Home
last modified time | relevance | path

Searched refs:skeyid (Results 1 – 10 of 10) sorted by relevance

/dports/security/john/john-1.9.0-jumbo-1/src/
H A Dike-crack.h500 unsigned char skeyid[SHA1_HASH_LEN]; in compute_hash() local
508 (unsigned char *) password, password_len, skeyid); in compute_hash()
512 (unsigned char *) password, password_len, skeyid); in compute_hash()
526 SHA1_HASH_LEN, skeyid); in compute_hash()
530 SHA1_HASH_LEN, skeyid); in compute_hash()
538 skeyid, psk_params->hash_r_len, hash_r); in compute_hash()
541 skeyid, psk_params->hash_r_len, hash_r); in compute_hash()
/dports/net-im/tkabber-plugins/tkabber-plugins-1.1.2/otr/tclotr/
H A Dmessage.tcl54 proc ::otr::message::createDataMessage {version flags skeyid rkeyid skey smac x
81 append res [::otr::data::encode INT $skeyid]
135 flags skeyid rkeyid gy ctrtop
183 append msg [::otr::data::encode INT $skeyid]
436 lassign [::otr::data::decode INT $data] skeyid data
440 list $flags $skeyid $rkeyid $gy $ctrtop $data
H A Dotr.tcl1056 flags skeyid rkeyid nextkey ctrtop rest
1058 if {$skeyid <= 0 || $rkeyid <= 0} {
1064 if {$skeyid != $state(keyidy) && $skeyid != $state(keyidy)-1} {
1104 $skeyid \
1191 if {$skeyid == $state(keyidy)} {
1192 incr skeyid -1
1200 incr skeyid 2
/dports/net/ntp/ntp-4.2.8p15/ntpd/
H A Dntp_proto.c1139 skeyid, pkeyid, 0); in receive()
1143 skeyid, pkeyid, 2); in receive()
1163 authtrust(skeyid, 0); in receive()
1193 if (peer->keyid != skeyid) { in receive()
1195 peer->keyid, skeyid, in receive()
1587 if (skeyid > NTP_MAXKEY) in receive()
2280 && skeyid in receive()
2281 && skeyid <= NTP_MAXKEY in receive()
2375 if (skeyid == peer->keyid) in receive()
2384 peer->pkeyid = skeyid; in receive()
[all …]
/dports/net/samba412/samba-4.12.15/source4/ntp_signd/
H A Dntp-dev-4.2.5p125.diff156 keyid_t skeyid = 0; /* key IDs */
172 - fast_xmit(rbufp, MODE_SERVER, skeyid, "RATE");
173 + fast_xmit(rbufp, MODE_SERVER, skeyid, "RATE", 0);
175 - fast_xmit(rbufp, MODE_ACTIVE, skeyid, "RATE");
176 + fast_xmit(rbufp, MODE_ACTIVE, skeyid, "RATE", 0);
189 stoa(&rbufp->recv_srcadr), hismode, skeyid,
217 fast_xmit(rbufp, MODE_SERVER, skeyid,
230 - fast_xmit(rbufp, MODE_SERVER, skeyid, NULL);
231 + fast_xmit(rbufp, MODE_SERVER, skeyid, NULL, 0);
238 if (crypto_flags && skeyid > NTP_MAXKEY)
[all …]
/dports/security/fiked/fiked-0.0.5/
H A Dike.c873 mem_allocate(&ctx->skeyid, ctx->md_len); in ike_do_phase1()
874 memcpy(ctx->skeyid, gcry_md_read(md_ctx, 0), ctx->md_len); in ike_do_phase1()
879 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
891 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
904 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
945 gcry_md_setkey(i_hash_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
960 gcry_md_setkey(r_hash_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
H A Dpeer_ctx.h84 uint8_t *skeyid; member
H A Dpeer_ctx.c111 mem_free(&ctx->skeyid); in peer_ctx_clear()
/dports/security/py-potr/python-potr-1.0.1/src/potr/
H A Dcrypt.py165 [self.theirKeyid - msg.skeyid]
169 self.theirKeyid, msg.skeyid))
199 if msg.skeyid == self.theirKeyid:
251 anyzero = self.theirKeyid == 0 or msg.skeyid == 0 or msg.rkeyid == 0
252 if anyzero or (msg.skeyid != self.theirKeyid and \
253 msg.skeyid != self.theirKeyid - 1) or \
256 if self.theirOldY is None and msg.skeyid == self.theirKeyid - 1:
/dports/security/vpnc/vpnc-0.5.3/
H A Dvpnc.c1314 unsigned char *skeyid; in do_phase1_am() local
1680 skeyid = gcry_md_read(skeyid_ctx, 0); in do_phase1_am()
1681 hex_dump("skeyid", skeyid, s->ike.md_len, NULL); in do_phase1_am()
1699 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
1836 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
1851 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
1879 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
1892 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
1906 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()