Home
last modified time | relevance | path

Searched refs:pwlen (Results 1 – 25 of 298) sorted by relevance

12345678910>>...12

/dports/security/john/john-1.9.0-jumbo-1/src/
H A Dmd5crypt_long_fmt.c247 int pwlen = strlen(pw); in crypt_md5() local
249 pwlen = PLAINTEXT_LENGTH; in crypt_md5()
266 MD5_Update(&ctx, pw, pwlen); in crypt_md5()
299 memcpy(&buf[sl + pwlen], pw, pwlen); in crypt_md5()
301 memcpy(&buf[sl + (pwlen << 1) + sl], pw, pwlen); in crypt_md5()
306 bufl[0] = pwlen; in crypt_md5()
308 bufl[1] = pwlen << 1; in crypt_md5()
310 bufl[2] = sl + pwlen; in crypt_md5()
312 bufl[3] = bufl[2] + pwlen; in crypt_md5()
313 bufp[4] = &buf[sl + pwlen]; in crypt_md5()
[all …]
H A Dpdf_fmt_plug.c382 if (pwlen > 32) in pdf_compute_encryption_key()
383 pwlen = 32; in pdf_compute_encryption_key()
384 memcpy(buf, password, pwlen); in pdf_compute_encryption_key()
385 memcpy(buf + pwlen, padding, 32 - pwlen); in pdf_compute_encryption_key()
446 if (pwlen > 127) in pdf_compute_encryption_key_r5()
447 pwlen = 127; in pdf_compute_encryption_key_r5()
451 memcpy(buffer, password, pwlen); in pdf_compute_encryption_key_r5()
488 SHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6()
497 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6()
548 int pwlen = strlen((char*)password); in pdf_compute_user_password() local
[all …]
/dports/x11-wm/enlightenment/enlightenment-0.24.2/src/bin/
H A De_auth.c9 size_t pwlen; in e_auth_begin() local
11 pwlen = strlen(passwd); in e_auth_begin()
12 if (pwlen == 0) goto out; in e_auth_begin()
19 if (ecore_exe_send(exe, passwd, pwlen) != EINA_TRUE) goto out; in e_auth_begin()
34 e_util_memclear(passwd, pwlen); in e_auth_begin()
44 size_t pwlen, buflen = 0; in e_auth_polkit_begin() local
46 pwlen = strlen(passwd); in e_auth_polkit_begin()
47 if (pwlen == 0) goto out; in e_auth_polkit_begin()
70 e_util_memclear(passwd, pwlen); in e_auth_polkit_begin()
/dports/sysutils/syslinux/syslinux-6.03/com32/libutil/
H A Dcrypt-md5.c59 int pwlen = strlen(pw); in crypt_md5() local
75 MD5Update(&ctx, pw, pwlen); in crypt_md5()
85 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
87 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
89 for (pl = pwlen; pl > 0; pl -= MD5_SIZE) in crypt_md5()
96 for (i = pwlen; i; i >>= 1) in crypt_md5()
123 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
131 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
136 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
/dports/graphics/mupdf/mupdf-1.18.0-source/source/pdf/
H A Dpdf-crypt.c353 if (pwlen > 32) in pdf_compute_encryption_key()
354 pwlen = 32; in pdf_compute_encryption_key()
356 memcpy(buf + pwlen, padding, 32 - pwlen); in pdf_compute_encryption_key()
420 if (pwlen > 127) in pdf_compute_encryption_key_r5()
421 pwlen = 127; in pdf_compute_encryption_key_r5()
541 if (pwlen > 127) in pdf_compute_encryption_key_r6()
542 pwlen = 127; in pdf_compute_encryption_key_r6()
657 pwlen = 32; in pdf_authenticate_owner_password()
659 memcpy(pwbuf + pwlen, padding, 32 - pwlen); in pdf_authenticate_owner_password()
682 pwlen = 32; in pdf_authenticate_owner_password()
[all …]
/dports/security/p5-CryptX/CryptX-0.075/src/ltc/misc/pbes/
H A Dpbes1.c23 unsigned long pwlen = password_len * 2; in s_pkcs_12_wrap() local
26 pw = XMALLOC(pwlen + 2); in s_pkcs_12_wrap()
28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
29 pw[pwlen++] = 0; in s_pkcs_12_wrap()
30 pw[pwlen++] = 0; in s_pkcs_12_wrap()
