/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | oracle_fmt_plug.c | 41 #define MAX_USERNAME_LEN 30 macro 42 #define SALT_SIZE (MAX_USERNAME_LEN*2 + 4) // also contain the NULL 45 #define MAX_INPUT_LEN (CIPHERTEXT_LENGTH + 3 + MAX_USERNAME_LEN * (options.input_enc == U… 119 char name[MAX_USERNAME_LEN + 1]; in valid() 120 UTF16 name16[MAX_USERNAME_LEN + 1 + 1]; in valid() 129 len = enc_to_utf16(name16, MAX_USERNAME_LEN + 1, in valid() 142 if (len > MAX_USERNAME_LEN) in valid() 173 UTF8 tmp8[MAX_USERNAME_LEN * 3 + 1]; in prepare() 350 l = enc_to_utf16_be(&out[1], MAX_USERNAME_LEN, (UTF8 *)salt, l); in get_salt()
|
H A D | o10glogon_fmt_plug.c | 54 #define MAX_USERNAME_LEN 30 macro 58 #define MAX_HASH_LEN (FORMAT_TAG_LEN+MAX_USERNAME_LEN+1+64+1+64+1+160) 80 UTF16 user[MAX_USERNAME_LEN+1]; 122 UTF16 cur_key_mixedcase[MAX_USERNAME_LEN+2]; in valid() 137 …len = enc_to_utf16((UTF16 *)cur_key_mixedcase, MAX_USERNAME_LEN+1, (unsigned char*)tmp, strlen(tmp… in valid() 149 if (len > MAX_USERNAME_LEN) in valid() 341 UTF8 tmp[MAX_USERNAME_LEN*5+1]; in get_salt() 349 salt.userlen = enc_to_utf16_be(salt.user, MAX_USERNAME_LEN, tmp, cp-ciphertext); in get_salt()
|
H A D | o3logon_fmt_plug.c | 50 #define MAX_USERNAME_LEN 30 macro 54 #define MAX_HASH_LEN (FORMAT_TAG_LEN+MAX_USERNAME_LEN+1+32+1+80) 78 UTF16 user[MAX_USERNAME_LEN+1]; 119 UTF16 cur_key_mixedcase[MAX_USERNAME_LEN+2]; in valid() 134 …len = enc_to_utf16((UTF16 *)cur_key_mixedcase, MAX_USERNAME_LEN+1, (unsigned char*)tmp, strlen(tmp… in valid() 146 if (len > MAX_USERNAME_LEN) in valid() 317 UTF8 tmp[MAX_USERNAME_LEN*5+1]; in get_salt() 325 salt.userlen = enc_to_utf16_be(salt.user, MAX_USERNAME_LEN, tmp, cp-ciphertext); in get_salt()
|
H A D | postgres_fmt_plug.c | 53 #define MAX_USERNAME_LEN 64 macro 87 unsigned char user[MAX_USERNAME_LEN + 1]; 129 if (p - ciphertext - FORMAT_TAG_LEN > MAX_USERNAME_LEN) in valid() 160 strnzcpy((char*)cs.user, p, MAX_USERNAME_LEN + 1); in get_salt()
|
/dports/www/c-icap/c_icap-0.5.10/ |
H A D | http_auth.c | 72 ci_base64_decode(username, req->user, MAX_USERNAME_LEN); in http_authenticate() 74 strncpy(req->user, username, MAX_USERNAME_LEN); in http_authenticate() 75 req->user[MAX_USERNAME_LEN] = '\0';; in http_authenticate() 107 strncpy(req->user, username, MAX_USERNAME_LEN); in http_authenticate() 108 req->user[MAX_USERNAME_LEN] = '\0'; in http_authenticate() 424 char dec_http_user[MAX_USERNAME_LEN + HTTP_MAX_PASS_LEN + 2], *str; in basic_create_auth_data() 425 int max_decode_len = MAX_USERNAME_LEN + HTTP_MAX_PASS_LEN + 2; in basic_create_auth_data() 438 strncpy(data->http_user, dec_http_user, MAX_USERNAME_LEN); in basic_create_auth_data() 439 data->http_user[MAX_USERNAME_LEN] = '\0'; in basic_create_auth_data()
|
/dports/net/rp-pppoe/rp-pppoe-3.15/src/ |
H A D | pppoe-server.h | 26 #define MAX_USERNAME_LEN 31 macro 85 char user[MAX_USERNAME_LEN+1]; /* Authenticated user-name */ 86 char realm[MAX_USERNAME_LEN+1]; /* Realm */
|
/dports/security/softether/v4.38-9760/src/Cedar/ |
H A D | Wpc.h | 125 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 126 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password 137 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 138 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password
|
H A D | IPsec.h | 152 char UserName[MAX_USERNAME_LEN + 1]; // User name 153 char Password[MAX_USERNAME_LEN + 1]; // Password
|
