/dports/security/mhash/mhash-0.9.9.9/lib/ |
H A D | keygen.c | 132 password, passwordlen); in mhash_keygen() 136 password, passwordlen); in mhash_keygen() 144 password, passwordlen); in mhash_keygen() 149 password, passwordlen); in mhash_keygen() 155 password, passwordlen); in mhash_keygen() 161 password, passwordlen); in mhash_keygen() 187 password, passwordlen); in mhash_keygen_ext() 191 password, passwordlen); in mhash_keygen_ext() 199 password, passwordlen); in mhash_keygen_ext() 204 password, passwordlen); in mhash_keygen_ext() [all …]
|
H A D | mhash_int.h | 58 mutils_word8 *password, mutils_word32 passwordlen); 62 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/editors/wxhexeditor/wxHexEditor/mhash/lib/ |
H A D | keygen.c | 132 password, passwordlen); in mhash_keygen() 136 password, passwordlen); in mhash_keygen() 144 password, passwordlen); in mhash_keygen() 149 password, passwordlen); in mhash_keygen() 155 password, passwordlen); in mhash_keygen() 161 password, passwordlen); in mhash_keygen() 187 password, passwordlen); in mhash_keygen_ext() 191 password, passwordlen); in mhash_keygen_ext() 199 password, passwordlen); in mhash_keygen_ext() 204 password, passwordlen); in mhash_keygen_ext() [all …]
|
H A D | mhash_int.h | 58 mutils_word8 *password, mutils_word32 passwordlen); 62 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/security/openvpn-auth-radius/radiusplugin/RadiusClass/ |
H A D | RadiusAttribute.cpp | 159 passwordlen; //The password length. in makePasswordHash() local 190 passwordlen=this->length-2; //get the length of the passwordfield in makePasswordHash() 199 passwordlen=passwordlen-MD5_DIGEST_LENGTH; //the next 16 charakters in makePasswordHash() 201 while (passwordlen>0) in makePasswordHash() 235 passwordlen=passwordlen-MD5_DIGEST_LENGTH; //and the next 16 characters in makePasswordHash() 293 passwordlen; //The passwordlength. in setValue() local 369 passwordlen=((strlen(value)-(strlen(value)%16))/16); in setValue() 373 passwordlen++; in setValue() 375 if(!(this->value=new Octet [passwordlen*16])) in setValue() 379 memset(this->value,0,(passwordlen*16)); in setValue() [all …]
|
/dports/security/dropbear/dropbear-2020.81/ |
H A D | svr-authpasswd.c | 56 unsigned int passwordlen; in svr_auth_password() local 67 password = buf_getstring(ses.payload, &passwordlen); in svr_auth_password() 68 if (valid_user && passwordlen <= DROPBEAR_MAX_PASSWORD_LEN) { in svr_auth_password() 73 m_burn(password, passwordlen); in svr_auth_password() 83 if (passwordlen > DROPBEAR_MAX_PASSWORD_LEN) { in svr_auth_password()
|
H A D | svr-authpam.c | 193 unsigned int passwordlen; in svr_auth_pam() local 206 password = buf_getstring(ses.payload, &passwordlen); in svr_auth_pam() 289 m_burn(password, passwordlen); in svr_auth_pam()
|
/dports/www/elinks/elinks-0.11.7/src/protocol/auth/ |
H A D | auth.c | 83 int passwordlen = int_min(uri->passwordlen, AUTH_PASSWORD_MAXLEN - 1); in set_auth_password() local 85 if (passwordlen) in set_auth_password() 86 memcpy(entry->password, uri->password, passwordlen); in set_auth_password() 88 entry->password[passwordlen] = '\0'; in set_auth_password() 190 || (!uri->password || !uri->passwordlen || in add_auth_entry() 191 strlcmp(entry->password, -1, uri->password, uri->passwordlen))) { in add_auth_entry() 242 if (uri->userlen || uri->passwordlen) { in find_auth() 249 || (uri->password && strlcmp(entry->password, -1, uri->password, uri->passwordlen))) { in find_auth()
|
/dports/security/p5-Crypt-UnixCrypt_XS/Crypt-UnixCrypt_XS-0.11/fcrypt/ |
H A D | fcrypt.c | 624 size_t passwordlen) in trad_password_to_key() argument 627 if(passwordlen > 8) passwordlen = 8; in trad_password_to_key() 628 for (i=0; i<passwordlen; i++) in trad_password_to_key() 638 size_t passwordlen) in ext_password_to_key() argument 641 trad_password_to_key(key, password, passwordlen); in ext_password_to_key() 642 while(passwordlen > 8) in ext_password_to_key() 645 passwordlen -= 8; in ext_password_to_key() 647 for(i=0; i<8 && i<passwordlen; i++) in ext_password_to_key() 655 size_t passwordlen, in des_fcrypt() argument 675 ext_password_to_key(key, password, passwordlen); in des_fcrypt() [all …]
|
H A D | fcrypt.h | 8 size_t passwordlen, 24 size_t passwordlen); 30 size_t passwordlen);
|
/dports/security/shishi/shishi-1.0.2/lib/ |
