Home
last modified time | relevance | path

Searched refs:KEY_LENGTH (Results 1 – 25 of 221) sorted by relevance

123456789

/dports/sysutils/LPRng/lprng-3.8.C/src/auth/
H A Dmd5_auth.c72 #define KEY_LENGTH MD5_KEY_LENGTH macro
232 if( destkeylength > KEY_LENGTH ) destkeylength = KEY_LENGTH; in md5_send()
269 for(i = 0; i < KEY_LENGTH; i++){ in md5_send()
295 len = KEY_LENGTH; in md5_send()
296 for(i = 0; i < KEY_LENGTH; i++){ in md5_send()
312 n=(n+1)%KEY_LENGTH; in md5_send()
457 for(i = 0; i < KEY_LENGTH; i++){ in md5_receive()
530 if( destkeylength > KEY_LENGTH ) destkeylength = KEY_LENGTH; in md5_receive()
595 for(i = 0; i < KEY_LENGTH; i++){ in md5_receive()
611 len = KEY_LENGTH; in md5_receive()
[all …]
/dports/x11-toolkits/irrlicht/irrlicht-1.8.5/source/Irrlicht/aesGladman/
H A Dfileenc.cpp100 kbuf, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); in fcrypt_init()
102 aes_encrypt_key(kbuf, KEY_LENGTH(mode), cx->encr_ctx); in fcrypt_init()
104 hmac_sha_key(kbuf + KEY_LENGTH(mode), KEY_LENGTH(mode), cx->auth_ctx); in fcrypt_init()
106 memcpy(pwd_ver, kbuf + 2 * KEY_LENGTH(mode), PWD_VER_LENGTH); in fcrypt_init()
109 memset(kbuf, 0, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); in fcrypt_init()
/dports/www/aria2/aria2-1.36.0/src/
H A DMSEHandshake.cc127 dh_->getPublicKey(buf.data(), KEY_LENGTH); in sendPublicKey()
131 dh_->generateNonce(buf.data() + KEY_LENGTH, padLength); in sendPublicKey()
132 buf.resize(KEY_LENGTH + padLength); in sendPublicKey()
168 if (rbufLength_ < KEY_LENGTH) { in receivePublicKey()
176 shiftBuffer(KEY_LENGTH); in receivePublicKey()
184 unsigned char s[4 + KEY_LENGTH + INFO_HASH_LENGTH]; in initCipher()
186 memcpy(s + 4, secret_, KEY_LENGTH); in initCipher()
230 memcpy(buffer + 4, secret_, KEY_LENGTH); in createReq1Hash()
247 memcpy(y + 4, secret_, KEY_LENGTH); in createReq23Hash()
323 if (616 - KEY_LENGTH <= rbufLength_) { in findInitiatorVCMarker()
[all …]
/dports/sysutils/syslog-ng/syslog-ng-3.35.1/modules/secure-logging/
H A Dslog.c304 unsigned char encKey[KEY_LENGTH]; in sLogEntry()
305 unsigned char MACKey[KEY_LENGTH]; in sLogEntry()
445 unsigned char buf[KEY_LENGTH]; in evolveKey()
447 memcpy(key, buf, KEY_LENGTH); in evolveKey()
546 guint digest_len = KEY_LENGTH; in deriveHostKey()
616 unsigned char keyBuffer[KEY_LENGTH]; in writeBigMAC()
617 bzero(keyBuffer, KEY_LENGTH); in writeBigMAC()
725 unsigned char keyBuffer[KEY_LENGTH]; in readBigMAC()
726 bzero(keyBuffer, KEY_LENGTH); in readBigMAC()
1260 unsigned char keyZero[KEY_LENGTH]; in iterativeFileVerify()
[all …]
/dports/security/john/john-1.9.0-jumbo-1/src/
H A Dzip_fmt_plug.c61 #define KEY_LENGTH(mode) (8 * ((mode) & 3) + 8) macro
280 pout[i] = &pwd_ver[i*(2+2*KEY_LENGTH(saved_salt->v.mode))]; in crypt_all()
284 pout, 2, 2*KEY_LENGTH(saved_salt->v.mode)); in crypt_all()
293 KEY_LENGTH(saved_salt->v.mode), in crypt_all()
294 KEY_LENGTH(saved_salt->v.mode)); in crypt_all()
297 hmac_sha1(pout[i], KEY_LENGTH(saved_salt->v.mode), in crypt_all()
319 2*KEY_LENGTH(saved_salt->v.mode)); in crypt_all()
324 pwd_ver, KEY_LENGTH(saved_salt->v.mode), in crypt_all()
325 KEY_LENGTH(saved_salt->v.mode)); in crypt_all()
326 hmac_sha1(pwd_ver, KEY_LENGTH(saved_salt->v.mode), in crypt_all()
/dports/www/guacamole-client/guacamole-client-1.3.0/extensions/guacamole-auth-jdbc/modules/guacamole-auth-jdbc-base/src/main/java/org/apache/guacamole/auth/jdbc/sharing/
H A DSecureRandomShareKeyGenerator.java34 private static final int KEY_LENGTH = 44; field in SecureRandomShareKeyGenerator