32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap()
34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap()
38 zeromem(pw, pwlen); in s_pkcs_12_wrap()
/dports/print/ghostscript9-agpl-x11/ghostscript-9.52/psi/
H A Dzpdf_r6.c39 pdf_compute_hardened_hash_r6(unsigned char *password, int pwlen, unsigned char salt[16], unsigned c… in pdf_compute_hardened_hash_r6() argument
53 pSHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6()
62 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6()
63 memcpy(data + pwlen, block, block_size); in pdf_compute_hardened_hash_r6()
65 memcpy(data + pwlen + block_size, ownerkey, 48); in pdf_compute_hardened_hash_r6()
66 data_len = pwlen + block_size + (ownerkey ? 48 : 0); in pdf_compute_hardened_hash_r6()
105 pdf_compute_encryption_key_r6(unsigned char *password, int pwlen, unsigned char *O, unsigned char *… in pdf_compute_encryption_key_r6() argument
111 if (pwlen > 127) in pdf_compute_encryption_key_r6()
112 pwlen = 127; in pdf_compute_encryption_key_r6()
114 pdf_compute_hardened_hash_r6(password, pwlen, in pdf_compute_encryption_key_r6()
[all …]
/dports/print/ghostscript9-agpl-base/ghostscript-9.52/psi/
H A Dzpdf_r6.c39 pdf_compute_hardened_hash_r6(unsigned char *password, int pwlen, unsigned char salt[16], unsigned c… in pdf_compute_hardened_hash_r6() argument
53 pSHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6()
62 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6()
63 memcpy(data + pwlen, block, block_size); in pdf_compute_hardened_hash_r6()
65 memcpy(data + pwlen + block_size, ownerkey, 48); in pdf_compute_hardened_hash_r6()
66 data_len = pwlen + block_size + (ownerkey ? 48 : 0); in pdf_compute_hardened_hash_r6()
105 pdf_compute_encryption_key_r6(unsigned char *password, int pwlen, unsigned char *O, unsigned char *… in pdf_compute_encryption_key_r6() argument
111 if (pwlen > 127) in pdf_compute_encryption_key_r6()
112 pwlen = 127; in pdf_compute_encryption_key_r6()
114 pdf_compute_hardened_hash_r6(password, pwlen, in pdf_compute_encryption_key_r6()
[all …]
/dports/security/otpw/otpw-1.5/
H A Dotpw-gen.c540 if (pwlen >= buflen) in make_passwd()
552 j = pwlen - 1; in make_passwd()
553 k = (pwlen - pwchars) / 2; in make_passwd()
561 buf[pwlen] = '\0'; in make_passwd()
579 return pwlen; in make_passwd()
594 int pwlen, pwchars, mklen; in main() local
700 assert(pwlen >= 0); in main()
701 password = malloc(pwlen+1); in main()
710 password, pwlen+1); in main()
855 password = malloc(pwlen + 1); in main()
[all …]
H A Dotpw.c252 ch->pwlen = 0; in otpw_prepare()
336 ch->pwlen < 4 || ch->pwlen > 999 || in otpw_prepare()
504 int challen, pwlen, hlen; in otpw_verify() local
552 otpw[i*ch->pwlen + j] = 'I'; in otpw_verify()
554 otpw[i*ch->pwlen + j] = 'O'; in otpw_verify()
556 otpw[i*ch->pwlen + j] = '/'; in otpw_verify()
565 otpw[i*ch->pwlen + j] = password[l]; in otpw_verify()
569 DEBUG_LOG("Password %d = '%.*s'", i, ch->pwlen, otpw + i*ch->pwlen); in otpw_verify()
586 md_add(&md, otpw + i*ch->pwlen, ch->pwlen); in otpw_verify()
615 &challen, &hlen, &pwlen) != 4 || in otpw_verify()
[all …]
/dports/security/gnutls/gnutls-3.6.16/lib/x509/
H A Dpkcs12_encr.c52 unsigned int pwlen; in _gnutls_pkcs12_string_to_key() local
91 pwlen = strlen(pw); in _gnutls_pkcs12_string_to_key()
93 if (pwlen == 0) { in _gnutls_pkcs12_string_to_key()
99 rc = _gnutls_utf8_to_ucs2(pw, pwlen, &ucs2, 1); in _gnutls_pkcs12_string_to_key()