H A D | Hub.h | 331 char SrcUsername[MAX_USERNAME_LEN + 1]; 334 char DestUsername[MAX_USERNAME_LEN + 1]; 366 char Username[MAX_USERNAME_LEN + 1]; // User name 367 char UsernameReal[MAX_USERNAME_LEN + 1]; // Real user name 368 char GroupName[MAX_USERNAME_LEN + 1]; // Group name
|
H A D | Session.h | 242 char UserNameReal[MAX_USERNAME_LEN + 1]; // User name (real) 243 char GroupName[MAX_USERNAME_LEN + 1]; // Group name 342 char Username[MAX_USERNAME_LEN + 1]; // User name
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | Wpc.h | 33 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 34 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password 46 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 47 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password
|
H A D | Proto_IPsec.h | 57 char UserName[MAX_USERNAME_LEN + 1]; // User name 58 char Password[MAX_USERNAME_LEN + 1]; // Password
|
H A D | Hub.h | 238 char SrcUsername[MAX_USERNAME_LEN + 1]; 241 char DestUsername[MAX_USERNAME_LEN + 1]; 273 char Username[MAX_USERNAME_LEN + 1]; // User name 274 char UsernameReal[MAX_USERNAME_LEN + 1]; // Real user name 275 char GroupName[MAX_USERNAME_LEN + 1]; // Group name
|
H A D | Session.h | 144 char UserNameReal[MAX_USERNAME_LEN + 1]; // User name (real) 145 char GroupName[MAX_USERNAME_LEN + 1]; // Group name 238 char Username[MAX_USERNAME_LEN + 1]; // User name
|
/dports/security/softether-devel/v4.36-9754/src/Cedar/ |
H A D | Wpc.h | 125 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 126 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password 137 char ProxyUsername[MAX_USERNAME_LEN + 1]; // Proxy server user name 138 char ProxyPassword[MAX_USERNAME_LEN + 1]; // Proxy server password
|
H A D | IPsec.h | 152 char UserName[MAX_USERNAME_LEN + 1]; // User name 153 char Password[MAX_USERNAME_LEN + 1]; // Password
|
H A D | Hub.h | 331 char SrcUsername[MAX_USERNAME_LEN + 1]; 334 char DestUsername[MAX_USERNAME_LEN + 1]; 366 char Username[MAX_USERNAME_LEN + 1]; // User name 367 char UsernameReal[MAX_USERNAME_LEN + 1]; // Real user name 368 char GroupName[MAX_USERNAME_LEN + 1]; // Group name
|
H A D | Session.h | 241 char UserNameReal[MAX_USERNAME_LEN + 1]; // User name (real) 242 char GroupName[MAX_USERNAME_LEN + 1]; // Group name 341 char Username[MAX_USERNAME_LEN + 1]; // User name
|
/dports/www/mod_auth_cookie_mysql2/mod_auth_cookie_mysql2_1.0/ |
H A D | mod_auth_cookie_sql2_mysql.c | 184 if (strlen (row[0]) > MAX_USERNAME_LEN) { in check_against_db() 185 …RRNO, 0, r, ERRTAG "fetched username from DB, but is longer than max length %d", MAX_USERNAME_LEN); in check_against_db()
|
H A D | mod_auth_cookie_sql2.h | 24 #define MAX_USERNAME_LEN 128 macro
|
/dports/www/squid/squid-4.15/src/auth/ntlm/SMB_LM/ |
H A D | ntlm_smb_lm_auth.cc | 88 #define MAX_USERNAME_LEN 255 macro 97 static char credentials[MAX_USERNAME_LEN+MAX_DOMAIN_LEN+2]; /* we can afford to waste */ 257 if (tmp.l > MAX_USERNAME_LEN) { in ntlm_check_auth() 258 debug("Username string exceeds %d bytes, rejecting\n", MAX_USERNAME_LEN); in ntlm_check_auth()
|
/dports/finance/gnucash/gnucash-4.9/libgnucash/backend/sql/ |
H A D | gnc-employee-sql.cpp | 55 #define MAX_USERNAME_LEN 2048 macro 67 "username", MAX_USERNAME_LEN, COL_NNUL, "username"),
|
/dports/www/c-icap/c_icap-0.5.10/include/ |
H A D | request.h | 95 #define MAX_USERNAME_LEN 255 macro 120 char user[MAX_USERNAME_LEN+1];
|
H A D | access.h | 47 char http_user[MAX_USERNAME_LEN+1];
|
/dports/www/lynx/lynx2.8.9rel.1/WWW/Library/Implementation/ |
H A D | HTAAUtil.h | 44 #define MAX_USERNAME_LEN 16 /* @@ Longest allowed username */ macro
|