Home
last modified time | relevance | path

Searched refs:challenge_length (Results 1 – 25 of 83) sorted by relevance

1234

/dports/security/john/john-1.9.0-jumbo-1/src/
H A Dchap_fmt_plug.c92 int challenge_length; member
157 cs.challenge_length = strlen(p) / 2; in get_salt()
158 for (i = 0; i < cs.challenge_length; i++) in get_salt()
205 MD5_Update(&ctx, cur_salt->challenge, cur_salt->challenge_length); in crypt_all()
/dports/finance/gnucash/gnucash-4.9/gnucash/import-export/aqb/
H A Dgnc-flicker-gui.c70 guint challenge_length; member
133 guint challenge_length = strlen (code); in flicker_data() local
137 for (guint i = 0; i < challenge_length; i += 2) in flicker_data()
147 return challenge_length; in flicker_data()
244 if (flickerdraw.halfbyteid >= flickerdraw.challenge_length) in do_flicker_drawing()
308 flickerdraw.challenge_length = flicker_data (flickerdraw.challenge); in on_flicker_challenge_map()
/dports/security/libressl-static/libressl-3.3.5/ssl/
H A Dssl_packet.c77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local
145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello()
151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
/dports/security/libressl/libressl-3.4.3/ssl/
H A Dssl_packet.c76 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local
144 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello()
150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
/dports/emulators/citra/citra-ac98458e0/externals/libressl/ssl/
H A Dssl_packet.c77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local
145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello()
151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/ssl/
H A Dssl_packet.c77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local
145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello()
151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
/dports/www/obhttpd/libressl-3.4.1/ssl/
H A Dssl_packet.c76 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local
144 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello()
150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
/dports/security/s2n/s2n-tls-1.1.2/tls/
H A Ds2n_client_hello.c543 uint16_t challenge_length; in s2n_sslv2_client_hello_recv() local
544 POSIX_GUARD(s2n_stuffer_read_uint16(in, &challenge_length)); in s2n_sslv2_client_hello_recv()
546 S2N_ERROR_IF(challenge_length > S2N_TLS_RANDOM_DATA_LEN, S2N_ERR_BAD_MESSAGE); in s2n_sslv2_client_hello_recv()
569 b.data += S2N_TLS_RANDOM_DATA_LEN - challenge_length; in s2n_sslv2_client_hello_recv()
570 b.size -= S2N_TLS_RANDOM_DATA_LEN - challenge_length; in s2n_sslv2_client_hello_recv()
/dports/comms/bforce-kst/bforce-0.22.8.kst7/source/bforce/
H A Dprot_binkp.c140 remote_data->challenge_length, digest_bin); in binkp_outgoing()
257 if( remote_data->challenge_length > 0 in binkp_auth_incoming()
264 remote_data->challenge_length); in binkp_auth_incoming()
295 remote_data->challenge_length = local_data->challenge_length; in binkp_incoming()
H A Dprot_binkp_misc.c501 if( !state.caller && binkp->challenge_length > 0 ) in binkp_queue_sysinfo()
504 string_bin_to_hex(challenge, binkp->challenge, binkp->challenge_length); in binkp_queue_sysinfo()
691 binkp->challenge_length = 10; in binkp_set_sysinfo()
732 binkp->challenge_length = string_hex_to_bin( in binkp_parse_options()
/dports/net-mgmt/yaf/yaf-2.11.0/src/applabel/plugins/
H A Dtlsplugin.c534 uint16_t challenge_length; in decodeSSLv2() local
552 challenge_length = ntohs(*(uint16_t *)(payload + offsetptr)); in decodeSSLv2()
568 offsetptr += cipher_spec_length + challenge_length; in decodeSSLv2()
H A Dproxyplugin.c575 uint16_t challenge_length; in decodeSSLv2() local
593 challenge_length = ntohs(*(uint16_t *)(payload + offsetptr)); in decodeSSLv2()
609 offsetptr += cipher_spec_length + challenge_length; in decodeSSLv2()
/dports/comms/bforce-kst/bforce-0.22.8.kst7/source/include/
H A Dsession.h71 int challenge_length; member
189 const char *challenge, int challenge_length);
/dports/net/p5-Socket-Class/Socket-Class-2.258/xs/sc_ssl/openssl/source/ssl/
H A Ds2_srvr.c561 n2s(p,i); s->s2->challenge_length=i; in get_client_hello()
574 …len = 9 + (unsigned long)s->s2->tmp.cipher_spec_length + (unsigned long)s->s2->challenge_length + … in get_client_hello()
683 if (s->s2->challenge_length > sizeof s->s2->challenge) in get_client_hello()
689 memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length); in get_client_hello()
879 if (s->s2->challenge_length > sizeof s->s2->challenge) in server_verify()
884 memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length); in server_verify()
888 s->init_num=s->s2->challenge_length+1; in server_verify()
/dports/comms/qico/qico-15673bf/src/
H A Dmd5q.h99 int challenge_length, unsigned char *digest);
/dports/devel/godot2-tools/godot-2.1.6-stable/thirdparty/openssl/ssl/
H A Ds2_srvr.c604 s->s2->challenge_length = i; in get_client_hello()
618 (unsigned long)s->s2->challenge_length + in get_client_hello()
727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello()
732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello()
906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify()
910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify()
914 s->init_num = s->s2->challenge_length + 1; in server_verify()
/dports/devel/godot2/godot-2.1.6-stable/thirdparty/openssl/ssl/
H A Ds2_srvr.c604 s->s2->challenge_length = i; in get_client_hello()
618 (unsigned long)s->s2->challenge_length + in get_client_hello()
727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello()
732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello()
906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify()
910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify()
914 s->init_num = s->s2->challenge_length + 1; in server_verify()
/dports/security/openssl-legacy-static/openssl-1.0.2u/ssl/
H A Ds2_srvr.c604 s->s2->challenge_length = i; in get_client_hello()
618 (unsigned long)s->s2->challenge_length + in get_client_hello()
727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello()
732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello()
906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify()
910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify()
914 s->init_num = s->s2->challenge_length + 1; in server_verify()
/dports/security/openssl-unsafe/openssl-c9ba19c/ssl/
H A Ds2_srvr.c604 s->s2->challenge_length = i; in get_client_hello()
618 (unsigned long)s->s2->challenge_length + in get_client_hello()
727 if (s->s2->challenge_length > sizeof s->s2->challenge) { in get_client_hello()
732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello()
906 if (s->s2->challenge_length > sizeof s->s2->challenge) { in server_verify()
910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify()
914 s->init_num = s->s2->challenge_length + 1; in server_verify()
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/
H A Ds3_both.cc385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local
391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello()
394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/ssl/
H A Ds3_both.cc385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local
391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello()
394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/
H A Ds3_both.cc385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local
391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello()
394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/
H A Ds3_both.cc385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local
391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello()
394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
/dports/security/boringssl/boringssl-6a71840/ssl/
H A Ds3_both.cc385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local
391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello()
394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
/dports/sysutils/barrier/barrier-2.3.3/ext/openssl/windows/x86/include/openssl/
H A Dssl2.h195 unsigned int challenge_length; member

1234