/dports/security/oath-toolkit/oath-toolkit-2.6.2/liboath/ |
H A D | totp.c | 65 size_t secret_length, in oath_totp_generate() argument 115 size_t secret_length, in oath_totp_generate2() argument 129 secret_length, in oath_totp_generate2() 160 size_t secret_length, in oath_totp_validate() argument 213 size_t secret_length, in oath_totp_validate_callback() argument 253 size_t secret_length, in oath_totp_validate2() argument 311 size_t secret_length, in oath_totp_validate2_callback() argument 353 size_t secret_length, in oath_totp_validate3() argument 461 size_t secret_length, in oath_totp_validate4() argument 551 secret_length, in oath_totp_validate4_callback() [all …]
|
H A D | oath.h | 169 size_t secret_length, 179 size_t secret_length, 217 size_t secret_length, 245 size_t secret_length, 253 size_t secret_length, 263 size_t secret_length, 271 size_t secret_length, 282 size_t secret_length, 292 size_t secret_length, 304 size_t secret_length, [all …]
|
H A D | hotp.c | 62 size_t secret_length, in oath_hotp_generate() argument 68 return _oath_hotp_generate2 (secret, secret_length, moving_factor, digits, in oath_hotp_generate() 77 size_t secret_length, in _oath_hotp_generate2() argument 103 rc = gc_hmac_sha256 (secret, secret_length, in _oath_hotp_generate2() 109 rc = gc_hmac_sha512 (secret, secret_length, in _oath_hotp_generate2() 113 rc = gc_hmac_sha1 (secret, secret_length, in _oath_hotp_generate2() 207 size_t secret_length, in oath_hotp_validate_callback() argument 221 secret_length, in oath_hotp_validate_callback() 258 size_t secret_length, in oath_hotp_validate() argument 262 return oath_hotp_validate_callback (secret, secret_length, in oath_hotp_validate()
|
H A D | oath.h.in | 169 size_t secret_length, 179 size_t secret_length, 217 size_t secret_length, 245 size_t secret_length, 253 size_t secret_length, 263 size_t secret_length, 271 size_t secret_length, 282 size_t secret_length, 292 size_t secret_length, 304 size_t secret_length, [all …]
|
H A D | usersfile.c | 98 size_t secret_length = sizeof (secret); in parse_usersfile() local 150 rc = oath_hex2bin (p, secret, &secret_length); in parse_usersfile() 191 rc = oath_hotp_validate (secret, secret_length, in parse_usersfile() 196 rc = oath_totp_validate2 (secret, secret_length, in parse_usersfile() 206 tmprc = oath_totp_validate2 (secret, secret_length, in parse_usersfile() 213 rc = oath_totp_validate (secret, secret_length, in parse_usersfile()
|
/dports/comms/bforce-kst/bforce-0.22.8.kst7/source/bforce/ |
H A D | u_md5.c | 295 int secret_length = strlen(secret); in md5_cram_get() local 304 if( secret_length > 64 ) in md5_cram_get() 306 md5_get(secret, secret_length, secret_md5); in md5_cram_get() 308 secret_length = 16; in md5_cram_get() 311 memcpy(osecret, secret, secret_length); in md5_cram_get() 312 memcpy(isecret, secret, secret_length); in md5_cram_get() 313 memset(osecret + secret_length, '\0', 64 - secret_length); in md5_cram_get() 314 memset(isecret + secret_length, '\0', 64 - secret_length); in md5_cram_get()
|
/dports/comms/mlan3/mlan3-1.00/common/ |
H A D | shaibutton.h | 131 int secret_length, SMALLINT resume); 161 int secret_length, 169 extern void ReformatSecretFor1961S(uchar* auth_secret, int secret_length); 208 uchar* secret, int secret_length); 216 int secret_length, 220 int secret_length); 223 int secret_length);
|
