Home
last modified time | relevance | path

Searched refs:SaltedPassword (Results 1 – 25 of 57) sorted by relevance

123

/dports/databases/erlang-epgsql/epgsql-4.1.0/src/
H A Depgsql_scram.erl77 SaltedPassword = hi(normalize(Password), Salt, I),
78 ClientKey = hmac(SaltedPassword, "Client Key"),
87 ServerKey = hmac(SaltedPassword, "Server Key"),
/dports/databases/postgresql10-pltcl/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-contrib/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-client/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-plpython/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-docs/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-plperl/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql10-server/postgresql-10.19/src/interfaces/libpq/
H A Dfe-auth-scram.c49 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
580 state->iterations, state->SaltedPassword); in calculate_client_proof()
582 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
614 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/pgbouncer/pgbouncer-1.16.0/src/
H A Dscram.c49 free(scram_state->SaltedPassword); in free_scram_state()
502 scram_state->SaltedPassword = malloc(SCRAM_KEY_LEN); in calculate_client_proof()
503 if (scram_state->SaltedPassword == NULL) in calculate_client_proof()
509 scram_state->SaltedPassword); in calculate_client_proof()
511 scram_ClientKey(scram_state->SaltedPassword, ClientKey); in calculate_client_proof()
549 scram_ServerKey(scram_state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-client/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-plperl/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-docs/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN];
706 state->iterations, state->SaltedPassword);
708 scram_ClientKey(state->SaltedPassword, ClientKey);
740 scram_ServerKey(state->SaltedPassword, ServerKey);
/dports/databases/postgresql11-contrib/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-plpython/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-pltcl/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql12-client/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
700 state->iterations, state->SaltedPassword); in calculate_client_proof()
702 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
734 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql11-server/postgresql-11.14/src/interfaces/libpq/
H A Dfe-auth-scram.c50 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
706 state->iterations, state->SaltedPassword); in calculate_client_proof()
708 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
740 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql12-docs/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN];
700 state->iterations, state->SaltedPassword);
702 scram_ClientKey(state->SaltedPassword, ClientKey);
734 scram_ServerKey(state->SaltedPassword, ServerKey);
/dports/databases/postgresql12-server/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
700 state->iterations, state->SaltedPassword); in calculate_client_proof()
702 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
734 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql12-pltcl/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN];
700 state->iterations, state->SaltedPassword);
702 scram_ClientKey(state->SaltedPassword, ClientKey);
734 scram_ServerKey(state->SaltedPassword, ServerKey);
/dports/databases/postgresql12-plpython/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
700 state->iterations, state->SaltedPassword); in calculate_client_proof()
702 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
734 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql12-contrib/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
700 state->iterations, state->SaltedPassword); in calculate_client_proof()
702 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
734 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql12-plperl/postgresql-12.9/src/interfaces/libpq/
H A Dfe-auth-scram.c45 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
700 state->iterations, state->SaltedPassword); in calculate_client_proof()
702 scram_ClientKey(state->SaltedPassword, ClientKey); in calculate_client_proof()
734 scram_ServerKey(state->SaltedPassword, ServerKey); in verify_server_signature()
/dports/databases/postgresql14-pltcl/postgresql-14.1/src/interfaces/libpq/
H A Dfe-auth-scram.c46 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
791 state->iterations, state->SaltedPassword) < 0 || in calculate_client_proof()
792 scram_ClientKey(state->SaltedPassword, ClientKey) < 0 || in calculate_client_proof()
836 if (scram_ServerKey(state->SaltedPassword, ServerKey) < 0 || in verify_server_signature()
/dports/databases/postgresql14-server/postgresql-14.1/src/interfaces/libpq/
H A Dfe-auth-scram.c46 uint8 SaltedPassword[SCRAM_KEY_LEN]; member
791 state->iterations, state->SaltedPassword) < 0 || in calculate_client_proof()
792 scram_ClientKey(state->SaltedPassword, ClientKey) < 0 || in calculate_client_proof()
836 if (scram_ServerKey(state->SaltedPassword, ServerKey) < 0 || in verify_server_signature()

123