106 pwlen = ucs2.size; in _gnutls_pkcs12_string_to_key()
109 pwlen = 0; in _gnutls_pkcs12_string_to_key()
112 if (pwlen > MAX_PASS_LEN) { in _gnutls_pkcs12_string_to_key()
125 plen = ((pwlen+v_size-1)/v_size) * v_size; in _gnutls_pkcs12_string_to_key()
142 if (j >= pwlen) in _gnutls_pkcs12_string_to_key()
/dports/net/owamp/owamp-3.3/I2util/I2util/
H A Dpbkdf2.c129 uint32_t pwlen, in F() argument
154 (*prf)(pw,pwlen,buffer,saltlen+4,buffer); in F()
170 (*prf)(pw,pwlen,buffer,prf_hlen,buffer); in F()
197 uint32_t pwlen, in I2pbkdf2() argument
254 F(prf,prf_hlen,pw,pwlen,salt,saltlen,count,i+1,tmpbuff,out); in I2pbkdf2()
266 F(prf,prf_hlen,pw,pwlen,salt,saltlen,count,l+1,tmpbuff,outbuff); in I2pbkdf2()
/dports/security/gopass/gopass-1.13.0/internal/action/
H A Dgenerate.go197 var pwlen int
205 pwlen = iv
211 pwlen = iv
214 if pwlen < 1 {
227 return pwgen.GenerateExternal(pwlen)
230 return pwgen.GeneratePasswordWithAllClasses(pwlen, symbols)
232 return pwgen.GeneratePassword(pwlen, symbols), nil
244 var pwlen int
252 pwlen = iv
258 pwlen = iv
[all …]
/dports/security/yapet/yapet-2.3/src/libs/ui/
H A Dpwgendialog.cc87 YAPET::Globals::config.pwgenpwlen.set_str(pwlen.input()); in button_press_handler()
90 pwlen.input(YAPET::Globals::config.pwgenpwlen); in button_press_handler()
109 pwlen{},
117 pwlen.max_input(3);
118 pwlen.filter(YACURS::FilterDigit());
147 mainpack.add_back(&pwlen);
160 pwlen.input(conv.str());
/dports/security/john/john-1.9.0-jumbo-1/src/opencl/
H A D7z_kernel.cl97 const uint pwlen = inbuffer[gid].length;
98 const uint blocklen = pwlen + 8;
109 for (j = 0; j < pwlen; j++)
111 PUTCHAR_BE(block, i * blocklen + pwlen + 2, round >> 16);
113 PUTCHAR_BE(block, i * blocklen + pwlen + j, 0);
122 PUTCHAR_BE(block, i * blocklen + pwlen + 0, round & 0xff);
124 PUTCHAR_BE(block, i * blocklen + pwlen + 1, (round >> 8) & 0xff);
141 uint pwlen = inbuffer[gid].length;
147 sha256_zerofinal(block, hash, (pwlen + 8) * (1U << salt->iterations));
H A Drar_kernel.cl85 const uint pwlen = pw_len[gid];
86 const uint blocklen = pwlen + 11;
95 for (j = 0; j < pwlen; j++)
98 PUTCHAR_BE(block, i * blocklen + pwlen + j, ((__constant uchar*)salt)[j]);
99 PUTCHAR_BE(block, i * blocklen + pwlen + 10, round >> 16);
114 PUTCHAR_BE(W, pwlen + 8, round & 255);
115 PUTCHAR_BE(W, pwlen + 9, (round >> 8) & 255);
129 PUTCHAR_BE(block, i * blocklen + pwlen + 8, round & 0xff);
131 PUTCHAR_BE(block, i * blocklen + pwlen + 9, (round >> 8) & 0xff);
/dports/databases/mariadb-connector-c/mariadb-connector-c-3.2.4-src/plugins/auth/
H A Dsha256_pw.c168 unsigned int pwlen, i; in auth_sha256_client() local
276 pwlen= (unsigned int)strlen(mysql->passwd) + 1; /* include terminating zero */ in auth_sha256_client()
277 if (pwlen > MAX_PW_LEN) in auth_sha256_client()
279 memcpy(passwd, mysql->passwd, pwlen); in auth_sha256_client()
282 for (i=0; i < pwlen; i++) in auth_sha256_client()
287 if (EVP_PKEY_encrypt(ctx, NULL, &outlen, (unsigned char *)passwd, pwlen) <= 0) in auth_sha256_client()
291 if (EVP_PKEY_encrypt(ctx, rsa_enc_pw, &outlen, (unsigned char *)passwd, pwlen) <= 0) in auth_sha256_client()
294 if (!CryptEncrypt(pubkey, 0, TRUE, CRYPT_OAEP, (BYTE *)passwd, (DWORD *)&pwlen, MAX_PW_LEN)) in auth_sha256_client()
/dports/net/openldap25-server/openldap-2.5.9/servers/slapd/back-passwd/
H A Dsearch.c279 size_t pwlen; in pw2entry() local
290 pwlen = strlen( pw->pw_name ); in pw2entry()
291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry()
