/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | mssql12_fmt_plug.c | 106 static int *saved_len; variable 170 sizeof(*saved_len)); in init() 183 MEM_FREE(saved_len); in done() 203 for (saved_len[index] = 0; s[saved_len[index]]; saved_len[index]++) in set_key() 205 d[saved_len[index]] = s[saved_len[index]]; in set_key() 207 d[saved_len[index]] = s[saved_len[index]] << 8; in set_key() 209 d[saved_len[index]] = 0; in set_key() 210 saved_len[index] <<= 1; in set_key() 237 if (saved_len[index] < 0) in set_key_enc() 239 saved_len[index] <<= 1; in set_key_enc() [all …]
|
H A D | sap_pse_fmt_plug.c | 62 static int *saved_len; variable 70 saved_len = mem_calloc(self->params.max_keys_per_crypt, sizeof(*saved_len)); in init() 78 MEM_FREE(saved_len); in done() 104 lens[i] = saved_len[i+index]; in crypt_all() 105 clens[i] = saved_len[i+index]; in crypt_all() 125 saved_len[index+i], cur_salt->salt, in crypt_all() 131 saved_len[index+i], cur_salt->salt, in crypt_all() 148 memcpy(input, saved_key[index+i], saved_len[index+i]); in crypt_all() 149 padbyte = 8 - (saved_len[index+i] % 8); in crypt_all() 151 memset(input + saved_len[index+i], padbyte, padbyte); in crypt_all() [all …]
|
H A D | hsrp_fmt_plug.c | 75 static int *saved_len, dirty; variable 89 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 90 sizeof(*saved_len)); in init() 101 MEM_FREE(saved_len); in done() 194 int len = saved_len[index]; in crypt_all() 244 int olen = saved_len[index]; in hsrp_set_key() 245 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in hsrp_set_key() 246 if (olen > saved_len[index]) in hsrp_set_key() 247 memset(&(saved_key[index][saved_len[index]]), 0, olen-saved_len[index]); in hsrp_set_key()
|
H A D | pfx_fmt_plug.c | 84 static int *saved_len; variable 94 sizeof(*saved_len)); in init() 102 MEM_FREE(saved_len); in done() 226 saved_len[index], cur_salt->salt, in crypt_all() 239 saved_len[index], cur_salt->salt, in crypt_all() 252 saved_len[index], cur_salt->salt, in crypt_all() 265 saved_len[index], cur_salt->salt, in crypt_all() 296 lens[j] = saved_len[index+j]; in crypt_all() 318 lens[j] = saved_len[index+j]; in crypt_all() 341 lens[j] = saved_len[index+j]; in crypt_all() [all …]
|
H A D | leet_cc_fmt_plug.c | 94 static int *saved_len; variable 110 saved_len = mem_calloc(keys, sizeof(*saved_len)); in init() 117 MEM_FREE(saved_len); in done() 242 int x80_off = saved_len[index+i]+cur_salt->saltlen; in crypt_all() 244 memcpy(cp, saved_key[index+i], saved_len[index+i]); in crypt_all() 245 memcpy(&cp[saved_len[index+i]], cur_salt->salt, cur_salt->saltlen); in crypt_all() 262 SHA512_Update(&sctx, saved_key[index], saved_len[index]); in crypt_all() 269 sph_whirlpool(&wctx, saved_key[index+i], saved_len[index+i]); in crypt_all() 305 SHA512_Update(&sctx, saved_key[index], saved_len[index]); in cmp_exact() 311 sph_whirlpool(&wctx, saved_key[index], saved_len[index]); in cmp_exact() [all …]
|
H A D | eigrp_fmt_plug.c | 73 static int *saved_len; variable 94 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 95 sizeof(*saved_len)); in init() 103 MEM_FREE(saved_len); in done() 270 MD5_Update(&ctx, saved_key[index], saved_len[index]); in crypt_all() 271 if (saved_len[index] < 16) { in crypt_all() 272 MD5_Update(&ctx, zeropad, 16 - saved_len[index]); in crypt_all() 284 memcpy(buffer + 1, saved_key[index], saved_len[index]); in crypt_all() 285 memcpy(buffer + 1 + saved_len[index], cur_salt->ip, cur_salt->ip_length); in crypt_all() 286 HMAC_SHA256_Init(hctx, buffer, 1 + saved_len[index] + cur_salt->ip_length); in crypt_all() [all …]
|
H A D | has160_fmt_plug.c | 63 static int (*saved_len); variable 71 saved_len = mem_calloc(self->params.max_keys_per_crypt, sizeof(*saved_len)); in init() 80 MEM_FREE(saved_len); in done() 117 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 122 saved_key[index][saved_len[index]] = 0; in get_key() 138 rhash_has160_update(&ctx, (unsigned char*)saved_key[index], saved_len[index]); in crypt_all()
|