55 char[] key = new char[KEY_LENGTH]; in getShareKey()
58 for (int i = 0; i < KEY_LENGTH; i++) in getShareKey()
/dports/databases/percona56-client/percona-server-5.6.51-91.0/unittest/gunit/
H A Dopt_range-t.cc137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long()
149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long
208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F()
252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
[all …]
/dports/databases/percona-pam-for-mysql/percona-server-5.6.51-91.0/unittest/gunit/
H A Dopt_range-t.cc137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long()
149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long
208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F()
252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
[all …]
/dports/databases/percona56-server/percona-server-5.6.51-91.0/unittest/gunit/
H A Dopt_range-t.cc137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long()
149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long
208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F()
252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
[all …]
/dports/databases/mysqlwsrep56-server/mysql-wsrep-wsrep_5.6.51-25.33/unittest/gunit/
H A Dopt_range-t.cc137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long()
149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long
208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F()
252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
[all …]
/dports/databases/mysql56-client/mysql-5.6.51/unittest/gunit/
H A Dopt_range-t.cc137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long()
149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long
208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F()
252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F()
447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F()
[all …]
/dports/editors/yudit/yudit-3.0.7/mytool/mys/
H A DUnicode.mys26 KEY_LENGTH=00
46 KEY_LENGTH=00
86 KEY_LENGTH=00
126 KEY_LENGTH=00
166 KEY_LENGTH=00
206 KEY_LENGTH=00
226 KEY_LENGTH=00
266 KEY_LENGTH=00
306 KEY_LENGTH=00
346 KEY_LENGTH=00
/dports/multimedia/v4l_compat/linux-5.13-rc2/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c35 #define KEY_LENGTH 16 macro
44 static int key_len = KEY_LENGTH;
54 socklen_t len = KEY_LENGTH * 2; in get_keys()
228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key()
233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key()
234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key()
235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key()
313 key_len = KEY_LENGTH * 2; in parse_opts()
/dports/multimedia/libv4l/linux-5.13-rc2/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c35 #define KEY_LENGTH 16 macro
44 static int key_len = KEY_LENGTH;
54 socklen_t len = KEY_LENGTH * 2; in get_keys()
228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key()
233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key()
234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key()
235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key()
313 key_len = KEY_LENGTH * 2; in parse_opts()
/dports/multimedia/v4l-utils/linux-5.13-rc2/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c35 #define KEY_LENGTH 16 macro
44 static int key_len = KEY_LENGTH;
54 socklen_t len = KEY_LENGTH * 2; in get_keys()
228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key()
233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key()
234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key()
