/dports/security/libssh/libssh-0.9.6/tests/client/ |
H A D | torture_rekey.c | 179 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_send() 206 assert_memory_not_equal(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_send() 282 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_recv() 311 assert_memory_not_equal(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_recv() 345 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_time() 369 assert_memory_equal(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_time() 383 assert_memory_not_equal(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_time() 411 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_server_send() 475 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_different_kex() 547 memcpy(secret_hash, c->secret_hash, c->digest_len); in torture_rekey_server_different_kex() [all …]
|
/dports/net-p2p/libtorrent-rasterbar/libtorrent-rasterbar-1.2.14/src/kademlia/ |
H A D | node_id.cpp | 149 sha1_hash const secret_hash = h.final(); in make_id_secret() local 150 std::memcpy(&in[20 - 4], &secret_hash[0], 4); in make_id_secret() 174 sha1_hash secret_hash = h.final(); in verify_secret_id() local 175 return std::memcmp(&nid[20 - 4], &secret_hash[0], 4) == 0; in verify_secret_id()
|
/dports/net-p2p/py-libtorrent-rasterbar/libtorrent-1.2.13/src/kademlia/ |
H A D | node_id.cpp | 149 sha1_hash const secret_hash = h.final(); in make_id_secret() local 150 std::memcpy(&in[20 - 4], &secret_hash[0], 4); in make_id_secret() 174 sha1_hash secret_hash = h.final(); in verify_secret_id() local 175 return std::memcmp(&nid[20 - 4], &secret_hash[0], 4) == 0; in verify_secret_id()
|
/dports/security/libssh/libssh-0.9.6/src/ |
H A D | kex.c | 1162 session->next_crypto->secret_hash = malloc(session->next_crypto->digest_len); in ssh_make_sessionid() 1163 if (session->next_crypto->secret_hash == NULL) { in ssh_make_sessionid() 1168 session->next_crypto->secret_hash); in ssh_make_sessionid() 1179 session->next_crypto->secret_hash = malloc(session->next_crypto->digest_len); in ssh_make_sessionid() 1180 if (session->next_crypto->secret_hash == NULL) { in ssh_make_sessionid() 1185 session->next_crypto->secret_hash); in ssh_make_sessionid() 1191 if (session->next_crypto->secret_hash == NULL) { in ssh_make_sessionid() 1196 session->next_crypto->secret_hash); in ssh_make_sessionid() 1204 if (session->next_crypto->secret_hash == NULL) { in ssh_make_sessionid() 1210 session->next_crypto->secret_hash); in ssh_make_sessionid() [all …]
|
H A D | kdf.c | 139 ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len); in sshkdf_derive_key() 155 ssh_mac_update(ctx, crypto->secret_hash, crypto->digest_len); in sshkdf_derive_key()
|
H A D | wrapper.c | 190 if (crypto->secret_hash != NULL) { in crypto_free() 191 explicit_bzero(crypto->secret_hash, crypto->digest_len); in crypto_free() 192 SAFE_FREE(crypto->secret_hash); in crypto_free()
|
H A D | packet_cb.c | 155 session->next_crypto->secret_hash, in SSH_PACKET_CALLBACK()
|
/dports/devel/py-moto/moto-2.2.16/moto/cognitoidp/ |
H A D | utils.py | 48 def check_secret_hash(app_client_secret, app_client_id, username, secret_hash): argument 53 return SECRET_HASH == secret_hash
|
H A D | models.py | 1226 secret_hash = challenge_responses.get("SECRET_HASH") 1228 client.secret, client.id, username, secret_hash 1230 raise NotAuthorizedError(secret_hash) 1444 secret_hash = auth_parameters.get("SECRET_HASH") 1446 client.secret, client.id, username, secret_hash 1448 raise NotAuthorizedError(secret_hash) 1515 secret_hash = auth_parameters.get("SECRET_HASH") 1517 client.secret, client.id, username, secret_hash 1519 raise NotAuthorizedError(secret_hash)
