/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | md5crypt_long_fmt.c | 247 int pwlen = strlen(pw); in crypt_md5() local 249 pwlen = PLAINTEXT_LENGTH; in crypt_md5() 266 MD5_Update(&ctx, pw, pwlen); in crypt_md5() 299 memcpy(&buf[sl + pwlen], pw, pwlen); in crypt_md5() 301 memcpy(&buf[sl + (pwlen << 1) + sl], pw, pwlen); in crypt_md5() 306 bufl[0] = pwlen; in crypt_md5() 308 bufl[1] = pwlen << 1; in crypt_md5() 310 bufl[2] = sl + pwlen; in crypt_md5() 312 bufl[3] = bufl[2] + pwlen; in crypt_md5() 313 bufp[4] = &buf[sl + pwlen]; in crypt_md5() [all …]
|
H A D | pdf_fmt_plug.c | 382 if (pwlen > 32) in pdf_compute_encryption_key() 383 pwlen = 32; in pdf_compute_encryption_key() 384 memcpy(buf, password, pwlen); in pdf_compute_encryption_key() 385 memcpy(buf + pwlen, padding, 32 - pwlen); in pdf_compute_encryption_key() 446 if (pwlen > 127) in pdf_compute_encryption_key_r5() 447 pwlen = 127; in pdf_compute_encryption_key_r5() 451 memcpy(buffer, password, pwlen); in pdf_compute_encryption_key_r5() 488 SHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6() 497 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6() 548 int pwlen = strlen((char*)password); in pdf_compute_user_password() local [all …]
|
/dports/x11-wm/enlightenment/enlightenment-0.24.2/src/bin/ |
H A D | e_auth.c | 9 size_t pwlen; in e_auth_begin() local 11 pwlen = strlen(passwd); in e_auth_begin() 12 if (pwlen == 0) goto out; in e_auth_begin() 19 if (ecore_exe_send(exe, passwd, pwlen) != EINA_TRUE) goto out; in e_auth_begin() 34 e_util_memclear(passwd, pwlen); in e_auth_begin() 44 size_t pwlen, buflen = 0; in e_auth_polkit_begin() local 46 pwlen = strlen(passwd); in e_auth_polkit_begin() 47 if (pwlen == 0) goto out; in e_auth_polkit_begin() 70 e_util_memclear(passwd, pwlen); in e_auth_polkit_begin()
|
/dports/sysutils/syslinux/syslinux-6.03/com32/libutil/ |
H A D | crypt-md5.c | 59 int pwlen = strlen(pw); in crypt_md5() local 75 MD5Update(&ctx, pw, pwlen); in crypt_md5() 85 MD5Update(&ctx1, pw, pwlen); in crypt_md5() 87 MD5Update(&ctx1, pw, pwlen); in crypt_md5() 89 for (pl = pwlen; pl > 0; pl -= MD5_SIZE) in crypt_md5() 96 for (i = pwlen; i; i >>= 1) in crypt_md5() 123 MD5Update(&ctx1, pw, pwlen); in crypt_md5() 131 MD5Update(&ctx1, pw, pwlen); in crypt_md5() 136 MD5Update(&ctx1, pw, pwlen); in crypt_md5()
|
/dports/graphics/mupdf/mupdf-1.18.0-source/source/pdf/ |
H A D | pdf-crypt.c | 353 if (pwlen > 32) in pdf_compute_encryption_key() 354 pwlen = 32; in pdf_compute_encryption_key() 356 memcpy(buf + pwlen, padding, 32 - pwlen); in pdf_compute_encryption_key() 420 if (pwlen > 127) in pdf_compute_encryption_key_r5() 421 pwlen = 127; in pdf_compute_encryption_key_r5() 541 if (pwlen > 127) in pdf_compute_encryption_key_r6() 542 pwlen = 127; in pdf_compute_encryption_key_r6() 657 pwlen = 32; in pdf_authenticate_owner_password() 659 memcpy(pwbuf + pwlen, padding, 32 - pwlen); in pdf_authenticate_owner_password() 682 pwlen = 32; in pdf_authenticate_owner_password() [all …]
|
/dports/security/p5-CryptX/CryptX-0.075/src/ltc/misc/pbes/ |
H A D | pbes1.c | 23 unsigned long pwlen = password_len * 2; in s_pkcs_12_wrap() local 26 pw = XMALLOC(pwlen + 2); in s_pkcs_12_wrap() 28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap() 29 pw[pwlen++] = 0; in s_pkcs_12_wrap() 30 pw[pwlen++] = 0; in s_pkcs_12_wrap() 32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap() 34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap() 38 zeromem(pw, pwlen); in s_pkcs_12_wrap()
