/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | asaMD5_fmt_plug.c | 33 #define CIPHERTEXT_LENGTH 21 macro 63 if (len > CIPHERTEXT_LENGTH_MIN && len <= CIPHERTEXT_LENGTH) { in Convert() 87 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid() 88 if (i > CIPHERTEXT_LENGTH) in valid() 90 if (i == CIPHERTEXT_LENGTH) in valid() 102 if (strnlen(split_fields[1], CIPHERTEXT_LENGTH + 1) > CIPHERTEXT_LENGTH) in prepare()
|
H A D | pixMD5_fmt_plug.c | 33 #define CIPHERTEXT_LENGTH 16 macro 65 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH) { in Convert() 89 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid() 90 if (i > CIPHERTEXT_LENGTH) in valid() 92 if (i == CIPHERTEXT_LENGTH) in valid()
|
H A D | mysql_fmt_plug.c | 61 #define CIPHERTEXT_LENGTH 16 macro 115 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid() 118 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in valid() 127 static char out[CIPHERTEXT_LENGTH + 1]; in split() 129 memcpy(out, ciphertext, CIPHERTEXT_LENGTH); in split() 130 out[CIPHERTEXT_LENGTH] = 0; in split()
|
H A D | stribog_fmt_plug.c | 53 #define CIPHERTEXT_LENGTH CIPHERTEXT256_LENGTH macro 119 make_static_buf(char, out, TAG_LENGTH + CIPHERTEXT_LENGTH + 1); in split_256() 123 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split_256() 135 if (strlen(p) != CIPHERTEXT_LENGTH) in valid_256() 164 #undef CIPHERTEXT_LENGTH 168 #define CIPHERTEXT_LENGTH CIPHERTEXT512_LENGTH macro 172 make_static_buf(char, out, TAG_LENGTH + CIPHERTEXT_LENGTH + 1); in split_512() 176 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split_512() 188 if (strlen(p) != CIPHERTEXT_LENGTH) in valid_512() 217 #undef CIPHERTEXT_LENGTH
|
H A D | oracle_fmt_plug.c | 44 #define CIPHERTEXT_LENGTH 16 macro 45 #define MAX_INPUT_LEN (CIPHERTEXT_LENGTH + 3 + MAX_USERNAME_LEN * (options.input_enc == U… 123 l = strlen(ciphertext) - CIPHERTEXT_LENGTH; in valid() 147 if (strlen(ciphertext)!=CIPHERTEXT_LENGTH) in valid() 151 for (i = l; i < l + CIPHERTEXT_LENGTH; i++){ in valid() 169 if (strnlen(split_fields[1], CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH) { in prepare() 198 static char out[FORMAT_TAG_LEN + sizeof(cur_salt) + 1 + CIPHERTEXT_LENGTH]; in split() 320 l = strlen(ciphertext) - CIPHERTEXT_LENGTH; in get_binary()
|
H A D | HDAA_fmt_plug.c | 41 #define CIPHERTEXT_LENGTH 32 macro 483 len = CIPHERTEXT_LENGTH - 1; in crypt_all() 484 key = rinfo->h3tmp + CIPHERTEXT_LENGTH; in crypt_all() 567 __m64 conv[CIPHERTEXT_LENGTH / sizeof(__m64) + 1]; in crypt_all() 585 memcpy(h3tmp, conv, CIPHERTEXT_LENGTH); in crypt_all() 629 __m64 conv[CIPHERTEXT_LENGTH / sizeof(__m64) + 1]; in get_salt() 632 uint32_t conv[(CIPHERTEXT_LENGTH / sizeof(uint32_t)) + 1]; in get_salt() 659 memset(conv, 0, CIPHERTEXT_LENGTH + 1); in get_salt() 668 snprintf(&r->h3tmp[CIPHERTEXT_LENGTH], HTMP - CIPHERTEXT_LENGTH, ":%s:%s", in get_salt() 671 snprintf(&r->h3tmp[CIPHERTEXT_LENGTH], HTMP - CIPHERTEXT_LENGTH, ":%s:%s:%s:%s:%s", in get_salt() [all …]