H A D | sha3_512_fmt_plug.c | 61 static int (*saved_len); variable 72 saved_len = mem_calloc(self->params.max_keys_per_crypt, sizeof(*saved_len)); in init() 81 MEM_FREE(saved_len); in done() 132 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 137 saved_key[index][saved_len[index]] = 0; in get_key() 152 Keccak_HashUpdate(&hash, (unsigned char*)saved_key[index], saved_len[index] * 8); in crypt_all()
|
H A D | salted_sha1_fmt_plug.c | 77 static unsigned int *saved_len; variable 82 static unsigned int *saved_len; variable 100 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 101 sizeof(*saved_len)); in init() 108 MEM_FREE(saved_len); in done() 187 sk[GETPOS(i+saved_len[index], idx)] = saved_salt->data.c[i]; in set_onesalt() 188 sk[GETPOS(i+saved_len[index], idx)] = 0x80; in set_onesalt() 191 sk[GETPOS(i+saved_len[index], idx)] = 0; in set_onesalt() 193 …COEF_32-1)) + idx/SIMD_COEF_32*SHA_BUF_SIZ*SIMD_COEF_32] = (saved_salt->len + saved_len[index])<<3; in set_onesalt()
|
H A D | rawKeccak_256_fmt_plug.c | 67 static int (*saved_len); variable 78 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 79 sizeof(*saved_len)); in init() 90 MEM_FREE(saved_len); in done() 141 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 146 saved_key[index][saved_len[index]] = 0; in get_key() 160 Keccak_HashUpdate(&hash, (unsigned char*)saved_key[index], saved_len[index] * 8); in crypt_all()
|
H A D | rawKeccak_512_fmt_plug.c | 63 static int (*saved_len); variable 74 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 75 sizeof(*saved_len)); in init() 86 MEM_FREE(saved_len); in done() 137 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 142 saved_key[index][saved_len[index]] = 0; in get_key() 156 Keccak_HashUpdate(&hash, (unsigned char*)saved_key[index], saved_len[index] * 8); in crypt_all()
|
H A D | palshop_fmt_plug.c | 63 static size_t *saved_len; variable 73 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 74 sizeof(*saved_len)); in init() 79 MEM_FREE(saved_len); in done() 149 MD5_Update(&mctx, saved_key[index], saved_len[index]); in crypt_all() 154 SHA1_Update(&sctx, saved_key[index], saved_len[index]); in crypt_all() 211 saved_len[index] = in palshop_set_key()
|
H A D | rawBLAKE2_512_fmt_plug.c | 72 static int (*saved_len); variable 81 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 82 sizeof(*saved_len)); in init() 93 MEM_FREE(saved_len); in done() 146 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 151 saved_key[index][saved_len[index]] = 0; in get_key() 164 (void)blake2b((uint8_t *)crypt_out[index], saved_key[index], NULL, 64, saved_len[index], 0); in crypt_all()
|
H A D | opencl_office_fmt_plug.c | 104 static int *saved_len; /* UCS-2 password length, in octets */ variable 169 saved_len[i] = bench_len; in create_clobj() 221 …HANDLE_CLERROR(clEnqueueUnmapMemObject(queue[gpu_id], pinned_saved_len, saved_len, 0, NULL, NULL),… in release_clobj() 257 memset(saved_len, 0, sizeof(*saved_len) * global_work_size); in clear_keys() 265 saved_len[index] = enc_to_utf16(utfkey, PLAINTEXT_LENGTH, (UTF8*)key, strlen(key)); in set_key() 266 if (saved_len[index] < 0) in set_key() 267 saved_len[index] = strlen16(utfkey); in set_key() 270 utfkey[saved_len[index]] = 0x80; in set_key() 272 saved_len[index] <<= 1; in set_key() 281 memcpy(buf, &saved_key[index * UNICODE_LENGTH], saved_len[index]); in get_key() [all …]
|
H A D | mdc2_fmt_plug.c | 59 static int *saved_len; variable 68 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 69 sizeof(*saved_len)); in init() 77 MEM_FREE(saved_len); in done() 144 JtR_MDC2_Update(&ctx, (unsigned char*)saved_key[index], saved_len[index]); in crypt_all() 173 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in mdc2_set_key()
|
H A D | dahua_fmt_plug.c | 74 static int *saved_len; variable 83 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 84 sizeof(*saved_len)); in init() 92 MEM_FREE(saved_len); in done() 168 MD5_Update(&ctx, saved_key[index], saved_len[index]); in crypt_all() 199 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in dahua_set_key()