|
/dports/print/ghostscript9-agpl-x11/ghostscript-9.52/psi/ |
H A D | zpdf_r6.c | 39 pdf_compute_hardened_hash_r6(unsigned char *password, int pwlen, unsigned char salt[16], unsigned c… in pdf_compute_hardened_hash_r6() argument 53 pSHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6() 62 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6() 63 memcpy(data + pwlen, block, block_size); in pdf_compute_hardened_hash_r6() 65 memcpy(data + pwlen + block_size, ownerkey, 48); in pdf_compute_hardened_hash_r6() 66 data_len = pwlen + block_size + (ownerkey ? 48 : 0); in pdf_compute_hardened_hash_r6() 105 pdf_compute_encryption_key_r6(unsigned char *password, int pwlen, unsigned char *O, unsigned char *… in pdf_compute_encryption_key_r6() argument 111 if (pwlen > 127) in pdf_compute_encryption_key_r6() 112 pwlen = 127; in pdf_compute_encryption_key_r6() 114 pdf_compute_hardened_hash_r6(password, pwlen, in pdf_compute_encryption_key_r6() [all …]
|
/dports/print/ghostscript9-agpl-base/ghostscript-9.52/psi/ |
H A D | zpdf_r6.c | 39 pdf_compute_hardened_hash_r6(unsigned char *password, int pwlen, unsigned char salt[16], unsigned c… in pdf_compute_hardened_hash_r6() argument 53 pSHA256_Update(&sha256, password, pwlen); in pdf_compute_hardened_hash_r6() 62 memcpy(data, password, pwlen); in pdf_compute_hardened_hash_r6() 63 memcpy(data + pwlen, block, block_size); in pdf_compute_hardened_hash_r6() 65 memcpy(data + pwlen + block_size, ownerkey, 48); in pdf_compute_hardened_hash_r6() 66 data_len = pwlen + block_size + (ownerkey ? 48 : 0); in pdf_compute_hardened_hash_r6() 105 pdf_compute_encryption_key_r6(unsigned char *password, int pwlen, unsigned char *O, unsigned char *… in pdf_compute_encryption_key_r6() argument 111 if (pwlen > 127) in pdf_compute_encryption_key_r6() 112 pwlen = 127; in pdf_compute_encryption_key_r6() 114 pdf_compute_hardened_hash_r6(password, pwlen, in pdf_compute_encryption_key_r6() [all …]
|
/dports/security/otpw/otpw-1.5/ |
H A D | otpw-gen.c | 540 if (pwlen >= buflen) in make_passwd() 552 j = pwlen - 1; in make_passwd() 553 k = (pwlen - pwchars) / 2; in make_passwd() 561 buf[pwlen] = '\0'; in make_passwd() 579 return pwlen; in make_passwd() 594 int pwlen, pwchars, mklen; in main() local 700 assert(pwlen >= 0); in main() 701 password = malloc(pwlen+1); in main() 710 password, pwlen+1); in main() 855 password = malloc(pwlen + 1); in main() [all …]
|
H A D | otpw.c | 252 ch->pwlen = 0; in otpw_prepare() 336 ch->pwlen < 4 || ch->pwlen > 999 || in otpw_prepare() 504 int challen, pwlen, hlen; in otpw_verify() local 552 otpw[i*ch->pwlen + j] = 'I'; in otpw_verify() 554 otpw[i*ch->pwlen + j] = 'O'; in otpw_verify() 556 otpw[i*ch->pwlen + j] = '/'; in otpw_verify() 565 otpw[i*ch->pwlen + j] = password[l]; in otpw_verify() 569 DEBUG_LOG("Password %d = '%.*s'", i, ch->pwlen, otpw + i*ch->pwlen); in otpw_verify() 586 md_add(&md, otpw + i*ch->pwlen, ch->pwlen); in otpw_verify() 615 &challen, &hlen, &pwlen) != 4 || in otpw_verify() [all …]
|
/dports/security/gnutls/gnutls-3.6.16/lib/x509/ |
H A D | pkcs12_encr.c | 52 unsigned int pwlen; in _gnutls_pkcs12_string_to_key() local 91 pwlen = strlen(pw); in _gnutls_pkcs12_string_to_key() 93 if (pwlen == 0) { in _gnutls_pkcs12_string_to_key() 99 rc = _gnutls_utf8_to_ucs2(pw, pwlen, &ucs2, 1); in _gnutls_pkcs12_string_to_key() 106 pwlen = ucs2.size; in _gnutls_pkcs12_string_to_key() 109 pwlen = 0; in _gnutls_pkcs12_string_to_key() 112 if (pwlen > MAX_PASS_LEN) { in _gnutls_pkcs12_string_to_key() 125 plen = ((pwlen+v_size-1)/v_size) * v_size; in _gnutls_pkcs12_string_to_key() 142 if (j >= pwlen) in _gnutls_pkcs12_string_to_key()
