Home
last modified time | relevance | path

Searched refs:challen (Results 1 – 25 of 163) sorted by relevance

1234567

/dports/net/freeradius3/freeradius-server-3.0.25/src/modules/rlm_cram/
H A Drlm_cram.c51 size_t challen, char const *password) in calc_apop_digest() argument
56 fr_md5_update(&context, challenge, challen); in calc_apop_digest()
62 static void calc_md5_digest(uint8_t *buffer, uint8_t const *challenge, size_t challen, char const *… in calc_md5_digest() argument
71 memcpy(buf+64, challenge, challen); in calc_md5_digest()
73 fr_md5_update(&context, buf, 64+challen); in calc_md5_digest()
82 static void calc_md4_digest(uint8_t *buffer, uint8_t const *challenge, size_t challen, char const *… in calc_md4_digest() argument
91 memcpy(buf+64, challenge, challen); in calc_md4_digest()
93 fr_md4_update(&context,buf,64+challen); in calc_md4_digest()
103 size_t challen, char const *password) in calc_sha1_digest() argument
112 memcpy(buf+64, challenge, challen); in calc_sha1_digest()
[all …]
/dports/security/otpw/otpw-1.5/
H A Dotpw.c329 &ch->challen, &ch->hlen, &ch->pwlen) != 4) { in otpw_prepare()
334 ch->challen < 1 || in otpw_prepare()
342 hbuflen = ch->challen + ch->hlen; in otpw_prepare()
370 ch->challenge[ch->challen] = 0; in otpw_prepare()
425 if ((int) strlen(lock) != ch->challen) { in otpw_prepare()
451 !strncmp(hbuf + j*hbuflen + ch->challen, lock, ch->challen)) && in otpw_prepare()
455 !strncmp(hbuf + j*hbuflen + ch->challen, lock, ch->challen)) in otpw_prepare()
504 int challen, pwlen, hlen; in otpw_verify() local
615 &challen, &hlen, &pwlen) != 4 || in otpw_verify()
617 hlen != ch->hlen || challen != ch->challen || in otpw_verify()
[all …]
H A Dotpw-gen.c609 int challen = 3; /* number of characters in challenge */ in main() local
610 int hbuflen = challen + otpw_hlen + 1; in main()
861 cols = (width + 2) / (challen + 1 + pwlen + 2); in main()
889 "of the old one.\n\n", challen); in main()
1039 sprintf(hbuf + k * hbuflen, "%0*d", challen, k); in main()
1040 conv_base64(hbuf + k*hbuflen + challen, h, otpw_hlen); in main()
1047 printf(NL NL "%*s", (cols*(challen + 1 + pwlen + 2) - 2)/2 + 50/2, in main()
1092 fprintf(f, "%d %d %d %d\n", pages * rows * cols, challen, otpw_hlen, in main()
/dports/devel/plan9port/plan9port-1f098efb7370a0b28306d10681e21883fb1c1507/src/cmd/auth/factotum/
H A Dp9cr.c58 int astype, challen, resplen, ntry, ret; in p9crclient() local
72 challen = NETCHLEN; in p9crclient()
77 challen = MAXCHAL; in p9crclient()
108 if(convread(c, chal, challen) < 0) in p9crclient()
110 chal[challen] = 0; in p9crclient()
148 int astype, ret, challen, resplen; in p9crserver() local
159 challen = NETCHLEN; in p9crserver()
161 challen = MAXCHAL; in p9crserver()
190 if(p9crchal(&s, astype, user, chal, challen) < 0) in p9crserver()
194 if(convwrite(c, chal, challen) < 0) in p9crserver()
[all …]
/dports/security/cyrus-sasl2/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/cyrus-sasl2-sql/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/cyrus-sasl2-gssapi/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/cyrus-sasl2-srp/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/cyrus-sasl2-saslauthd/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/sysutils/vector/vector-0.10.0/cargo-crates/sasl2-sys-0.1.12/sasl2/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/cyrus-sasl2-ldapdb/cyrus-sasl-2.1.28/docsrc/sasl/reference/manpages/library/
H A Dsasl_checkapop.rst18 unsigned challen,
27 unsigned challen,
/dports/security/putty/putty-0.76/
H A Dcproxy.c18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument
22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
/dports/security/putty-nogtk/putty-0.76/
H A Dcproxy.c18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument
22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
/dports/ftp/filezilla/filezilla-3.55.1/src/putty/
H A Dcproxy.c18 static void hmacmd5_chap(const unsigned char *challenge, int challen, in hmacmd5_chap() argument
22 make_ptrlen(challenge, challen), response); in hmacmd5_chap()
/dports/www/cntlm/cntlm-0.92.3/
H A Dntlm.c298 int ntlm_response(char **dst, char *challenge, int challen, struct auth_s *creds) { in ntlm_response() argument
308 printf("\tChallenge: %s (len: %d)\n", tmp, challen); in ntlm_response()
313 if (challen > 48) { in ntlm_response()
315 while (tpos+4 <= challen && (ttype = U16LE(VAL(challenge, uint16_t, tpos)))) { in ntlm_response()
317 if (tpos+4+tlen > challen) in ntlm_response()
H A Dntlm.h35 extern int ntlm_response(char **dst, char *challenge, int challen, struct auth_s *creds);
/dports/security/libu2f-host/libu2f-host-libu2f-host-1.1.10/u2f-host/
H A Dregister.c119 size_t challen = sizeof (chalb64); in _u2fh_register() local
122 rc = get_fixed_json_data (challenge, "challenge", chalb64, &challen); in _u2fh_register()
/dports/mail/exim-monitor/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim-sqlite/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim-sa-exim/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim-ldap2/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim-mysql/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/mail/exim-postgresql/exim-4.95/src/auths/
H A Dget_data.c71 auth_get_data(uschar ** aptr, const uschar * challenge, int challen) in auth_get_data() argument
75 smtp_printf("334 %s\r\n", FALSE, b64encode(challenge, challen)); in auth_get_data()
/dports/net-mgmt/aircrack-ng/aircrack-ng-1.5.2/patches/wpe/freeradius-wpe/
H A Dfreeradius-wpe.patch31 + const unsigned char *challenge, const unsigned int challen,
101 + const unsigned char *challenge, const unsigned int challen,
130 + if (challen != 0) {
132 + for (count=0; count!=(challen-1); count++) {
135 + fprintf(logfd, "%02x\n",challenge[challen-1]);
147 + && challen != 0 && resplen != 0) {
149 + for (count=0; count<challen; count++) {

1234567