PATH: //usr/include/proftpd
FILE_BARU
CREATE
FOLDER_BARU
MKDIR
UPLOAD_FILE
GO
[ .. KEMBALI ]
📄 ascii.h
↓
X
📄 auth.h
↓
X
📄 base.h
↓
X
📄 bindings.h
↓
X
📄 buildstamp.h
↓
X
📄 ccan-json.h
↓
X
📄 child.h
↓
X
📄 class.h
↓
X
📄 cmd.h
↓
X
📄 compat.h
↓
X
📄 conf.h
↓
X
📄 config.h
↓
X
📄 configdb.h
↓
X
📄 ctrls.h
↓
X
📄 data.h
↓
X
📄 default_paths.h
↓
X
📄 dirtree.h
↓
X
📄 display.h
↓
X
📄 encode.h
↓
X
📄 env.h
↓
X
📄 error.h
↓
X
📄 event.h
↓
X
📄 expr.h
↓
X
📄 feat.h
↓
X
📄 filter.h
↓
X
📄 fsio.h
↓
X
📄 ftp.h
↓
X
📄 glibc-glob.h
↓
X
📄 hanson-tpl.h
↓
X
📄 help.h
↓
X
📄 ident.h
↓
X
📄 inet.h
↓
X
📄 jot.h
↓
X
📄 json.h
↓
X
📄 lastlog.h
↓
X
📄 log.h
↓
X
📄 logfmt.h
↓
X
📄 memcache.h
↓
X
📄 mkhome.h
↓
X
📄 mod_ctrls.h
↓
X
📄 mod_sftp.h
↓
X
📄 mod_tls.h
↓
X
📄 modules.h
↓
X
📄 netacl.h
↓
X
📄 netaddr.h
↓
X
📄 netio.h
↓
X
📄 openbsd-blowfish.h
↓
X
📄 options.h
↓
X
📄 os.h
↓
X
📄 parser.h
↓
X
📄 pidfile.h
↓
X
📄 pool.h
↓
X
📄 pr-syslog.h
↓
X
📄 privs.h
↓
X
📄 proctitle.h
↓
X
📄 proftpd.h
↓
X
📄 random.h
↓
X
📄 redis.h
↓
X
📄 regexp.h
↓
X
📄 response.h
↓
X
📄 rlimit.h
↓
X
📄 scoreboard.h
↓
X
📄 session.h
↓
X
📄 sets.h
↓
X
📄 signals.h
↓
X
📄 stash.h
↓
X
📄 str.h
↓
X
📄 support.h
↓
X
📄 table.h
↓
X
📄 throttle.h
↓
X
📄 timers.h
↓
X
📄 trace.h
↓
X
📄 utf8.h
↓
X
📄 var.h
↓
X
📄 version.h
↓
X
📄 xferlog.h
↓
X
SAVING...
BERHASIL DIUBAH!
EDITING: openbsd-blowfish.h
/* * Blowfish - a fast block cipher designed by Bruce Schneier * * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #ifndef _BLF_H_ #define _BLF_H_ #include "os.h" /* Schneier states the maximum key length to be 56 bytes. * The way how the subkeys are initialized by the key up * to (N+2)*4 i.e. 72 bytes are utilized. * Warning: For normal blowfish encryption only 56 bytes * of the key affect all cipherbits. */ #define BLF_N 16 /* Number of Subkeys */ #define BLF_MAXKEYLEN ((BLF_N-2)*4) /* 448 bits */ #define BLF_MAXUTILIZED ((BLF_N+2)*4) /* 576 bits */ /* Blowfish context */ typedef struct BlowfishContext { u_int32_t S[4][256]; /* S-Boxes */ u_int32_t P[BLF_N + 2]; /* Subkeys */ } blf_ctx; /* Raw access to customized Blowfish * blf_key is just: * Blowfish_initstate( state ) * Blowfish_expand0state( state, key, keylen ) */ void Blowfish_encipher(blf_ctx *, u_int32_t *); void Blowfish_decipher(blf_ctx *, u_int32_t *); void Blowfish_initstate(blf_ctx *); void Blowfish_expand0state(blf_ctx *, const u_int8_t *, u_int16_t); void Blowfish_expandstate(blf_ctx *, const u_int8_t *, u_int16_t, const u_int8_t *, u_int16_t); /* Standard Blowfish */ void blf_key(blf_ctx *, const u_int8_t *, u_int16_t); void blf_enc(blf_ctx *, u_int32_t *, u_int16_t); void blf_dec(blf_ctx *, u_int32_t *, u_int16_t); /* Converts u_int8_t to u_int32_t */ u_int32_t Blowfish_stream2word(const u_int8_t *, u_int16_t , u_int16_t *); int bcrypt_hashpass(const char *, const char *, char *, size_t); #endif
SIMPAN PERUBAHAN