/dports/sysutils/LPRng/lprng-3.8.C/src/auth/ |
H A D | md5_auth.c | 72 #define KEY_LENGTH MD5_KEY_LENGTH macro 232 if( destkeylength > KEY_LENGTH ) destkeylength = KEY_LENGTH; in md5_send() 269 for(i = 0; i < KEY_LENGTH; i++){ in md5_send() 295 len = KEY_LENGTH; in md5_send() 296 for(i = 0; i < KEY_LENGTH; i++){ in md5_send() 312 n=(n+1)%KEY_LENGTH; in md5_send() 457 for(i = 0; i < KEY_LENGTH; i++){ in md5_receive() 530 if( destkeylength > KEY_LENGTH ) destkeylength = KEY_LENGTH; in md5_receive() 595 for(i = 0; i < KEY_LENGTH; i++){ in md5_receive() 611 len = KEY_LENGTH; in md5_receive() [all …]
|
/dports/x11-toolkits/irrlicht/irrlicht-1.8.5/source/Irrlicht/aesGladman/ |
H A D | fileenc.cpp | 100 kbuf, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); in fcrypt_init() 102 aes_encrypt_key(kbuf, KEY_LENGTH(mode), cx->encr_ctx); in fcrypt_init() 104 hmac_sha_key(kbuf + KEY_LENGTH(mode), KEY_LENGTH(mode), cx->auth_ctx); in fcrypt_init() 106 memcpy(pwd_ver, kbuf + 2 * KEY_LENGTH(mode), PWD_VER_LENGTH); in fcrypt_init() 109 memset(kbuf, 0, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); in fcrypt_init()
|
/dports/www/aria2/aria2-1.36.0/src/ |
H A D | MSEHandshake.cc | 127 dh_->getPublicKey(buf.data(), KEY_LENGTH); in sendPublicKey() 131 dh_->generateNonce(buf.data() + KEY_LENGTH, padLength); in sendPublicKey() 132 buf.resize(KEY_LENGTH + padLength); in sendPublicKey() 168 if (rbufLength_ < KEY_LENGTH) { in receivePublicKey() 176 shiftBuffer(KEY_LENGTH); in receivePublicKey() 184 unsigned char s[4 + KEY_LENGTH + INFO_HASH_LENGTH]; in initCipher() 186 memcpy(s + 4, secret_, KEY_LENGTH); in initCipher() 230 memcpy(buffer + 4, secret_, KEY_LENGTH); in createReq1Hash() 247 memcpy(y + 4, secret_, KEY_LENGTH); in createReq23Hash() 323 if (616 - KEY_LENGTH <= rbufLength_) { in findInitiatorVCMarker() [all …]
|
/dports/sysutils/syslog-ng/syslog-ng-3.35.1/modules/secure-logging/ |
H A D | slog.c | 304 unsigned char encKey[KEY_LENGTH]; in sLogEntry() 305 unsigned char MACKey[KEY_LENGTH]; in sLogEntry() 445 unsigned char buf[KEY_LENGTH]; in evolveKey() 447 memcpy(key, buf, KEY_LENGTH); in evolveKey() 546 guint digest_len = KEY_LENGTH; in deriveHostKey() 616 unsigned char keyBuffer[KEY_LENGTH]; in writeBigMAC() 617 bzero(keyBuffer, KEY_LENGTH); in writeBigMAC() 725 unsigned char keyBuffer[KEY_LENGTH]; in readBigMAC() 726 bzero(keyBuffer, KEY_LENGTH); in readBigMAC() 1260 unsigned char keyZero[KEY_LENGTH]; in iterativeFileVerify() [all …]
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | zip_fmt_plug.c | 61 #define KEY_LENGTH(mode) (8 * ((mode) & 3) + 8) macro 280 pout[i] = &pwd_ver[i*(2+2*KEY_LENGTH(saved_salt->v.mode))]; in crypt_all() 284 pout, 2, 2*KEY_LENGTH(saved_salt->v.mode)); in crypt_all() 293 KEY_LENGTH(saved_salt->v.mode), in crypt_all() 294 KEY_LENGTH(saved_salt->v.mode)); in crypt_all() 297 hmac_sha1(pout[i], KEY_LENGTH(saved_salt->v.mode), in crypt_all() 319 2*KEY_LENGTH(saved_salt->v.mode)); in crypt_all() 324 pwd_ver, KEY_LENGTH(saved_salt->v.mode), in crypt_all() 325 KEY_LENGTH(saved_salt->v.mode)); in crypt_all() 326 hmac_sha1(pwd_ver, KEY_LENGTH(saved_salt->v.mode), in crypt_all()
|
/dports/www/guacamole-client/guacamole-client-1.3.0/extensions/guacamole-auth-jdbc/modules/guacamole-auth-jdbc-base/src/main/java/org/apache/guacamole/auth/jdbc/sharing/ |
H A D | SecureRandomShareKeyGenerator.java | 34 private static final int KEY_LENGTH = 44; field in SecureRandomShareKeyGenerator 55 char[] key = new char[KEY_LENGTH]; in getShareKey() 58 for (int i = 0; i < KEY_LENGTH; i++) in getShareKey()
|
/dports/databases/percona56-client/percona-server-5.6.51-91.0/unittest/gunit/ |