317 val.bv_len = pwlen; in pw2entry()
345 if ( val.bv_len + pwlen <= r ) { in pw2entry()
352 memcpy( d, pw->pw_name, pwlen ); in pw2entry()
354 d += pwlen; in pw2entry()
355 r -= pwlen + i; in pw2entry()
360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
/dports/net/openldap25-client/openldap-2.5.9/servers/slapd/back-passwd/
H A Dsearch.c279 size_t pwlen; in pw2entry() local
290 pwlen = strlen( pw->pw_name ); in pw2entry()
291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry()
317 val.bv_len = pwlen; in pw2entry()
345 if ( val.bv_len + pwlen <= r ) { in pw2entry()
352 memcpy( d, pw->pw_name, pwlen ); in pw2entry()
354 d += pwlen; in pw2entry()
355 r -= pwlen + i; in pw2entry()
360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
/dports/net/openldap26-client/openldap-2.6.0/servers/slapd/back-passwd/
H A Dsearch.c279 size_t pwlen; in pw2entry() local
290 pwlen = strlen( pw->pw_name ); in pw2entry()
291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry()
317 val.bv_len = pwlen; in pw2entry()
345 if ( val.bv_len + pwlen <= r ) { in pw2entry()
352 memcpy( d, pw->pw_name, pwlen ); in pw2entry()
354 d += pwlen; in pw2entry()
355 r -= pwlen + i; in pw2entry()
360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
/dports/net/openldap26-server/openldap-2.6.0/servers/slapd/back-passwd/
H A Dsearch.c279 size_t pwlen; in pw2entry() local
290 pwlen = strlen( pw->pw_name ); in pw2entry()
291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry()
317 val.bv_len = pwlen; in pw2entry()
345 if ( val.bv_len + pwlen <= r ) { in pw2entry()
352 memcpy( d, pw->pw_name, pwlen ); in pw2entry()
354 d += pwlen; in pw2entry()
355 r -= pwlen + i; in pw2entry()
360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
/dports/www/lighttpd/lighttpd-1.4.63/src/
H A Dmod_authn_file.c187 ,{ pw, pwlen } in mod_authn_file_digest()
471 const size_t pwlen = strlen(pw); in apr_md5_encode() local
506 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
508 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
519 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
552 for (size_t i = pwlen; i != 0; i >>= 1) { in apr_md5_encode()
565 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
575 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
582 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode()
636 size_t pwlen = strlen(pw) * 2; in mod_authn_file_crypt_cmp() local
[all …]
/dports/net/librdkafka/librdkafka-1.8.2/src/
H A Drdkafka_sasl_plain.c75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local
79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new()
90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new()
91 of += pwlen; in rd_kafka_sasl_plain_client_new()
/dports/sysutils/vector/vector-0.10.0/cargo-crates/rdkafka-sys-2.0.0+1.4.2/librdkafka/src/
H A Drdkafka_sasl_plain.c75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local
79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new()
90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new()
91 of += pwlen; in rd_kafka_sasl_plain_client_new()
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/plugins/out_kafka/librdkafka-1.7.0/src/
H A Drdkafka_sasl_plain.c75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local
79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new()
90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new()
91 of += pwlen; in rd_kafka_sasl_plain_client_new()

12345678910>>...12