/dports/www/uwsgi/uwsgi-2.0.20/plugins/router_radius/ |
H A D | radius.c | 28 uint16_t username_len = password - auth; in uwsgi_radius_auth() local 30 uint16_t password_len = auth_len - (username_len+1); in uwsgi_radius_auth() 49 uint16_t access_request_len = 4 + 16 + 2 + username_len + 2 + pwd16_len + 6 + 6; in uwsgi_radius_auth() 83 access_request[4 + 16 + 1] = username_len + 2; in uwsgi_radius_auth() 84 memcpy(access_request + (4 + 16 + 2), username, username_len); in uwsgi_radius_auth() 85 access_request[4 + 16 + 2 + username_len] = 2; in uwsgi_radius_auth() 86 access_request[4 + 16 + 2 + username_len + 1] = pwd16_len + 2; in uwsgi_radius_auth() 88 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len] = 5; in uwsgi_radius_auth() 89 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len + 1] = 6; in uwsgi_radius_auth() 95 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len + 6] = 4; in uwsgi_radius_auth() [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
/dports/databases/pecl-couchbase/couchbase-2.6.2/src/couchbase/ |
H A D | password_authenticator.c | 39 obj->username_len = 0; in PHP_METHOD() 45 void pcbc_password_authenticator_init(zval *return_value, char *username, int username_len, char *p… in pcbc_password_authenticator_init() argument 52 obj->username = estrndup(username, username_len); in pcbc_password_authenticator_init() 53 obj->username_len = username_len; in pcbc_password_authenticator_init() 64 pcbc_str_arg_size username_len; in PHP_METHOD() local 67 rv = zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &username, &username_len); in PHP_METHOD() 77 obj->username_len = username_len; in PHP_METHOD() 78 obj->username = estrndup(username, username_len); in PHP_METHOD() 126 PHP_MD5Update(&md5, auth->username, auth->username_len); in pcbc_generate_password_lcb_auth()
|
H A D | classic_authenticator.c | 39 obj->cluster.username_len = 0; in PHP_METHOD() 54 pcbc_str_arg_size username_len, password_len; in PHP_METHOD() local 57 …rv = zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &username, &username_len, &password, &… in PHP_METHOD() 67 obj->cluster.username_len = username_len; in PHP_METHOD() 68 obj->cluster.username = estrndup(username, username_len); in PHP_METHOD() 98 if (ptr->username_len == name_len && strncmp(ptr->username, name, name_len) == 0) { in PHP_METHOD() 106 cred->username_len = name_len; in PHP_METHOD() 159 PHP_MD5Update(&md5, auth->cluster.username, auth->cluster.username_len); in pcbc_generate_classic_lcb_auth() 175 PHP_MD5Update(&md5, ptr->username, ptr->username_len); in pcbc_generate_classic_lcb_auth() 177 if (name && strncmp(ptr->username, name, ptr->username_len) == 0) { in pcbc_generate_classic_lcb_auth()
|
/dports/net/aprsc/aprsc-2.1.10.gd72a17c/src/ |
H A D | clientlist.c | 48 int username_len; member 112 && cl->username_len == len && cl->validated) { in check_if_validated_client() 113 …DLOG("check_if_validated_client '%.*s' found validated, fd %d", cl->username_len, cl->username, cl… in check_if_validated_client() 151 hash = keyhash(c->username, c->username_len, 0); in clientlist_add() 164 cl->username_len = c->username_len; in clientlist_add() 172 old_fd = check_if_validated_client(c->username, c->username_len); in clientlist_add() 198 cl = clientlist_find_id(c->username, c->username_len, (void *)c); in clientlist_remove()
|
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/crypto/ |
H A D | ms_funcs.c | 33 const u8 *username, size_t username_len, in challenge_hash() argument 45 len[2] = username_len; in challenge_hash() 126 const u8 *username, size_t username_len, in generate_nt_response() argument 133 challenge_hash(peer_challenge, auth_challenge, username, username_len, in generate_nt_response() 154 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 161 username, username_len, in generate_nt_response_pwhash() 184 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 220 challenge_hash(peer_challenge, auth_challenge, username, username_len, in generate_authenticator_response_pwhash() 242 const u8 *username, size_t username_len, in generate_authenticator_response() argument 250 username, username_len, nt_response, response); in generate_authenticator_response()