|
/dports/net/owamp/owamp-3.3/I2util/I2util/ |
H A D | pbkdf2.c | 129 uint32_t pwlen, in F() argument 154 (*prf)(pw,pwlen,buffer,saltlen+4,buffer); in F() 170 (*prf)(pw,pwlen,buffer,prf_hlen,buffer); in F() 197 uint32_t pwlen, in I2pbkdf2() argument 254 F(prf,prf_hlen,pw,pwlen,salt,saltlen,count,i+1,tmpbuff,out); in I2pbkdf2() 266 F(prf,prf_hlen,pw,pwlen,salt,saltlen,count,l+1,tmpbuff,outbuff); in I2pbkdf2()
|
/dports/security/gopass/gopass-1.13.0/internal/action/ |
H A D | generate.go | 197 var pwlen int 205 pwlen = iv 211 pwlen = iv 214 if pwlen < 1 { 227 return pwgen.GenerateExternal(pwlen) 230 return pwgen.GeneratePasswordWithAllClasses(pwlen, symbols) 232 return pwgen.GeneratePassword(pwlen, symbols), nil 244 var pwlen int 252 pwlen = iv 258 pwlen = iv [all …]
|
/dports/security/yapet/yapet-2.3/src/libs/ui/ |
H A D | pwgendialog.cc | 87 YAPET::Globals::config.pwgenpwlen.set_str(pwlen.input()); in button_press_handler() 90 pwlen.input(YAPET::Globals::config.pwgenpwlen); in button_press_handler() 109 pwlen{}, 117 pwlen.max_input(3); 118 pwlen.filter(YACURS::FilterDigit()); 147 mainpack.add_back(&pwlen); 160 pwlen.input(conv.str());
|
/dports/security/john/john-1.9.0-jumbo-1/src/opencl/ |
H A D | 7z_kernel.cl | 97 const uint pwlen = inbuffer[gid].length; 98 const uint blocklen = pwlen + 8; 109 for (j = 0; j < pwlen; j++) 111 PUTCHAR_BE(block, i * blocklen + pwlen + 2, round >> 16); 113 PUTCHAR_BE(block, i * blocklen + pwlen + j, 0); 122 PUTCHAR_BE(block, i * blocklen + pwlen + 0, round & 0xff); 124 PUTCHAR_BE(block, i * blocklen + pwlen + 1, (round >> 8) & 0xff); 141 uint pwlen = inbuffer[gid].length; 147 sha256_zerofinal(block, hash, (pwlen + 8) * (1U << salt->iterations));
|
H A D | rar_kernel.cl | 85 const uint pwlen = pw_len[gid]; 86 const uint blocklen = pwlen + 11; 95 for (j = 0; j < pwlen; j++) 98 PUTCHAR_BE(block, i * blocklen + pwlen + j, ((__constant uchar*)salt)[j]); 99 PUTCHAR_BE(block, i * blocklen + pwlen + 10, round >> 16); 114 PUTCHAR_BE(W, pwlen + 8, round & 255); 115 PUTCHAR_BE(W, pwlen + 9, (round >> 8) & 255); 129 PUTCHAR_BE(block, i * blocklen + pwlen + 8, round & 0xff); 131 PUTCHAR_BE(block, i * blocklen + pwlen + 9, (round >> 8) & 0xff);
|
/dports/databases/mariadb-connector-c/mariadb-connector-c-3.2.4-src/plugins/auth/ |
H A D | sha256_pw.c | 168 unsigned int pwlen, i; in auth_sha256_client() local 276 pwlen= (unsigned int)strlen(mysql->passwd) + 1; /* include terminating zero */ in auth_sha256_client() 277 if (pwlen > MAX_PW_LEN) in auth_sha256_client() 279 memcpy(passwd, mysql->passwd, pwlen); in auth_sha256_client() 282 for (i=0; i < pwlen; i++) in auth_sha256_client() 287 if (EVP_PKEY_encrypt(ctx, NULL, &outlen, (unsigned char *)passwd, pwlen) <= 0) in auth_sha256_client() 291 if (EVP_PKEY_encrypt(ctx, rsa_enc_pw, &outlen, (unsigned char *)passwd, pwlen) <= 0) in auth_sha256_client() 294 if (!CryptEncrypt(pubkey, 0, TRUE, CRYPT_OAEP, (BYTE *)passwd, (DWORD *)&pwlen, MAX_PW_LEN)) in auth_sha256_client()
|
/dports/net/openldap25-server/openldap-2.5.9/servers/slapd/back-passwd/ |
H A D | search.c | 279 size_t pwlen; in pw2entry() local 290 pwlen = strlen( pw->pw_name ); in pw2entry() 291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry() 317 val.bv_len = pwlen; in pw2entry() 345 if ( val.bv_len + pwlen <= r ) { in pw2entry() 352 memcpy( d, pw->pw_name, pwlen ); in pw2entry() 354 d += pwlen; in pw2entry() 355 r -= pwlen + i; in pw2entry() 360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
