/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | chap_fmt_plug.c | 92 int challenge_length; member 157 cs.challenge_length = strlen(p) / 2; in get_salt() 158 for (i = 0; i < cs.challenge_length; i++) in get_salt() 205 MD5_Update(&ctx, cur_salt->challenge, cur_salt->challenge_length); in crypt_all()
|
/dports/finance/gnucash/gnucash-4.9/gnucash/import-export/aqb/ |
H A D | gnc-flicker-gui.c | 70 guint challenge_length; member 133 guint challenge_length = strlen (code); in flicker_data() local 137 for (guint i = 0; i < challenge_length; i += 2) in flicker_data() 147 return challenge_length; in flicker_data() 244 if (flickerdraw.halfbyteid >= flickerdraw.challenge_length) in do_flicker_drawing() 308 flickerdraw.challenge_length = flicker_data (flickerdraw.challenge); in on_flicker_challenge_map()
|
/dports/security/libressl-static/libressl-3.3.5/ssl/ |
H A D | ssl_packet.c | 77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local 145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello() 151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
|
/dports/security/libressl/libressl-3.4.3/ssl/ |
H A D | ssl_packet.c | 76 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local 144 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello() 150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
|
/dports/emulators/citra/citra-ac98458e0/externals/libressl/ssl/ |
H A D | ssl_packet.c | 77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local 145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello() 151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/ssl/ |
H A D | ssl_packet.c | 77 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local 145 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello() 151 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
|
/dports/www/obhttpd/libressl-3.4.1/ssl/ |
H A D | ssl_packet.c | 76 uint16_t session_id_length, challenge_length; in ssl_convert_sslv2_client_hello() local 144 if (!CBS_get_u16(&cbs, &challenge_length)) in ssl_convert_sslv2_client_hello() 150 if (!CBS_get_bytes(&cbs, &challenge, challenge_length)) in ssl_convert_sslv2_client_hello()
|
/dports/security/s2n/s2n-tls-1.1.2/tls/ |
H A D | s2n_client_hello.c | 543 uint16_t challenge_length; in s2n_sslv2_client_hello_recv() local 544 POSIX_GUARD(s2n_stuffer_read_uint16(in, &challenge_length)); in s2n_sslv2_client_hello_recv() 546 S2N_ERROR_IF(challenge_length > S2N_TLS_RANDOM_DATA_LEN, S2N_ERR_BAD_MESSAGE); in s2n_sslv2_client_hello_recv() 569 b.data += S2N_TLS_RANDOM_DATA_LEN - challenge_length; in s2n_sslv2_client_hello_recv() 570 b.size -= S2N_TLS_RANDOM_DATA_LEN - challenge_length; in s2n_sslv2_client_hello_recv()
|
/dports/comms/bforce-kst/bforce-0.22.8.kst7/source/bforce/ |
H A D | prot_binkp.c | 140 remote_data->challenge_length, digest_bin); in binkp_outgoing() 257 if( remote_data->challenge_length > 0 in binkp_auth_incoming() 264 remote_data->challenge_length); in binkp_auth_incoming() 295 remote_data->challenge_length = local_data->challenge_length; in binkp_incoming()
|
H A D | prot_binkp_misc.c | 501 if( !state.caller && binkp->challenge_length > 0 ) in binkp_queue_sysinfo() 504 string_bin_to_hex(challenge, binkp->challenge, binkp->challenge_length); in binkp_queue_sysinfo() 691 binkp->challenge_length = 10; in binkp_set_sysinfo() 732 binkp->challenge_length = string_hex_to_bin( in binkp_parse_options()
|
/dports/net-mgmt/yaf/yaf-2.11.0/src/applabel/plugins/ |
H A D | tlsplugin.c | 534 uint16_t challenge_length; in decodeSSLv2() local 552 challenge_length = ntohs(*(uint16_t *)(payload + offsetptr)); in decodeSSLv2() 568 offsetptr += cipher_spec_length + challenge_length; in decodeSSLv2()
|
H A D | proxyplugin.c | 575 uint16_t challenge_length; in decodeSSLv2() local 593 challenge_length = ntohs(*(uint16_t *)(payload + offsetptr)); in decodeSSLv2() 609 offsetptr += cipher_spec_length + challenge_length; in decodeSSLv2()
|
/dports/comms/bforce-kst/bforce-0.22.8.kst7/source/include/ |
H A D | session.h | 71 int challenge_length; member 189 const char *challenge, int challenge_length);
|
/dports/net/p5-Socket-Class/Socket-Class-2.258/xs/sc_ssl/openssl/source/ssl/ |