|
/dports/security/lastpass-cli/lastpass-cli-1.3.3/ |
H A D | kdf.c | 47 static void pbkdf2_hash(const char *username, size_t username_len, const char *password, size_t pas… in pbkdf2_hash() argument 49 …onPBKDF(kCCPBKDF2, password, password_len, (const uint8_t *)username, username_len, kCCPRFHmacAlgS… in pbkdf2_hash() 55 static void pbkdf2_hash(const char *username, size_t username_len, const char *password, size_t pas… in pbkdf2_hash() argument 57 …if (!PKCS5_PBKDF2_HMAC(password, password_len, (const unsigned char *)username, username_len, iter… in pbkdf2_hash() 62 static void sha256_hash(const char *username, size_t username_len, const char *password, size_t pas… in sha256_hash() argument 68 if (!SHA256_Update(&sha256, username, username_len)) in sha256_hash()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dports/net/hostapd/hostapd-2.9/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/ |
H A D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/dports/net-im/libnice/libnice-0.1.18/stun/ |
H A D | stunagent.c | 84 username_len, val[i].username_len, in stun_agent_default_validater() 89 val[i].username_len); in stun_agent_default_validater() 90 if (username_len == val[i].username_len && in stun_agent_default_validater() 147 uint16_t username_len; in stun_agent_validate() local 253 username_len = 0; in stun_agent_validate() 255 &username_len); in stun_agent_validate() 257 validater (agent, msg, username, username_len, in stun_agent_validate() 285 username, username_len, in stun_agent_validate() 591 uint16_t username_len; in stun_agent_finish_message() local 596 STUN_ATTRIBUTE_USERNAME, &username_len); in stun_agent_finish_message() [all …]
|
/dports/net-im/libnice-gst1/libnice-0.1.18/stun/ |
H A D | stunagent.c | 84 username_len, val[i].username_len, in stun_agent_default_validater() 89 val[i].username_len); in stun_agent_default_validater() 90 if (username_len == val[i].username_len && in stun_agent_default_validater() 147 uint16_t username_len; in stun_agent_validate() local 253 username_len = 0; in stun_agent_validate() 255 &username_len); in stun_agent_validate() 257 validater (agent, msg, username, username_len, in stun_agent_validate() 285 username, username_len, in stun_agent_validate() 591 uint16_t username_len; in stun_agent_finish_message() local 596 STUN_ATTRIBUTE_USERNAME, &username_len); in stun_agent_finish_message() [all …]
|
/dports/net-im/libnice-gst1/libnice-0.1.18/stun/usages/ |
H A D | turn.c | 76 uint8_t *username, size_t username_len, in stun_usage_turn_create() argument 157 if (username != NULL && username_len > 0 && in stun_usage_turn_create() 161 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create() 171 uint8_t *username, size_t username_len, in stun_usage_turn_create_refresh() argument 180 username, username_len, password, password_len, compatibility); in stun_usage_turn_create_refresh() 212 if (username != NULL && username_len > 0 && in stun_usage_turn_create_refresh() 216 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_refresh() 226 uint8_t *username, size_t username_len, in stun_usage_turn_create_permission() argument 264 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_permission()
|
/dports/net-im/libnice/libnice-0.1.18/stun/usages/ |
H A D | turn.c | 76 uint8_t *username, size_t username_len, in stun_usage_turn_create() argument 157 if (username != NULL && username_len > 0 && in stun_usage_turn_create() 161 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create() 171 uint8_t *username, size_t username_len, in stun_usage_turn_create_refresh() argument 180 username, username_len, password, password_len, compatibility); in stun_usage_turn_create_refresh() 212 if (username != NULL && username_len > 0 && in stun_usage_turn_create_refresh() 216 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_refresh() 226 uint8_t *username, size_t username_len, in stun_usage_turn_create_permission() argument 264 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_permission()
|