|
/dports/net/openldap25-client/openldap-2.5.9/servers/slapd/back-passwd/ |
H A D | search.c | 279 size_t pwlen; in pw2entry() local 290 pwlen = strlen( pw->pw_name ); in pw2entry() 291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry() 317 val.bv_len = pwlen; in pw2entry() 345 if ( val.bv_len + pwlen <= r ) { in pw2entry() 352 memcpy( d, pw->pw_name, pwlen ); in pw2entry() 354 d += pwlen; in pw2entry() 355 r -= pwlen + i; in pw2entry() 360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
|
/dports/net/openldap26-client/openldap-2.6.0/servers/slapd/back-passwd/ |
H A D | search.c | 279 size_t pwlen; in pw2entry() local 290 pwlen = strlen( pw->pw_name ); in pw2entry() 291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry() 317 val.bv_len = pwlen; in pw2entry() 345 if ( val.bv_len + pwlen <= r ) { in pw2entry() 352 memcpy( d, pw->pw_name, pwlen ); in pw2entry() 354 d += pwlen; in pw2entry() 355 r -= pwlen + i; in pw2entry() 360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
|
/dports/net/openldap26-server/openldap-2.6.0/servers/slapd/back-passwd/ |
H A D | search.c | 279 size_t pwlen; in pw2entry() local 290 pwlen = strlen( pw->pw_name ); in pw2entry() 291 val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len ); in pw2entry() 317 val.bv_len = pwlen; in pw2entry() 345 if ( val.bv_len + pwlen <= r ) { in pw2entry() 352 memcpy( d, pw->pw_name, pwlen ); in pw2entry() 354 d += pwlen; in pw2entry() 355 r -= pwlen + i; in pw2entry() 360 if (!(s && ( val.bv_len + pwlen <= r ))) in pw2entry()
|
/dports/www/lighttpd/lighttpd-1.4.63/src/ |
H A D | mod_authn_file.c | 187 ,{ pw, pwlen } in mod_authn_file_digest() 471 const size_t pwlen = strlen(pw); in apr_md5_encode() local 506 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 508 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 519 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 552 for (size_t i = pwlen; i != 0; i >>= 1) { in apr_md5_encode() 565 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 575 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 582 MD5_Update(&ctx, pw, pwlen); in apr_md5_encode() 636 size_t pwlen = strlen(pw) * 2; in mod_authn_file_crypt_cmp() local [all …]
|
/dports/net/librdkafka/librdkafka-1.8.2/src/ |
H A D | rdkafka_sasl_plain.c | 75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local 79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new() 90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new() 91 of += pwlen; in rd_kafka_sasl_plain_client_new()
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/rdkafka-sys-2.0.0+1.4.2/librdkafka/src/ |
H A D | rdkafka_sasl_plain.c | 75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local 79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new() 90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new() 91 of += pwlen; in rd_kafka_sasl_plain_client_new()
|
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/plugins/out_kafka/librdkafka-1.7.0/src/ |
H A D | rdkafka_sasl_plain.c | 75 int pwlen = rk->rk_conf.sasl.password ? in rd_kafka_sasl_plain_client_new() local 79 buf = rd_alloca(zidlen + 1 + cidlen + 1 + pwlen + 1); in rd_kafka_sasl_plain_client_new() 90 memcpy(&buf[of], rk->rk_conf.sasl.password, pwlen); in rd_kafka_sasl_plain_client_new() 91 of += pwlen; in rd_kafka_sasl_plain_client_new()
|