/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dports/security/ykpers/ykpers-1.19.0/ |
H A D | ykchalresp.c | 87 unsigned char **challenge, unsigned int *challenge_len, in parse_args() argument 167 *challenge_len = 8; in parse_args() 180 *challenge_len = len; in parse_args() 183 *challenge_len = strlen(argv[optind]); in parse_args() 189 if (*challenge_len > sizeof(decoded) * 2) { in parse_args() 195 if (*challenge_len % 2 != 0) { in parse_args() 209 *challenge_len /= 2; in parse_args() 318 unsigned int challenge_len; in main() local 326 &challenge, &challenge_len, in main() 347 challenge, challenge_len, in main()
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; in eap_md5_process() local 58 challenge_len = *pos++; in eap_md5_process() 59 if (challenge_len == 0 || challenge_len > len - 1) { in eap_md5_process() 62 (unsigned long) challenge_len, (unsigned long) len); in eap_md5_process() 69 challenge, challenge_len); in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dports/net/freeradius3/freeradius-server-3.0.25/src/modules/rlm_otp/ |
H A D | rlm_otp.c | 42 { "challenge_length", FR_CONF_OFFSET(PW_TYPE_INTEGER, rlm_otp_t, challenge_len), "6" }, 79 if ((inst->challenge_len < 5) || in mod_instantiate() 80 (inst->challenge_len > OTP_MAX_CHALLENGE_LEN)) { in mod_instantiate() 81 inst->challenge_len = 6; in mod_instantiate() 85 inst->challenge_len, OTP_MAX_CHALLENGE_LEN); in mod_instantiate() 189 otp_async_challenge(challenge, inst->challenge_len); in CC_HINT() 213 len = otp_gen_state(gen_state, challenge, inst->challenge_len, in CC_HINT() 339 elen = (inst->challenge_len * 2) + 8 + 8 + 32; in CC_HINT() 367 memcpy(challenge, bin_state, inst->challenge_len); in CC_HINT() 372 memcpy(&then, bin_state + inst->challenge_len + 4, 4); in CC_HINT() [all …]
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | rfc1938.c | 63 size_t challenge_len; in sudo_rfc1938_setup() local 107 challenge_len = strlen(challenge); in sudo_rfc1938_setup() 108 if (np_size < op_len + challenge_len + 7) { in sudo_rfc1938_setup() 109 char *p = realloc(new_prompt, op_len + challenge_len + 7); in sudo_rfc1938_setup() 114 np_size = op_len + challenge_len + 7; in sudo_rfc1938_setup()
|
/dports/mail/libesmtp/libesmtp-1.0.6/crammd5/ |
H A D | hmacmd5.c | 94 hmac_md5_post (const void *challenge, size_t challenge_len, in hmac_md5_post() argument 100 MD5_Update (inner, challenge, challenge_len); in hmac_md5_post() 111 hmac_md5 (const void *challenge, size_t challenge_len, in hmac_md5() argument 118 hmac_md5_post (challenge, challenge_len, &inner, &outer, digest); in hmac_md5()
|
/dports/mail/xfce4-mailwatch-plugin/xfce4-mailwatch-plugin-1.3.0/libmailwatch-core/ |
H A D | mailwatch-utils.c | 59 gsize challenge_len; in xfce_mailwatch_cram_md5() local 66 challenge = g_base64_decode(challenge_base64, &challenge_len); in xfce_mailwatch_cram_md5() 72 challenge, challenge_len); in xfce_mailwatch_cram_md5()
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/libgit2-sys-0.12.26+1.3.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/misc/broot/broot-1.7.0/cargo-crates/libgit2-sys-0.12.21+1.1.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/sentry-cli/sentry-cli-1.71.0/cargo-crates/libgit2-sys-0.12.23+1.2.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/git-absorb/git-absorb-0.6.6/cargo-crates/libgit2-sys-0.12.13+1.0.1/libgit2/src/transports/ |
H A D | auth_ntlm.c | 86 size_t challenge_len, msg_len; in ntlm_next_token() local 91 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 106 if (challenge_len < 4) { in ntlm_next_token() 109 } else if (challenge_len == 4) { in ntlm_next_token() 129 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/git-delta/delta-0.9.2/cargo-crates/libgit2-sys-0.12.24+1.3.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/libgit2-sys-0.12.7+1.0.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 86 size_t challenge_len, msg_len; in ntlm_next_token() local 91 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 106 if (challenge_len < 4) { in ntlm_next_token() 109 } else if (challenge_len == 4) { in ntlm_next_token() 129 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/libgit2-sys-0.12.23+1.2.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/tokei/tokei-12.1.2/cargo-crates/libgit2-sys-0.12.17+1.1.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/gbump/gbump-1.0.1/cargo-crates/libgit2-sys-0.9.1/libgit2/src/transports/ |
H A D | auth_ntlm.c | 85 size_t challenge_len, msg_len; in ntlm_next_token() local 90 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 105 if (challenge_len < 4) { in ntlm_next_token() 108 } else if (challenge_len == 4) { in ntlm_next_token() 128 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/libgit2/libgit2-1.3.0/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/libgit2-sys-0.12.19+1.1.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/gitui/gitui-0.10.1/cargo-crates/libgit2-sys-0.12.12+1.0.1/libgit2/src/transports/ |
H A D | auth_ntlm.c | 86 size_t challenge_len, msg_len; in instrument_persitent_restore_regs() 91 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in instrument_persitent_restore_regs() 106 if (challenge_len < 4) { in instrument_persitent_restore_regs() 109 } else if (challenge_len == 4) { in instrument_persitent_restore_regs() 129 ctx->challenge + 5, challenge_len - 5) < 0) { in instrument_persitent_restore_regs()
|
/dports/devel/cargo-generate/cargo-generate-0.9.0/cargo-crates/libgit2-sys-0.12.22+1.1.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/sysutils/onefetch/onefetch-2.10.2/cargo-crates/libgit2-sys-0.12.21+1.1.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libgit2-sys-0.12.24+1.3.0/libgit2/src/transports/ |
H A D | auth_ntlm.c | 87 size_t challenge_len, msg_len; in ntlm_next_token() local 95 challenge_len = ctx->challenge ? strlen(ctx->challenge) : 0; in ntlm_next_token() 110 if (challenge_len < 4) { in ntlm_next_token() 113 } else if (challenge_len == 4) { in ntlm_next_token() 133 ctx->challenge + 5, challenge_len - 5) < 0) { in ntlm_next_token()
|