/pw_encrypt.c:53: free(des_ctx);
/busybox-1.13.2/libbb/pw_encrypt.c:54: des_cctx = NULL;
/busybox-1.13.2/libbb/pw_encrypt.c:55: des_ctx = NULL;
/busybox-1.13.2/libbb/pw_encrypt.c:58:char* FAST_FUNC pw_encrypt(const char *clear, const char *salt, int cleanup)
/busybox-1.13.2/libbb/pw_encrypt.c:72:char* FAST_FUNC pw_encrypt(const char *clear, const char *salt, int cleanup)
/busybox-1.13.2/modutils/Config.in:213: alias padlock_aes aes
/busybox-1.13.2/modutils/Config.in:214: alias aes_i586 aes
/busybox-1.13.2/modutils/Config.in:215: alias aes_generic aes
|