Home
last modified time | relevance | path

Searched refs:pwlen (Results 126 – 150 of 298) sorted by relevance

12345678910>>...12

/dports/net/tshark/wireshark-3.6.1/epan/dissectors/asn1/pkcs12/
H A Dpacket-pkcs12-template.c84 size_t pwlen; in generate_key_or_iv() local
98 pwlen = 0; in generate_key_or_iv()
100 pwlen = strlen(pw); in generate_key_or_iv()
102 if (pwlen > 63 / 2) in generate_key_or_iv()
117 if (++j > pwlen) /* Note, that we include the trailing zero */ in generate_key_or_iv()
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/asn1/pkcs12/
H A Dpacket-pkcs12-template.c84 size_t pwlen; in generate_key_or_iv() local
98 pwlen = 0; in generate_key_or_iv()
100 pwlen = strlen(pw); in generate_key_or_iv()
102 if (pwlen > 63 / 2) in generate_key_or_iv()
117 if (++j > pwlen) /* Note, that we include the trailing zero */ in generate_key_or_iv()
/dports/net-mgmt/ettercap/ettercap-0.8.3.1/src/dissectors/
H A Dec_o5logon.c192 int pwlen = 0; in FUNC_DECODER() local
195 pwlen = 0x60; in FUNC_DECODER()
199 pwlen = 0x40; in FUNC_DECODER()
205 for (i = 0; i < 2 * pwlen; i++) { in FUNC_DECODER()
210 password[pwlen] = 0; in FUNC_DECODER()
H A Dec_smb.c242 u_int16 pwlen, unilen; in FUNC_DECODER() local
249 pwlen = phtos(ptr); /* ANSI password len */ in FUNC_DECODER()
253 if (pwlen > 1) in FUNC_DECODER()
259 Blob = GetUser(Blob+pwlen+unilen, session_data->user, 200); in FUNC_DECODER()
/dports/games/xnethack/xNetHack-xnh6.1/sys/unix/
H A Dunixmain.c646 int pwlen; in check_user_string() local
658 pwlen = (int) strlen(pwname); in check_user_string()
661 while (w + pwlen <= eop) { in check_user_string()
668 if (!strncmp(w, pwname, pwlen)) { in check_user_string()
669 if (!w[pwlen] || isspace(w[pwlen])) in check_user_string()
/dports/security/gopass/gopass-1.13.0/vendor/github.com/muesli/crunchy/
H A Dcrunchy.go122 pwlen := len(pw)
126 if pwlen <= v.wordsMaxLen {
144 if pwlen <= v.wordsMaxLen+v.options.MinDist {
/dports/net-mgmt/sysmon/sysmon-0.93/src/
H A Dradius.c335 int pwlen = 0; in send_radius_packet() local
354 gen_passwd(packet+packetindex+2, &pwlen, here->checkent->password, in send_radius_packet()
356 packet[packetindex+1] = 2+pwlen; in send_radius_packet()
357 packetindex = packetindex+2+pwlen; in send_radius_packet()
/dports/security/openconnect/openconnect-8.10/
H A Dgnutls_tpm2_esys.c171 int pwlen = strlen(pass); in install_tpm_passphrase() local
173 if (pwlen > sizeof(auth->buffer) - 1) { in install_tpm_passphrase()
176 pwlen = sizeof(auth->buffer) - 1; in install_tpm_passphrase()
178 auth->size = pwlen; in install_tpm_passphrase()
179 memcpy(auth->buffer, pass, pwlen); in install_tpm_passphrase()
180 pass[pwlen] = 0; in install_tpm_passphrase()
/dports/net/librdkafka/librdkafka-1.8.2/src/
H A Drdkafka_cert.c53 int pwlen; in rd_kafka_conf_ssl_passwd_cb() local
58 pwlen = (int) strlen(conf->ssl.key_password); in rd_kafka_conf_ssl_passwd_cb()
59 memcpy(buf, conf->ssl.key_password, RD_MIN(pwlen, size)); in rd_kafka_conf_ssl_passwd_cb()
61 return pwlen; in rd_kafka_conf_ssl_passwd_cb()