|
H A D | drupal7_common.h | 26 #define CIPHERTEXT_LENGTH 55 macro 46 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid() 50 for (i = FORMAT_TAG_LEN; i < CIPHERTEXT_LENGTH; ++i) in valid()
|
H A D | phpass_common_plug.c | 60 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != in phpass_common_valid() 61 CIPHERTEXT_LENGTH) in phpass_common_valid() 67 for (i = FORMAT_TAG_LEN; i < CIPHERTEXT_LENGTH; ++i) in phpass_common_valid() 116 static char out[CIPHERTEXT_LENGTH + 1]; in phpass_common_split()
|
H A D | o5logon_fmt_plug.c | 48 #define CIPHERTEXT_LENGTH 48 macro 84 unsigned char ct[CIPHERTEXT_LENGTH]; /* Server's AUTH_SESSKEY */ 85 unsigned char csk[CIPHERTEXT_LENGTH]; /* Client's AUTH_SESSKEY */ 136 if (hexlenu(p, &extra) != CIPHERTEXT_LENGTH * 2 || extra) in valid() 150 if (hexlenu(p, &extra) != CIPHERTEXT_LENGTH * 2 || extra) in valid() 172 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in get_salt() 187 for (i = 0; i < CIPHERTEXT_LENGTH; i++) in get_salt()
|
H A D | MSCHAPv2_bs_fmt_plug.c | 77 #define CIPHERTEXT_LENGTH 48 macro 78 #define TOTAL_LENGTH 13 + USERNAME_LENGTH + CHALLENGE_LENGTH + CIPHERTEXT_LENGTH 166 if ( !(*pos2 && (pos2 - pos == CIPHERTEXT_LENGTH)) ) in valid_long() 210 if ( !(*pos2 && (pos2 - pos == CIPHERTEXT_LENGTH)) ) in valid_short() 272 if (cp3 && cp3-cp2 == CIPHERTEXT_LENGTH && (strlen(cp3) > 2 || cp3[2] != '$')) { in prepare() 282 strlen(split_fields[4]) == CIPHERTEXT_LENGTH && in prepare() 287 strlen(split_fields[4]) == CIPHERTEXT_LENGTH) in prepare() 569 memcpy(&pos[16], &ciphertext[42], CIPHERTEXT_LENGTH+2); in long_to_short() 570 pos[16+CIPHERTEXT_LENGTH+2] = '$'; in long_to_short() 571 pos[16+CIPHERTEXT_LENGTH+3] = 0; in long_to_short()
|
H A D | mysqlSHA1_fmt_plug.c | 59 #define CIPHERTEXT_LENGTH 41 macro 117 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) return 0; 120 for (i = 1; i < CIPHERTEXT_LENGTH; i++) { 133 static char out[CIPHERTEXT_LENGTH + 1]; in split()
|
H A D | rawMD5_fmt_plug.c | 53 #define CIPHERTEXT_LENGTH 32 macro 139 static char out[CIPHERTEXT_LENGTH + 1]; in prepare() 165 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 170 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1] = FORMAT_TAG; in split() 176 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split() 222 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1] = FORMAT_TAG; in source()
|
H A D | radmin_fmt_plug.c | 41 #define CIPHERTEXT_LENGTH 32 macro 85 static char buf[CIPHERTEXT_LENGTH + FORMAT_TAG_LEN + 1]; // $radmin2$ is 9 bytes in split() 87 strnzcpylwr(buf, ciphertext, CIPHERTEXT_LENGTH + FORMAT_TAG_LEN + 1); in split() 100 if (hexlen(p, &extra) != CIPHERTEXT_LENGTH || extra) in valid()
|
H A D | sha3_512_fmt_plug.c | 39 #define CIPHERTEXT_LENGTH 128 macro 95 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 100 static char out[8 + CIPHERTEXT_LENGTH + 1]; in split() 106 memcpylwr(out + 8, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