235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key()
313 key_len = KEY_LENGTH * 2; in parse_opts()
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/demos/
H A Dopenssl-enc.c67 #define KEY_LENGTH (256>>3) macro
244 ret = cbc_start(cipher, iv, key, KEY_LENGTH, 0, &cbc); in do_crypt()
313 unsigned char keyiv[KEY_LENGTH + IV_LENGTH]; in main()
314 unsigned long keyivlen = (KEY_LENGTH + IV_LENGTH); in main()
360 iv = keyiv + KEY_LENGTH; /* iv comes next */ in main()
371 printf("key="); dump_bytes(key, KEY_LENGTH); printf("\n"); in main()
/dports/security/libtomcrypt/libtomcrypt-1.18.2/demos/
H A Dopenssl-enc.c67 #define KEY_LENGTH (256>>3) macro
244 ret = cbc_start(cipher, iv, key, KEY_LENGTH, 0, &cbc); in do_crypt()
313 unsigned char keyiv[KEY_LENGTH + IV_LENGTH]; in main()
314 unsigned long keyivlen = (KEY_LENGTH + IV_LENGTH); in main()
360 iv = keyiv + KEY_LENGTH; /* iv comes next */ in main()
371 printf("key="); dump_bytes(key, KEY_LENGTH); printf("\n"); in main()
/dports/sysutils/syslog-ng/syslog-ng-3.35.1/modules/secure-logging/slogkey/
H A Dslogkey.c128 guchar masterkey[KEY_LENGTH]; in main()
151 char key[KEY_LENGTH]; in main()
173 gchar masterKey[KEY_LENGTH] = { 0 }; in main()
185 guchar hostKey[KEY_LENGTH]; in main()
/dports/sysutils/fusefs-securefs/securefs-0.12.0/sources/
H A Dfiles.cpp126 byte generated_keys[KEY_LENGTH * 3]; in FileBase()
135 memcpy(data_key.data(), generated_keys, KEY_LENGTH); in FileBase()
136 memcpy(meta_key.data(), generated_keys + KEY_LENGTH, KEY_LENGTH); in FileBase()
155 generated_keys + 2 * KEY_LENGTH, KEY_LENGTH, null_iv, array_length(null_iv)); in FileBase()
157 generated_keys + 2 * KEY_LENGTH, KEY_LENGTH, null_iv, array_length(null_iv)); in FileBase()
/dports/devel/hadoop/hadoop-1.2.1/src/examples/org/apache/hadoop/examples/terasort/
H A DTeraInputFormat.java151 private static int KEY_LENGTH = 10; field in TeraInputFormat.TeraRecordReader
180 if (line.getLength() < KEY_LENGTH) { in next()
185 key.set(bytes, 0, KEY_LENGTH); in next()
186 value.set(bytes, KEY_LENGTH, line.getLength() - KEY_LENGTH); in next()
/dports/devel/py-eventlib/eventlib-0.1.5/eventlib/
H A Drunner.py21 KEY_LENGTH = 40 variable
51 default_key=base64.b64encode(os.urandom(KEY_LENGTH)),
/dports/security/pear-Crypt_RSA/Crypt_RSA-1.2.1/tests/
H A Dbench.php36 echo "key length: " . KEY_LENGTH . " bit\n";
53 $keypair = &Crypt_RSA_KeyPair::factory(KEY_LENGTH, $math_wrapper, '', 'mt_rand');
/dports/databases/hbase/hbase-1.2.1/hbase-client/src/test/java/org/apache/hadoop/hbase/security/
H A DTestEncryptionUtil.java48 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testKeyWrapping()
83 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testWALKeyWrapping()
109 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testWALKeyWrappingWithIncorrectKey()
/dports/devel/hadoop2/hadoop-2.7.2-src/hadoop-mapreduce-project/hadoop-mapreduce-examples/src/main/java/org/apache/hadoop/examples/terasort/
H A DTeraInputFormat.java57 static final int KEY_LENGTH = 10; field in TeraInputFormat
59 static final int RECORD_LENGTH = KEY_LENGTH + VALUE_LENGTH;
214 private static final int RECORD_LENGTH = KEY_LENGTH + VALUE_LENGTH;
272 key.set(buffer, 0, KEY_LENGTH); in nextKeyValue()
273 value.set(buffer, KEY_LENGTH, VALUE_LENGTH); in nextKeyValue()
/dports/security/yapet/yapet-2.3/src/libs/crypt/
H A Dkey448.cc50 constexpr auto KEY_LENGTH = 56; variable
134 if (_key.size() != KEY_LENGTH) { in password()
139 _key.size(), KEY_LENGTH); in password()

123456789