/dports/sysutils/vector/vector-0.10.0/cargo-crates/rdkafka-sys-2.0.0+1.4.2/librdkafka/src/
H A Drdkafka_cert.c53 int pwlen; in rd_kafka_conf_ssl_passwd_cb() local
58 pwlen = (int) strlen(conf->ssl.key_password); in rd_kafka_conf_ssl_passwd_cb()
59 memcpy(buf, conf->ssl.key_password, RD_MIN(pwlen, size)); in rd_kafka_conf_ssl_passwd_cb()
61 return pwlen; in rd_kafka_conf_ssl_passwd_cb()
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/plugins/out_kafka/librdkafka-1.7.0/src/
H A Drdkafka_cert.c53 int pwlen; in rd_kafka_conf_ssl_passwd_cb() local
58 pwlen = (int) strlen(conf->ssl.key_password); in rd_kafka_conf_ssl_passwd_cb()
59 memcpy(buf, conf->ssl.key_password, RD_MIN(pwlen, size)); in rd_kafka_conf_ssl_passwd_cb()
61 return pwlen; in rd_kafka_conf_ssl_passwd_cb()
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/windows/npt/
H A Dutf_md.c72 getWideString(UINT codePage, char* str, int len, int *pwlen) in getWideString() argument
79 *pwlen = wlen; in getWideString()
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/windows/npt/
H A Dutf_md.c72 getWideString(UINT codePage, char* str, int len, int *pwlen) in getWideString() argument
79 *pwlen = wlen; in getWideString()
/dports/net/owamp/owamp-3.3/I2util/test/
H A Dpbkdf2test.c53 uint32_t pwlen, in DoTestCase() argument
82 if( (I2pbkdf2(I2HMACSha1,(uint32_t)I2SHA1_DIGEST_SIZE,(uint8_t *)pw,pwlen, in DoTestCase()
/dports/net-im/tox/c-toxcore-0.2.13/auto_tests/
H A Dencryptsave_test.c26 static unsigned int pwlen = 7; variable
49 pwlen, in test_known_kdf()
116 ret = tox_pass_decrypt(encdata2, size2, (const uint8_t *)pw, pwlen, out1, &err3); in test_save_friend()
/dports/games/xnethack/xNetHack-xnh6.1/sys/libnh/
H A Dlibnhmain.c643 int pwlen; in check_user_string() local
655 pwlen = (int) strlen(pwname); in check_user_string()
658 while (w + pwlen <= eop) { in check_user_string()
665 if (!strncmp(w, pwname, pwlen)) { in check_user_string()
666 if (!w[pwlen] || isspace(w[pwlen])) in check_user_string()
/dports/net/cloud-init/cloud-init-21.4/cloudinit/config/
H A Dcc_set_passwords.py232 def rand_user_password(pwlen=20): argument
233 return util.rand_str(pwlen, select_from=PW_SET)
/dports/x11-fm/wcmcommander/WCMCommander-release-0.20.0/src/libtester/
H A Dlibsmb40_test.cpp3 … const char* srv, const char* shr, char* wg, int wglen, char* un, int unlen, char* pw, int pwlen ) in smbcAuth() argument
H A Dlibsmb_test.cpp3 … const char* srv, const char* shr, char* wg, int wglen, char* un, int unlen, char* pw, int pwlen ) in smbcAuth() argument
/dports/net/owamp/owamp-3.3/I2util/I2util/
H A Dpbkdf2.h52 uint32_t pwlen,
/dports/net/hostapd/hostapd-2.9/src/crypto/
H A Daes_siv.h13 const u8 *pw, size_t pwlen,
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/
H A Daes_siv.h13 const u8 *pw, size_t pwlen,
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes_siv.h13 const u8 *pw, size_t pwlen,
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/
H A Daes_siv.h13 const u8 *pw, size_t pwlen,
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/
H A Daes_siv.h13 const u8 *pw, size_t pwlen,

12345678910>>...12