Home
last modified time | relevance | path

Searched refs:CIPHERTEXT_LENGTH (Results 1 – 25 of 121) sorted by relevance

12345

/dports/security/john/john-1.9.0-jumbo-1/src/
H A DasaMD5_fmt_plug.c33 #define CIPHERTEXT_LENGTH 21 macro
63 if (len > CIPHERTEXT_LENGTH_MIN && len <= CIPHERTEXT_LENGTH) { in Convert()
87 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid()
88 if (i > CIPHERTEXT_LENGTH) in valid()
90 if (i == CIPHERTEXT_LENGTH) in valid()
102 if (strnlen(split_fields[1], CIPHERTEXT_LENGTH + 1) > CIPHERTEXT_LENGTH) in prepare()
H A DpixMD5_fmt_plug.c33 #define CIPHERTEXT_LENGTH 16 macro
65 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH) { in Convert()
89 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid()
90 if (i > CIPHERTEXT_LENGTH) in valid()
92 if (i == CIPHERTEXT_LENGTH) in valid()
H A Dmysql_fmt_plug.c61 #define CIPHERTEXT_LENGTH 16 macro
115 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid()
118 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in valid()
127 static char out[CIPHERTEXT_LENGTH + 1]; in split()
129 memcpy(out, ciphertext, CIPHERTEXT_LENGTH); in split()
130 out[CIPHERTEXT_LENGTH] = 0; in split()
H A Dstribog_fmt_plug.c53 #define CIPHERTEXT_LENGTH CIPHERTEXT256_LENGTH macro
119 make_static_buf(char, out, TAG_LENGTH + CIPHERTEXT_LENGTH + 1); in split_256()
123 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split_256()
135 if (strlen(p) != CIPHERTEXT_LENGTH) in valid_256()
164 #undef CIPHERTEXT_LENGTH
168 #define CIPHERTEXT_LENGTH CIPHERTEXT512_LENGTH macro
172 make_static_buf(char, out, TAG_LENGTH + CIPHERTEXT_LENGTH + 1); in split_512()
176 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split_512()
188 if (strlen(p) != CIPHERTEXT_LENGTH) in valid_512()
217 #undef CIPHERTEXT_LENGTH
H A Doracle_fmt_plug.c44 #define CIPHERTEXT_LENGTH 16 macro
45 #define MAX_INPUT_LEN (CIPHERTEXT_LENGTH + 3 + MAX_USERNAME_LEN * (options.input_enc == U…
123 l = strlen(ciphertext) - CIPHERTEXT_LENGTH; in valid()
147 if (strlen(ciphertext)!=CIPHERTEXT_LENGTH) in valid()
151 for (i = l; i < l + CIPHERTEXT_LENGTH; i++){ in valid()
169 if (strnlen(split_fields[1], CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH) { in prepare()
198 static char out[FORMAT_TAG_LEN + sizeof(cur_salt) + 1 + CIPHERTEXT_LENGTH]; in split()
320 l = strlen(ciphertext) - CIPHERTEXT_LENGTH; in get_binary()
H A DHDAA_fmt_plug.c41 #define CIPHERTEXT_LENGTH 32 macro
483 len = CIPHERTEXT_LENGTH - 1; in crypt_all()
484 key = rinfo->h3tmp + CIPHERTEXT_LENGTH; in crypt_all()
567 __m64 conv[CIPHERTEXT_LENGTH / sizeof(__m64) + 1]; in crypt_all()
585 memcpy(h3tmp, conv, CIPHERTEXT_LENGTH); in crypt_all()
629 __m64 conv[CIPHERTEXT_LENGTH / sizeof(__m64) + 1]; in get_salt()
632 uint32_t conv[(CIPHERTEXT_LENGTH / sizeof(uint32_t)) + 1]; in get_salt()
659 memset(conv, 0, CIPHERTEXT_LENGTH + 1); in get_salt()
668 snprintf(&r->h3tmp[CIPHERTEXT_LENGTH], HTMP - CIPHERTEXT_LENGTH, ":%s:%s", in get_salt()
671 snprintf(&r->h3tmp[CIPHERTEXT_LENGTH], HTMP - CIPHERTEXT_LENGTH, ":%s:%s:%s:%s:%s", in get_salt()
[all …]
H A Ddrupal7_common.h26 #define CIPHERTEXT_LENGTH 55 macro
46 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid()
50 for (i = FORMAT_TAG_LEN; i < CIPHERTEXT_LENGTH; ++i) in valid()
H A Dphpass_common_plug.c60 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != in phpass_common_valid()
61 CIPHERTEXT_LENGTH) in phpass_common_valid()
67 for (i = FORMAT_TAG_LEN; i < CIPHERTEXT_LENGTH; ++i) in phpass_common_valid()
116 static char out[CIPHERTEXT_LENGTH + 1]; in phpass_common_split()
H A Do5logon_fmt_plug.c48 #define CIPHERTEXT_LENGTH 48 macro
84 unsigned char ct[CIPHERTEXT_LENGTH]; /* Server's AUTH_SESSKEY */
85 unsigned char csk[CIPHERTEXT_LENGTH]; /* Client's AUTH_SESSKEY */
136 if (hexlenu(p, &extra) != CIPHERTEXT_LENGTH * 2 || extra) in valid()
150 if (hexlenu(p, &extra) != CIPHERTEXT_LENGTH * 2 || extra) in valid()
172 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in get_salt()
187 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in get_salt()
H A DMSCHAPv2_bs_fmt_plug.c77 #define CIPHERTEXT_LENGTH 48 macro
78 #define TOTAL_LENGTH 13 + USERNAME_LENGTH + CHALLENGE_LENGTH + CIPHERTEXT_LENGTH
166 if ( !(*pos2 && (pos2 - pos == CIPHERTEXT_LENGTH)) ) in valid_long()
210 if ( !(*pos2 && (pos2 - pos == CIPHERTEXT_LENGTH)) ) in valid_short()