H A D | shadebitvm.c | 59 uchar* secret, int secret_length) in InstallServiceData() argument 90 secret, secret_length, FALSE), in InstallServiceData() 102 secret, secret_length, FALSE), in InstallServiceData() 674 uchar* secret, int secret_length, in InstallSystemSecretVM() argument 681 for(offset=0; offset<secret_length; offset+=47) in InstallSystemSecretVM() 688 bytes_left = secret_length - offset; in InstallSystemSecretVM() 736 uchar* secret, int secret_length) in InstallSignSecretVM() argument 740 i = InstallSystemSecretVM(copr, secret, secret_length, sign_secret); in InstallSignSecretVM() 763 uchar* secret, int secret_length) in InstallAuthSecretVM() argument 767 i = InstallSystemSecretVM(copr, secret, secret_length, auth_secret); in InstallAuthSecretVM()
|
H A D | sha33.c | 534 int secret_length, SMALLINT resume) in InstallSystemSecret33() argument 550 for(offset=0; offset<secret_length; offset+=47) in InstallSystemSecret33() 557 bytes_left = secret_length - offset; in InstallSystemSecret33() 751 void ReformatSecretFor1961S(uchar* auth_secret, int secret_length) in ReformatSecretFor1961S() argument 754 for(i=0; i<secret_length; i+=47) in ReformatSecretFor1961S()
|
/dports/emulators/yuzu/yuzu-0b47f7a46/externals/libzip/libzip/lib/ |
H A D | zip_crypto_openssl.c | 73 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 76 if (secret_length > INT_MAX) { in _zip_crypto_hmac_new() 95 if (HMAC_Init_ex(hmac, secret, (int)secret_length, EVP_sha1(), NULL) != 1) { in _zip_crypto_hmac_new()
|
H A D | zip_crypto_mbedtls.c | 71 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 74 if (secret_length > INT_MAX) { in _zip_crypto_hmac_new() 92 if (mbedtls_md_hmac_starts(hmac, (const unsigned char *)secret, (size_t)secret_length) != 0) { in _zip_crypto_hmac_new()
|
H A D | zip_crypto_commoncrypto.c | 99 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 107 CCHmacInit(hmac, kCCHmacAlgSHA1, secret, secret_length); in _zip_crypto_hmac_new()
|
H A D | zip_crypto_gnutls.c | 99 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 108 if ((ret = gnutls_hmac_init(hmac, GNUTLS_MAC_SHA1, secret, secret_length)) < 0) { in _zip_crypto_hmac_new()
|
/dports/archivers/libzip/libzip-1.7.3/lib/ |
H A D | zip_crypto_openssl.c | 74 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 77 if (secret_length > INT_MAX) { in _zip_crypto_hmac_new() 96 if (HMAC_Init_ex(hmac, secret, (int)secret_length, EVP_sha1(), NULL) != 1) { in _zip_crypto_hmac_new()
|
H A D | zip_crypto_mbedtls.c | 72 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 75 if (secret_length > INT_MAX) { in _zip_crypto_hmac_new() 93 if (mbedtls_md_hmac_starts(hmac, (const unsigned char *)secret, (size_t)secret_length) != 0) { in _zip_crypto_hmac_new()
|
H A D | zip_crypto_commoncrypto.c | 99 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 107 CCHmacInit(hmac, kCCHmacAlgSHA1, secret, secret_length); in _zip_crypto_hmac_new()
|
H A D | zip_crypto_gnutls.c | 99 _zip_crypto_hmac_new(const zip_uint8_t *secret, zip_uint64_t secret_length, zip_error_t *error) { in _zip_crypto_hmac_new() argument 108 if ((ret = gnutls_hmac_init(hmac, GNUTLS_MAC_SHA1, secret, secret_length)) < 0) { in _zip_crypto_hmac_new()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/third_party/quiche/src/quic/core/crypto/ |
