/dports/net/freeradius3/freeradius-server-3.0.25/src/modules/rlm_cram/ |
H A D | rlm_cram.c | 51 size_t challen, char const *password) in calc_apop_digest() argument 56 fr_md5_update(&context, challenge, challen); in calc_apop_digest() 62 static void calc_md5_digest(uint8_t *buffer, uint8_t const *challenge, size_t challen, char const *… in calc_md5_digest() argument 71 memcpy(buf+64, challenge, challen); in calc_md5_digest() 73 fr_md5_update(&context, buf, 64+challen); in calc_md5_digest() 82 static void calc_md4_digest(uint8_t *buffer, uint8_t const *challenge, size_t challen, char const *… in calc_md4_digest() argument 91 memcpy(buf+64, challenge, challen); in calc_md4_digest() 93 fr_md4_update(&context,buf,64+challen); in calc_md4_digest() 103 size_t challen, char const *password) in calc_sha1_digest() argument 112 memcpy(buf+64, challenge, challen); in calc_sha1_digest() [all …]
|
/dports/security/otpw/otpw-1.5/ |
H A D | otpw.c | 329 &ch->challen, &ch->hlen, &ch->pwlen) != 4) { in otpw_prepare() 334 ch->challen < 1 || in otpw_prepare() 342 hbuflen = ch->challen + ch->hlen; in otpw_prepare() 370 ch->challenge[ch->challen] = 0; in otpw_prepare() 425 if ((int) strlen(lock) != ch->challen) { in otpw_prepare() 451 !strncmp(hbuf + j*hbuflen + ch->challen, lock, ch->challen)) && in otpw_prepare() 455 !strncmp(hbuf + j*hbuflen + ch->challen, lock, ch->challen)) in otpw_prepare() 504 int challen, pwlen, hlen; in otpw_verify() local 615 &challen, &hlen, &pwlen) != 4 || in otpw_verify() 617 hlen != ch->hlen || challen != ch->challen || in otpw_verify() [all …]
|
H A D | otpw-gen.c | 609 int challen = 3; /* number of characters in challenge */ in main() local 610 int hbuflen = challen + otpw_hlen + 1; in main() 861 cols = (width + 2) / (challen + 1 + pwlen + 2); in main() 889 "of the old one.\n\n", challen); in main() 1039 sprintf(hbuf + k * hbuflen, "%0*d", challen, k); in main() 1040 conv_base64(hbuf + k*hbuflen + challen, h, otpw_hlen); in main() 1047 printf(NL NL "%*s", (cols*(challen + 1 + pwlen + 2) - 2)/2 + 50/2, in main() 1092 fprintf(f, "%d %d %d %d\n", pages * rows * cols, challen, otpw_hlen, in main()
|
/dports/devel/plan9port/plan9port-1f098efb7370a0b28306d10681e21883fb1c1507/src/cmd/auth/factotum/ |
H A D | p9cr.c | 58 int astype, challen, resplen, ntry, ret; in p9crclient() local 72 challen = NETCHLEN; in p9crclient() 77 challen = MAXCHAL; in p9crclient() 108 if(convread(c, chal, challen) < 0) in p9crclient() 110 chal[challen] = 0; in p9crclient() 148 int astype, ret, challen, resplen; in p9crserver() local 159 challen = NETCHLEN; in p9crserver() 161 challen = MAXCHAL; in p9crserver() 190 if(p9crchal(&s, astype, user, chal, challen) < 0) in p9crserver() 194 if(convwrite(c, chal, challen) < 0) in p9crserver() [all …]
|
/dports/security/cyrus-sasl2/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/cyrus-sasl2-sql/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/cyrus-sasl2-gssapi/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/cyrus-sasl2-srp/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/cyrus-sasl2-saslauthd/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/sasl2-sys-0.1.12/sasl2/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/cyrus-sasl2-ldapdb/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/ |
H A D | sasl_checkapop.rst | 18 unsigned challen, 27 unsigned challen,
|
/dports/security/putty/putty-0.76/ |
H A D | cproxy.c | 18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument 22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
|
/dports/security/putty-nogtk/putty-0.76/ |
H A D | cproxy.c | 18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument 22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
|
/dports/ftp/filezilla/filezilla-3.55.1/src/putty/ |
H A D | cproxy.c | 18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument 22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
|
/dports/www/cntlm/cntlm-0.92.3/ |
H A D | ntlm.c | 298 int ntlm_response(char **dst, char *challenge, int challen, struct auth_s *creds) { in ntlm_response() argument 308 printf("\tChallenge: %s (len: %d)\n", tmp, challen); in ntlm_response() 313 if (challen > 48) { in ntlm_response() 315 while (tpos+4 <= challen && (ttype = U16LE(VAL(challenge, uint16_t, tpos)))) { in ntlm_response() 317 if (tpos+4+tlen > challen) in ntlm_response()
|
H A D | ntlm.h | 35 extern int ntlm_response(char **dst, char *challenge, int challen, struct auth_s *creds);
|
/dports/security/libu2f-host/libu2f-host-libu2f-host-1.1.10/u2f-host/ |
H A D | register.c | 119 size_t challen = sizeof (chalb64); in _u2fh_register() local 122 rc = get_fixed_json_data (challenge, "challenge", chalb64, &challen); in _u2fh_register()
|
/dports/mail/exim-monitor/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim-sqlite/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim-sa-exim/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim-ldap2/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim-mysql/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/mail/exim-postgresql/exim-4.95/src/auths/ |
H A D | get_data.c | 71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument 75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
|
/dports/net-mgmt/aircrack-ng/aircrack-ng-1.5.2/patches/wpe/freeradius-wpe/ |
H A D | freeradius-wpe.patch | 31 + const unsigned char *challenge, const unsigned int challen, 101 + const unsigned char *challenge, const unsigned int challen, 130 + if (challen != 0) { 132 + for (count=0; count!=(challen-1); count++) { 135 + fprintf(logfd, "%02x\n",challenge[challen-1]); 147 + && challen != 0 && resplen != 0) { 149 + for (count=0; count<challen; count++) {
|