|
H A D | common-simd-setkey32.h | 200 saved_len[index] = len; 220 saved_len = 225 saved_len[index] = 238 int32_t len = saved_len[index]; 260 saved_key[saved_len] = 0; 266 return strnzcpy(out, saved_key[index], saved_len[index]+1);
|
H A D | diskcryptor_fmt_plug.c | 69 static int *saved_len; variable 81 saved_len = mem_alloc(self->params.max_keys_per_crypt * sizeof(*saved_len)); in init() 113 saved_len[index] = len << 1; in diskcryptor_set_key() 143 lens[i] = saved_len[index+i]; in crypt_all() 151 …pbkdf2_sha512((unsigned char *)saved_key[index+i], saved_len[index+i], cur_salt->salt, cur_salt->s… in crypt_all()
|
H A D | keystore_fmt_plug.c | 73 static int (*saved_len); variable 137 SHA1_Update(ctxp, passwdBytes, saved_len[idx] * 2); in getPreKeyedHash() 148 saved_len = mem_calloc(sizeof(*saved_len), self->params.max_keys_per_crypt + 1); in init() 160 MEM_FREE(saved_len); in done() 333 saved_len[count] = 0; // point all 'tail' MMX buffer elements to this location. in crypt_all() 336 if (saved_len[index] == j+4) { in crypt_all() 347 if (saved_len[index] < 4 || saved_len[index] > 24) { in crypt_all() 376 len = saved_len[MixOrder[index]]; in crypt_all() 416 if (saved_len[MixOrder[index]] == 0) in crypt_all() 462 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in keystore_set_key()
|
H A D | tcp_md5_fmt_plug.c | 59 static int *saved_len; variable 73 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 74 sizeof(*saved_len)); in init() 82 MEM_FREE(saved_len); in done() 171 MD5_Update(&ctx, saved_key[index], saved_len[index]); in crypt_all() 200 saved_len[index] = strlen(key); in tcpmd5_set_key()
|
H A D | o5logon_fmt_plug.c | 79 static int *saved_len; variable 100 saved_len = mem_calloc(self->params.max_keys_per_crypt, in init() 101 sizeof(*saved_len)); in init() 117 MEM_FREE(saved_len); in done() 220 SHA1_Update(&ctx, saved_key[index], saved_len[index]); in crypt_all() 233 int blen = (saved_len[index] + 15) / 16; in crypt_all() 257 if (!memcmp(dec_pw, saved_key[index], saved_len[index])) in crypt_all() 317 saved_len[index] = in o5logon_set_key()
|
H A D | radius_fmt_plug.c | 71 static int *saved_len; variable 91 saved_len = mem_calloc(self->params.max_keys_per_crypt, sizeof(*saved_len)); in init() 100 MEM_FREE(saved_len); in done() 195 memcpy(out, saved_key[index], saved_len[index] > 16 ? 16: saved_len[index]); in check_password() 228 MD5_Update(&ctx, saved_key[index], saved_len[index]); in check_password() 289 saved_len[index] = strnzcpyn(saved_key[index], key, PLAINTEXT_LENGTH + 1); in set_key()
|
H A D | common-simd-setkey64.h | 249 saved_len[index] = len; 267 saved_len = 272 saved_len[index] = 286 int32_t len = saved_len[index]; 308 saved_key[saved_len] = 0; 314 return strnzcpy(out, saved_key[index], saved_len[index]+1);
|
H A D | qnx_fmt_plug.c | 78 static int (*saved_len); variable 105 saved_len = mem_calloc(1 + max_crypts, sizeof(*saved_len)); in init() 118 MEM_FREE(saved_len); in done() 132 saved_len[index] = strnzcpyn(saved_key[index], key, sizeof(*saved_key)); in set_key() 140 saved_key[index][saved_len[index]] = 0; in get_key() 167 saved_len[count] = 0; // point all 'tail' MMX buffer elements to this location. in crypt_all() 185 int i, len = saved_len[index]; in crypt_all()
|
/dports/sysutils/hexpeek/hexpeek-v1.0.20200804/src/ |
H A D | hexpeek_backup.c | 65 hoff_t saved_len; member 133 else if(ph->ops[cur].saved_len < 0) in checkOp() 135 else if(ph->ops[cur].saved_len > 0 && cur > 0 && prv >= 0 && in checkOp() 137 ph->ops[prv].saved_at + ph->ops[prv].saved_len) in checkOp() 330 p_op->saved_len = ppc->fz.len; in makeBackup() 334 p_op->saved_len = 0; in makeBackup() 338 p_op->saved_len = ppc->fz.len; in makeBackup() 343 if(p_op->saved_from + p_op->saved_len > p_op->size_orig) in makeBackup() 391 p_op->saved_len = max(0, filesize(data_fi) - sv_from); in makeAdjBackup() 427 if(p_adj->status && p_adj->saved_len) in clearAdjBackup() [all …]
|