/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | ike-crack.h | 500 unsigned char skeyid[SHA1_HASH_LEN]; in compute_hash() local 508 (unsigned char *) password, password_len, skeyid); in compute_hash() 512 (unsigned char *) password, password_len, skeyid); in compute_hash() 526 SHA1_HASH_LEN, skeyid); in compute_hash() 530 SHA1_HASH_LEN, skeyid); in compute_hash() 538 skeyid, psk_params->hash_r_len, hash_r); in compute_hash() 541 skeyid, psk_params->hash_r_len, hash_r); in compute_hash()
|
/dports/net-im/tkabber-plugins/tkabber-plugins-1.1.2/otr/tclotr/ |
H A D | message.tcl | 54 proc ::otr::message::createDataMessage {version flags skeyid rkeyid skey smac x 81 append res [::otr::data::encode INT $skeyid] 135 flags skeyid rkeyid gy ctrtop 183 append msg [::otr::data::encode INT $skeyid] 436 lassign [::otr::data::decode INT $data] skeyid data 440 list $flags $skeyid $rkeyid $gy $ctrtop $data
|
H A D | otr.tcl | 1056 flags skeyid rkeyid nextkey ctrtop rest 1058 if {$skeyid <= 0 || $rkeyid <= 0} { 1064 if {$skeyid != $state(keyidy) && $skeyid != $state(keyidy)-1} { 1104 $skeyid \ 1191 if {$skeyid == $state(keyidy)} { 1192 incr skeyid -1 1200 incr skeyid 2
|
/dports/net/ntp/ntp-4.2.8p15/ntpd/ |
H A D | ntp_proto.c | 1139 skeyid, pkeyid, 0); in receive() 1143 skeyid, pkeyid, 2); in receive() 1163 authtrust(skeyid, 0); in receive() 1193 if (peer->keyid != skeyid) { in receive() 1195 peer->keyid, skeyid, in receive() 1587 if (skeyid > NTP_MAXKEY) in receive() 2280 && skeyid in receive() 2281 && skeyid <= NTP_MAXKEY in receive() 2375 if (skeyid == peer->keyid) in receive() 2384 peer->pkeyid = skeyid; in receive() [all …]
|
/dports/net/samba412/samba-4.12.15/source4/ntp_signd/ |
H A D | ntp-dev-4.2.5p125.diff | 156 keyid_t skeyid = 0; /* key IDs */ 172 - fast_xmit(rbufp, MODE_SERVER, skeyid, "RATE"); 173 + fast_xmit(rbufp, MODE_SERVER, skeyid, "RATE", 0); 175 - fast_xmit(rbufp, MODE_ACTIVE, skeyid, "RATE"); 176 + fast_xmit(rbufp, MODE_ACTIVE, skeyid, "RATE", 0); 189 stoa(&rbufp->recv_srcadr), hismode, skeyid, 217 fast_xmit(rbufp, MODE_SERVER, skeyid, 230 - fast_xmit(rbufp, MODE_SERVER, skeyid, NULL); 231 + fast_xmit(rbufp, MODE_SERVER, skeyid, NULL, 0); 238 if (crypto_flags && skeyid > NTP_MAXKEY) [all …]
|
/dports/security/fiked/fiked-0.0.5/ |
H A D | ike.c | 873 mem_allocate(&ctx->skeyid, ctx->md_len); in ike_do_phase1() 874 memcpy(ctx->skeyid, gcry_md_read(md_ctx, 0), ctx->md_len); in ike_do_phase1() 879 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1() 891 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1() 904 gcry_md_setkey(md_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1() 945 gcry_md_setkey(i_hash_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1() 960 gcry_md_setkey(r_hash_ctx, ctx->skeyid, ctx->md_len); in ike_do_phase1()
|
H A D | peer_ctx.h | 84 uint8_t *skeyid; member
|
H A D | peer_ctx.c | 111 mem_free(&ctx->skeyid); in peer_ctx_clear()
|
/dports/security/py-potr/python-potr-1.0.1/src/potr/ |
H A D | crypt.py | 165 [self.theirKeyid - msg.skeyid] 169 self.theirKeyid, msg.skeyid)) 199 if msg.skeyid == self.theirKeyid: 251 anyzero = self.theirKeyid == 0 or msg.skeyid == 0 or msg.rkeyid == 0 252 if anyzero or (msg.skeyid != self.theirKeyid and \ 253 msg.skeyid != self.theirKeyid - 1) or \ 256 if self.theirOldY is None and msg.skeyid == self.theirKeyid - 1:
|
/dports/security/vpnc/vpnc-0.5.3/ |
H A D | vpnc.c | 1314 unsigned char *skeyid; in do_phase1_am() local 1680 skeyid = gcry_md_read(skeyid_ctx, 0); in do_phase1_am() 1681 hex_dump("skeyid", skeyid, s->ike.md_len, NULL); in do_phase1_am() 1699 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am() 1836 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am() 1851 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am() 1879 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am() 1892 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am() 1906 gcry_md_setkey(hm, skeyid, s->ike.md_len); in do_phase1_am()
|