|
H A D | BFEgg_fmt_plug.c | 38 #define CIPHERTEXT_LENGTH 13 macro 73 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) return 0; in valid() 76 if (*pos || pos - ciphertext != CIPHERTEXT_LENGTH) return 0; in valid()
|
H A D | rawKeccak_256_fmt_plug.c | 43 #define CIPHERTEXT_LENGTH 64 macro 104 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 109 static char out[TAG_LENGTH + CIPHERTEXT_LENGTH + 1]; in split() 115 memcpylwr(out + TAG_LENGTH, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
|
H A D | rawKeccak_512_fmt_plug.c | 39 #define CIPHERTEXT_LENGTH 128 macro 100 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 105 static char out[FORMAT_TAG_LEN + CIPHERTEXT_LENGTH + 1]; in split() 111 memcpylwr(out + FORMAT_TAG_LEN, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
|
H A D | siemens-s7_fmt_plug.c | 40 #define CIPHERTEXT_LENGTH (1 + 10 + 1 + 1 + 1 + 40 + 1 + 40) macro 96 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) != CIPHERTEXT_LENGTH) in valid() 127 static char out[CIPHERTEXT_LENGTH+1]; in split() 129 strnzcpy(out, ciphertext, CIPHERTEXT_LENGTH+1); in split()
|
H A D | FG2_fmt_plug.c | 55 #define CIPHERTEXT_LENGTH 60 macro 56 #define HASH_LENGTH CIPHERTEXT_LENGTH + 3 117 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_salt() 149 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_binary()
|
H A D | EPI_fmt_plug.c | 35 #define CIPHERTEXT_LENGTH 105 macro 98 len = strnlen(ciphertext, CIPHERTEXT_LENGTH + 1); in valid() 100 if (len != CIPHERTEXT_LENGTH) in valid() 112 for (n = 65; n < CIPHERTEXT_LENGTH && in valid()
|
H A D | FGT_fmt_plug.c | 49 #define CIPHERTEXT_LENGTH 44 macro 50 #define HASH_LENGTH CIPHERTEXT_LENGTH + 3 124 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_salt() 156 …base64_convert(ciphertext+3, e_b64_mime, CIPHERTEXT_LENGTH, buf, e_b64_raw, sizeof(buf), flg_Base6… in get_binary()
|
H A D | gost_fmt_plug.c | 52 #define CIPHERTEXT_LENGTH 64 macro 116 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 122 static char out[TAG_CP_LENGTH + CIPHERTEXT_LENGTH + 1]; in split() 132 memcpy(cp, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
|
H A D | rawBLAKE2_512_fmt_plug.c | 47 #define CIPHERTEXT_LENGTH 128 macro 107 return !*q && q - p == CIPHERTEXT_LENGTH; in valid() 112 static char out[FORMAT_TAG_LEN + CIPHERTEXT_LENGTH + 1]; in split() 118 memcpylwr(out + FORMAT_TAG_LEN, ciphertext, CIPHERTEXT_LENGTH + 1); in split()
|
H A D | hmailserver_fmt_plug.c | 56 #define CIPHERTEXT_LENGTH 64 macro 112 i = strnlen(ciphertext, CIPHERTEXT_LENGTH + SALT_SIZE + 1); in hmailserver_valid() 114 if (i != CIPHERTEXT_LENGTH + SALT_SIZE) in hmailserver_valid()
|
H A D | formspring_fmt_plug.c | 56 #define CIPHERTEXT_LENGTH (SALT_SIZE + 1 + HEX_SIZE) macro 107 if (strnlen(ciphertext, CIPHERTEXT_LENGTH + 1) == CIPHERTEXT_LENGTH && in formspring_valid()
|