272 if (cp3 && cp3-cp2 == CIPHERTEXT_LENGTH && (strlen(cp3) > 2 || cp3[2] != '$')) { in prepare()
282 strlen(split_fields[4]) == CIPHERTEXT_LENGTH && in prepare()
287 strlen(split_fields[4]) == CIPHERTEXT_LENGTH) in prepare()
569 memcpy(&pos[16], &ciphertext[42], CIPHERTEXT_LENGTH+2); in long_to_short()
570 pos[16+CIPHERTEXT_LENGTH+2] = '$'; in long_to_short()
571 pos[16+CIPHERTEXT_LENGTH+3] = 0; in long_to_short()
H A DmysqlSHA1_fmt_plug.c59 #define CIPHERTEXT_LENGTH 41 macro
117 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) return 0;
120 for (i = 1; i < CIPHERTEXT_LENGTH; i++) {
133 static char out[CIPHERTEXT_LENGTH + 1]; in split()
H A DrawMD5_fmt_plug.c53 #define CIPHERTEXT_LENGTH 32 macro
139 static char out[CIPHERTEXT_LENGTH + 1]; in prepare()
165 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
170 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1] = FORMAT_TAG; in split()
176 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
222 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1] = FORMAT_TAG; in source()
H A Dradmin_fmt_plug.c41 #define CIPHERTEXT_LENGTH 32 macro
85 static char buf[CIPHERTEXT_LENGTH + FORMAT_TAG_LEN + 1]; // $radmin2$ is 9 bytes in split()
87 strnzcpylwr(buf, ciphertext, CIPHERTEXT_LENGTH + FORMAT_TAG_LEN + 1); in split()
100 if (hexlen(p, &extra) != CIPHERTEXT_LENGTH || extra) in valid()
H A Dsha3_512_fmt_plug.c39 #define CIPHERTEXT_LENGTH 128 macro
95 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
100 static char out[8 + CIPHERTEXT_LENGTH + 1]; in split()
106 memcpylwr(out + 8, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
H A DBFEgg_fmt_plug.c38 #define CIPHERTEXT_LENGTH 13 macro
73 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) return 0; in valid()
76 if (*pos || pos - ciphertext != CIPHERTEXT_LENGTH) return 0; in valid()
H A DrawKeccak_256_fmt_plug.c43 #define CIPHERTEXT_LENGTH 64 macro
104 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
109 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1]; in split()
115 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
H A DrawKeccak_512_fmt_plug.c39 #define CIPHERTEXT_LENGTH 128 macro
100 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
105 static char out[FORMAT_TAG_LEN + CIPHERTEXT_LENGTH + 1]; in split()
111 memcpylwr(out + FORMAT_TAG_LEN, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
H A Dsiemens-s7_fmt_plug.c40 #define CIPHERTEXT_LENGTH (1 + 10 + 1 + 1 + 1 + 40 + 1 + 40) macro
96 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid()
127 static char out[CIPHERTEXT_LENGTH+1]; in split()
129 strnzcpy(out, ciphertext, CIPHERTEXT_LENGTH+1); in split()
H A DFG2_fmt_plug.c55 #define CIPHERTEXT_LENGTH 60 macro
56 #define HASH_LENGTH CIPHERTEXT_LENGTH + 3
117 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_salt()
149 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_binary()
H A DEPI_fmt_plug.c35 #define CIPHERTEXT_LENGTH 105 macro
98 len = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid()
100 if (len != CIPHERTEXT_LENGTH) in valid()
112 for (n = 65; n < CIPHERTEXT_LENGTH && in valid()
H A DFGT_fmt_plug.c49 #define CIPHERTEXT_LENGTH 44 macro
50 #define HASH_LENGTH CIPHERTEXT_LENGTH + 3
124 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_salt()
156 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_binary()
H A Dgost_fmt_plug.c52 #define CIPHERTEXT_LENGTH 64 macro
116 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
122 static char out[TAG_CP_LENGTH + CIPHERTEXT_LENGTH + 1]; in split()
132 memcpy(cp, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
H A DrawBLAKE2_512_fmt_plug.c47 #define CIPHERTEXT_LENGTH 128 macro
107 return !*q && q - p == CIPHERTEXT_LENGTH; in valid()
112 static char out[FORMAT_TAG_LEN + CIPHERTEXT_LENGTH + 1]; in split()
118 memcpylwr(out + FORMAT_TAG_LEN, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
H A Dhmailserver_fmt_plug.c56 #define CIPHERTEXT_LENGTH 64 macro
112 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + SALT_SIZE + 1); in hmailserver_valid()
114 if (i != CIPHERTEXT_LENGTH + SALT_SIZE) in hmailserver_valid()
H A Dformspring_fmt_plug.c56 #define CIPHERTEXT_LENGTH (SALT_SIZE + 1 + HEX_SIZE) macro
107 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH && in formspring_valid()

12345