|
/dports/devel/codeville/codeville-0.1.18/Codeville/ |
H A D | auth.py | 66 secret_hash = self.co.linforepo.get(self.hash_key, txn=self.txn) 70 if secret_hash != hash: 76 msg = {'secret': esecret, 'secret_id': secret_hash, 88 if sha.new('public hash check' + secret).digest() != secret_hash:
|
H A D | client_net.py | 446 secret_hash = self.socket[s]['hash'] 448 return secret_hash
|
/dports/net/freeswitch/freeswitch-1.10.3.-release/src/mod/event_handlers/mod_rayo/ |
H A D | iks_helpers.c | 513 unsigned char secret_hash[IKS_SHA256_HEX_DIGEST_LENGTH]; in iks_server_dialback_key() local 516 iks_sha256_hex_string((unsigned char *)secret, strlen(secret), secret_hash); in iks_server_dialback_key() 518 …iks_hmac_sha256_hex_string(secret_hash, strlen((char *)secret_hash), message, strlen((char *)messa… in iks_server_dialback_key()
|
/dports/multimedia/obs-websocket/obs-websocket-4.8.0/docs/partials/ |
H A D | introduction.md | 28 secret_hash = binary_sha256(secret_string) 29 secret = base64_encode(secret_hash)
|
/dports/games/pvpgn/pvpgn-1.8.5/src/bnetd/ |
H A D | handle_d2cs.c | 187 t_hash secret_hash; in on_d2cs_accountloginreq() local 225 bnet_hash(&secret_hash,sizeof(temp),&temp); in on_d2cs_accountloginreq() 226 bnhash_to_hash(packet->u.d2cs_bnetd_accountloginreq.secret_hash,&try_hash); in on_d2cs_accountloginreq() 227 if (hash_eq(try_hash,secret_hash)==1) { in on_d2cs_accountloginreq()
|
/dports/editors/texmacs/TeXmacs-1.99.4-src/src/Plugins/Openssl/ |
H A D | openssl.hpp | 24 string secret_hash (string msg);
|
H A D | openssl.cpp | 117 secret_hash (string msg) { in secret_hash() function
|
/dports/games/pvpgn/pvpgn-1.8.5/src/d2cs/ |
H A D | d2cs_bnetd_protocol.h | 66 bn_int secret_hash[5]; member
|
H A D | d2cs_protocol.h | 49 bn_int secret_hash[5]; member
|
H A D | handle_d2cs.c | 181 memcpy(bnpacket->u.d2cs_bnetd_accountloginreq.secret_hash, in on_client_loginreq() 182 packet->u.client_d2cs_loginreq.secret_hash, in on_client_loginreq() 183 sizeof(bnpacket->u.d2cs_bnetd_accountloginreq.secret_hash)); in on_client_loginreq()
|
/dports/security/libssh/libssh-0.9.6/tests/unittests/ |
H A D | torture_session_keys.c | 54 .secret_hash = secret,
|
/dports/net-im/prosody-modules/Community-Modules-bb8459c220c9/mod_adhoc_oauth2_client/ |
H A D | mod_adhoc_oauth2_client.lua | 52 client.secret_hash = base64.encode(hashes.pbkdf2_hmac_sha256(client_secret, salt .. pepper, i));
|
/dports/security/libssh/libssh-0.9.6/include/libssh/ |
H A D | crypto.h | 132 unsigned char *secret_hash; /* Secret hash is same as session id until re-kex */ member
|
/dports/devel/py-moto/moto-2.2.16/tests/test_cognitoidp/ |
H A D | test_cognitoidp.py | 2487 secret_hash = base64.b64encode(new_digest).decode() 2495 "SECRET_HASH": secret_hash, 2542 "SECRET_HASH": secret_hash, 2564 "SECRET_HASH": secret_hash, 2572 "secret_hash": secret_hash, 3250 secret_hash = base64.b64encode(new_digest).decode() 3258 "SECRET_HASH": secret_hash, 3287 secret_hash = base64.b64encode(new_digest).decode() 3295 "SECRET_HASH": secret_hash, 3402 secret_hash = base64.b64encode(new_digest).decode() [all …]
|
/dports/devel/py-pycognito/pycognito-2021.12.0/pycognito/ |
H A D | __init__.py | 707 secret_hash = AWSSRP.get_secret_hash( 710 parameters[key] = secret_hash
|
/dports/net-im/prosody-modules/Community-Modules-bb8459c220c9/mod_http_oauth2/ |
H A D | mod_http_oauth2.lua | 145 …if not client or not verify_secret(client.secret_hash, client.salt, client.iteration_count, params…
|