H A D | tls_connection.cc | 130 size_t secret_length) { in SetReadSecretCallback() argument 133 std::vector<uint8_t> secret_vec(secret, secret + secret_length); in SetReadSecretCallback() 147 size_t secret_length) { in SetWriteSecretCallback() argument 150 std::vector<uint8_t> secret_vec(secret, secret + secret_length); in SetWriteSecretCallback()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/third_party/quiche/src/quic/core/crypto/ |
H A D | tls_connection.cc | 151 size_t secret_length) { in SetReadSecretCallback() argument 154 std::vector<uint8_t> secret_vec(secret, secret + secret_length); in SetReadSecretCallback() 168 size_t secret_length) { in SetWriteSecretCallback() argument 171 std::vector<uint8_t> secret_vec(secret, secret + secret_length); in SetWriteSecretCallback()
|
/dports/net-im/pidgin-sipe/pidgin-sipe-1.24.0/src/core/ |
H A D | sipe-tls.c | 295 gsize secret_length) in debug_secrets() argument 299 label, secret_length); in debug_secrets() 300 while (secret_length--) in debug_secrets() 311 gsize secret_length, in sipe_tls_p_md5() argument 330 secret_length, seed_length); in sipe_tls_p_md5() 335 sipe_digest_hmac_md5(secret, secret_length, in sipe_tls_p_md5() 347 sipe_digest_hmac_md5(secret, secret_length, in sipe_tls_p_md5() 365 gsize secret_length, in sipe_tls_p_sha1() argument 384 secret_length, seed_length); in sipe_tls_p_sha1() 420 gsize secret_length, in sipe_tls_prf() argument [all …]
|
/dports/emulators/dolphin-emu/dolphin-3152428/Source/Core/UICommon/ |
H A D | DiscordPresence.cpp | 269 const size_t secret_length = secret.length(); in UpdateDiscordPresence() local 271 Common::HashAdler32(reinterpret_cast<const u8*>(secret.c_str()), secret_length)); in UpdateDiscordPresence() 274 secret_final.reserve(secret_type.length() + 1 + secret_length); in UpdateDiscordPresence()
|
/dports/security/elixir-comeonin/comeonin-3.2/lib/comeonin/ |
H A D | otp.ex | 45 def gen_secret(secret_length \\ 32) 46 def gen_secret(secret_length) when secret_length in [16, 24, 32] do 47 trunc(secret_length / 1.6) |> :crypto.strong_rand_bytes |> Base.encode32
|
/dports/net/kea/kea-2.0.1/src/lib/cryptolink/ |
H A D | openssl_hmac.cc | 179 HMAC::HMAC(const void* secret, size_t secret_length, in HMAC() argument 182 impl_ = new HMACImpl(secret, secret_length, hash_algorithm); in HMAC()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | tls13_enc.cc | 306 hs->new_session->secret_length = hs->transcript.DigestLen(); in tls13_derive_resumption_secret() 308 hs, MakeSpan(hs->new_session->secret, hs->new_session->secret_length), in tls13_derive_resumption_secret() 356 auto session_secret = MakeSpan(session->secret, session->secret_length); in tls13_derive_session_psk() 464 MakeConstSpan(ssl->session->secret, ssl->session->secret_length), in tls13_write_psk_binder() 488 MakeConstSpan(session->secret, session->secret_length), in tls13_verify_psk_binder()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | tls13_enc.cc | 306 hs->new_session->secret_length = hs->transcript.DigestLen(); in tls13_derive_resumption_secret() 308 hs, MakeSpan(hs->new_session->secret, hs->new_session->secret_length), in tls13_derive_resumption_secret() 356 auto session_secret = MakeSpan(session->secret, session->secret_length); in tls13_derive_session_psk() 464 MakeConstSpan(ssl->session->secret, ssl->session->secret_length), in tls13_write_psk_binder() 488 MakeConstSpan(session->secret, session->secret_length), in tls13_verify_psk_binder()
|