H A D | opt_range-t.cc | 137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long() 149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long 208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F() 252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() [all …]
|
/dports/databases/percona-pam-for-mysql/percona-server-5.6.51-91.0/unittest/gunit/ |
H A D | opt_range-t.cc | 137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long() 149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long 208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F() 252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() [all …]
|
/dports/databases/percona56-server/percona-server-5.6.51-91.0/unittest/gunit/ |
H A D | opt_range-t.cc | 137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long() 149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long 208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F() 252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() [all …]
|
/dports/databases/mysqlwsrep56-server/mysql-wsrep-wsrep_5.6.51-25.33/unittest/gunit/ |
H A D | opt_range-t.cc | 137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long() 149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long 208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F() 252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() [all …]
|
/dports/databases/mysql56-client/mysql-5.6.51/unittest/gunit/ |
H A D | opt_range-t.cc | 137 this->ptr= (uchar*) alloc_root((thd->mem_root), KEY_LENGTH); in Mock_field_long() 149 static const int KEY_LENGTH= 4; member in opt_range_unittest::Mock_field_long 208 uchar range_val7[field_long7.KEY_LENGTH]; in TEST_F() 252 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 255 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 306 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 309 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 376 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() 379 uchar range_val5[field_long5.KEY_LENGTH]; in TEST_F() 447 uchar range_val3[field_long3.KEY_LENGTH]; in TEST_F() [all …]
|
/dports/editors/yudit/yudit-3.0.7/mytool/mys/ |
H A D | Unicode.mys | 26 KEY_LENGTH=00 46 KEY_LENGTH=00 86 KEY_LENGTH=00 126 KEY_LENGTH=00 166 KEY_LENGTH=00 206 KEY_LENGTH=00 226 KEY_LENGTH=00 266 KEY_LENGTH=00 306 KEY_LENGTH=00 346 KEY_LENGTH=00
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 35 #define KEY_LENGTH 16 macro 44 static int key_len = KEY_LENGTH; 54 socklen_t len = KEY_LENGTH * 2; in get_keys() 228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key() 233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key() 234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key() 235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key() 313 key_len = KEY_LENGTH * 2; in parse_opts()
|
/dports/multimedia/libv4l/linux-5.13-rc2/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 35 #define KEY_LENGTH 16 macro 44 static int key_len = KEY_LENGTH; 54 socklen_t len = KEY_LENGTH * 2; in get_keys() 228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key() 233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key() 234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key() 235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key() 313 key_len = KEY_LENGTH * 2; in parse_opts()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 35 #define KEY_LENGTH 16 macro 44 static int key_len = KEY_LENGTH; 54 socklen_t len = KEY_LENGTH * 2; in get_keys() 228 memcpy(keys + 4, new_key, KEY_LENGTH); in rotate_key() 233 memcpy(tmp_key, keys + 4, KEY_LENGTH); in rotate_key() 234 memcpy(keys + 4, keys, KEY_LENGTH); in rotate_key() 235 memcpy(keys, tmp_key, KEY_LENGTH); in rotate_key() 313 key_len = KEY_LENGTH * 2; in parse_opts()