H A D | s2_srvr.c | 561 n2s(p,i); s->s2->challenge_length=i; in get_client_hello() 574 …len = 9 + (unsigned long)s->s2->tmp.cipher_spec_length + (unsigned long)s->s2->challenge_length + … in get_client_hello() 683 if (s->s2->challenge_length > sizeof s->s2->challenge) in get_client_hello() 689 memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length); in get_client_hello() 879 if (s->s2->challenge_length > sizeof s->s2->challenge) in server_verify() 884 memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length); in server_verify() 888 s->init_num=s->s2->challenge_length+1; in server_verify()
|
/dports/comms/qico/qico-15673bf/src/ |
H A D | md5q.h | 99 int challenge_length, unsigned char *digest);
|
/dports/devel/godot2-tools/godot-2.1.6-stable/thirdparty/openssl/ssl/ |
H A D | s2_srvr.c | 604 s->s2->challenge_length = i; in get_client_hello() 618 (unsigned long)s->s2->challenge_length + in get_client_hello() 727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello() 732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello() 906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify() 910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify() 914 s->init_num = s->s2->challenge_length + 1; in server_verify()
|
/dports/devel/godot2/godot-2.1.6-stable/thirdparty/openssl/ssl/ |
H A D | s2_srvr.c | 604 s->s2->challenge_length = i; in get_client_hello() 618 (unsigned long)s->s2->challenge_length + in get_client_hello() 727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello() 732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello() 906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify() 910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify() 914 s->init_num = s->s2->challenge_length + 1; in server_verify()
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/ssl/ |
H A D | s2_srvr.c | 604 s->s2->challenge_length = i; in get_client_hello() 618 (unsigned long)s->s2->challenge_length + in get_client_hello() 727 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in get_client_hello() 732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello() 906 if (s->s2->challenge_length > sizeof(s->s2->challenge)) { in server_verify() 910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify() 914 s->init_num = s->s2->challenge_length + 1; in server_verify()
|
/dports/security/openssl-unsafe/openssl-c9ba19c/ssl/ |
H A D | s2_srvr.c | 604 s->s2->challenge_length = i; in get_client_hello() 618 (unsigned long)s->s2->challenge_length + in get_client_hello() 727 if (s->s2->challenge_length > sizeof s->s2->challenge) { in get_client_hello() 732 memcpy(s->s2->challenge, p, (unsigned int)s->s2->challenge_length); in get_client_hello() 906 if (s->s2->challenge_length > sizeof s->s2->challenge) { in server_verify() 910 memcpy(p, s->s2->challenge, (unsigned int)s->s2->challenge_length); in server_verify() 914 s->init_num = s->s2->challenge_length + 1; in server_verify()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/ |
H A D | s3_both.cc | 385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local 391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello() 394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/ssl/ |
H A D | s3_both.cc | 385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local 391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello() 394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | s3_both.cc | 385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local 391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello() 394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | s3_both.cc | 385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local 391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello() 394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
|
/dports/security/boringssl/boringssl-6a71840/ssl/ |
H A D | s3_both.cc | 385 uint16_t version, cipher_spec_length, session_id_length, challenge_length; in read_v2_client_hello() local 391 !CBS_get_u16(&v2_client_hello, &challenge_length) || in read_v2_client_hello() 394 !CBS_get_bytes(&v2_client_hello, &challenge, challenge_length) || in read_v2_client_hello()
|
/dports/sysutils/barrier/barrier-2.3.3/ext/openssl/windows/x86/include/openssl/ |
H A D | ssl2.h | 195 unsigned int challenge_length; member
|