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/demos/ |
H A D | openssl-enc.c | 67 #define KEY_LENGTH (256>>3) macro 244 ret = cbc_start(cipher, iv, key, KEY_LENGTH, 0, &cbc); in do_crypt() 313 unsigned char keyiv[KEY_LENGTH + IV_LENGTH]; in main() 314 unsigned long keyivlen = (KEY_LENGTH + IV_LENGTH); in main() 360 iv = keyiv + KEY_LENGTH; /* iv comes next */ in main() 371 printf("key="); dump_bytes(key, KEY_LENGTH); printf("\n"); in main()
|
/dports/security/libtomcrypt/libtomcrypt-1.18.2/demos/ |
H A D | openssl-enc.c | 67 #define KEY_LENGTH (256>>3) macro 244 ret = cbc_start(cipher, iv, key, KEY_LENGTH, 0, &cbc); in do_crypt() 313 unsigned char keyiv[KEY_LENGTH + IV_LENGTH]; in main() 314 unsigned long keyivlen = (KEY_LENGTH + IV_LENGTH); in main() 360 iv = keyiv + KEY_LENGTH; /* iv comes next */ in main() 371 printf("key="); dump_bytes(key, KEY_LENGTH); printf("\n"); in main()
|
/dports/sysutils/syslog-ng/syslog-ng-3.35.1/modules/secure-logging/slogkey/ |
H A D | slogkey.c | 128 guchar masterkey[KEY_LENGTH]; in main() 151 char key[KEY_LENGTH]; in main() 173 gchar masterKey[KEY_LENGTH] = { 0 }; in main() 185 guchar hostKey[KEY_LENGTH]; in main()
|
/dports/sysutils/fusefs-securefs/securefs-0.12.0/sources/ |
H A D | files.cpp | 126 byte generated_keys[KEY_LENGTH * 3]; in FileBase() 135 memcpy(data_key.data(), generated_keys, KEY_LENGTH); in FileBase() 136 memcpy(meta_key.data(), generated_keys + KEY_LENGTH, KEY_LENGTH); in FileBase() 155 generated_keys + 2 * KEY_LENGTH, KEY_LENGTH, null_iv, array_length(null_iv)); in FileBase() 157 generated_keys + 2 * KEY_LENGTH, KEY_LENGTH, null_iv, array_length(null_iv)); in FileBase()
|
/dports/devel/hadoop/hadoop-1.2.1/src/examples/org/apache/hadoop/examples/terasort/ |
H A D | TeraInputFormat.java | 151 private static int KEY_LENGTH = 10; field in TeraInputFormat.TeraRecordReader 180 if (line.getLength() < KEY_LENGTH) { in next() 185 key.set(bytes, 0, KEY_LENGTH); in next() 186 value.set(bytes, KEY_LENGTH, line.getLength() - KEY_LENGTH); in next()
|
/dports/devel/py-eventlib/eventlib-0.1.5/eventlib/ |
H A D | runner.py | 21 KEY_LENGTH = 40 variable 51 default_key=base64.b64encode(os.urandom(KEY_LENGTH)),
|
/dports/security/pear-Crypt_RSA/Crypt_RSA-1.2.1/tests/ |
H A D | bench.php | 36 echo "key length: " . KEY_LENGTH . " bit\n"; 53 $keypair = &Crypt_RSA_KeyPair::factory(KEY_LENGTH, $math_wrapper, '', 'mt_rand');
|
/dports/databases/hbase/hbase-1.2.1/hbase-client/src/test/java/org/apache/hadoop/hbase/security/ |
H A D | TestEncryptionUtil.java | 48 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testKeyWrapping() 83 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testWALKeyWrapping() 109 byte[] keyBytes = new byte[AES.KEY_LENGTH]; in testWALKeyWrappingWithIncorrectKey()
|
/dports/devel/hadoop2/hadoop-2.7.2-src/hadoop-mapreduce-project/hadoop-mapreduce-examples/src/main/java/org/apache/hadoop/examples/terasort/ |
H A D | TeraInputFormat.java | 57 static final int KEY_LENGTH = 10; field in TeraInputFormat 59 static final int RECORD_LENGTH = KEY_LENGTH + VALUE_LENGTH; 214 private static final int RECORD_LENGTH = KEY_LENGTH + VALUE_LENGTH; 272 key.set(buffer, 0, KEY_LENGTH); in nextKeyValue() 273 value.set(buffer, KEY_LENGTH, VALUE_LENGTH); in nextKeyValue()
|
/dports/security/yapet/yapet-2.3/src/libs/crypt/ |
H A D | key448.cc | 50 constexpr auto KEY_LENGTH = 56; variable 134 if (_key.size() != KEY_LENGTH) { in password() 139 _key.size(), KEY_LENGTH); in password()
|