H A D | crypto-aes.c | 82 size_t passwordlen, in aes_string_to_key() argument 104 _shishi_escapeprint (password, passwordlen); in aes_string_to_key() 105 _shishi_hexprint (password, passwordlen); in aes_string_to_key() 113 res = shishi_pbkdf2_sha1 (handle, password, passwordlen, salt, saltlen, in aes_string_to_key() 148 size_t passwordlen, in aes128_string_to_key() argument 153 return aes_string_to_key (handle, password, passwordlen, in aes128_string_to_key() 160 size_t passwordlen, in aes256_string_to_key() argument 165 return aes_string_to_key (handle, password, passwordlen, in aes256_string_to_key()
|
H A D | key.c | 475 const char *password, size_t passwordlen, in shishi_key_from_string() argument 485 rc = shishi_string_to_key (handle, type, password, passwordlen, in shishi_key_from_string() 517 const char *password, size_t passwordlen, in shishi_key_from_name() argument 527 rc = shishi_key_from_string (handle, type, password, passwordlen, in shishi_key_from_name()
|
/dports/security/libgsasl/gsasl-1.10.0/lib/plain/ |
H A D | client.c | 46 size_t authzidlen = 0, authidlen = 0, passwordlen = 0; in _gsasl_plain_client_step() local 58 passwordlen = strlen (password); in _gsasl_plain_client_step() 62 *output_len = authzidlen + 1 + authidlen + 1 + passwordlen; in _gsasl_plain_client_step() 80 memcpy (out, password, passwordlen); in _gsasl_plain_client_step()
|
/dports/security/gsasl/gsasl-1.10.0/lib/plain/ |
H A D | client.c | 46 size_t authzidlen = 0, authidlen = 0, passwordlen = 0; in _gsasl_plain_client_step() local 58 passwordlen = strlen (password); in _gsasl_plain_client_step() 62 *output_len = authzidlen + 1 + authidlen + 1 + passwordlen; in _gsasl_plain_client_step() 80 memcpy (out, password, passwordlen); in _gsasl_plain_client_step()
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/System.Web/Configuration/ |
H A D | COAUTHIDENTITY.cs | 33 passwordlen = (password==null) ? 0 : password.Length; in COAUTHIDENTITY() 46 internal int passwordlen = 0; field in System.Web.Configuration.COAUTHIDENTITY 60 passwordlen = (password == null) ? 0 : password.Length; in COAUTHIDENTITY_X64() 79 internal int passwordlen = 0; field in System.Web.Configuration.COAUTHIDENTITY_X64
|
/dports/security/hydra/thc-hydra-9.2/ |
H A D | hydra-snmp.c | 82 u_int passwordlen, /* IN */ in password_to_key_md5() argument 90 if (strlen(password) > passwordlen) in password_to_key_md5() 91 passwordlen = strlen(password); in password_to_key_md5() 92 if (passwordlen > sizeof(bpass) - 1) in password_to_key_md5() 93 passwordlen = sizeof(bpass) - 1; in password_to_key_md5() 94 mylen = passwordlen; in password_to_key_md5() 101 mylen += passwordlen; in password_to_key_md5() 135 u_int passwordlen, /* IN */ in password_to_key_sha() argument 141 u_long password_index = 0, count = 0, i, mylen = passwordlen, myelen = engineLength; in password_to_key_sha() 148 mylen += passwordlen; in password_to_key_sha()
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | snmp_fmt_plug.c | 178 passwordlen, const uint8_t *engineID, uint32_t engineLength, in snmp_usm_password_to_key_md5() argument 192 if (passwordlen != 0) { in snmp_usm_password_to_key_md5() 199 if (password_index >= passwordlen) in snmp_usm_password_to_key_md5() 227 passwordlen, const uint8_t *engineID, uint32_t engineLength, in snmp_usm_password_to_key_sha() argument 241 if (passwordlen != 0) { in snmp_usm_password_to_key_sha() 248 if (password_index >= passwordlen) in snmp_usm_password_to_key_sha()
|
/dports/lang/mit-scheme/mit-scheme-9.2/src/mhash/ |
H A D | mhash-adapter.c | 59 unsigned char *password, int passwordlen) in do_mhash_keygen() argument 71 password, passwordlen)); in do_mhash_keygen()
|
/dports/security/mhash/mhash-0.9.9.9/include/mutils/ |
H A D | mhash.h | 104 mutils_word8 *password, mutils_word32 passwordlen); 108 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/security/mhash/mhash-0.9.9.9/mhash-0.9.9/include/mutils/ |
H A D | mhash.h | 103 mutils_word8 *password, mutils_word32 passwordlen); 107 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/editors/wxhexeditor/wxHexEditor/mhash/mhash-0.9.9/include/mutils/ |
H A D | mhash.h | 103 mutils_word8 *password, mutils_word32 passwordlen); 107 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/editors/wxhexeditor/wxHexEditor/mhash/include/mutils/ |
H A D | mhash.h | 104 mutils_word8 *password, mutils_word32 passwordlen); 108 mutils_word8 *password, mutils_word32 passwordlen);
|
/dports/security/tor/tor-0.4.6.8/src/core/proto/ |
H A D | proto_socks.c | 103 memwipe(req->password, 0x04, req->passwordlen); in socks_request_free_() 447 uint8_t passwordlen = in parse_socks5_userpass_auth() local 460 if (passwordlen && password) { in parse_socks5_userpass_auth() 462 req->password = tor_memdup_nulterm(password, passwordlen); in parse_socks5_userpass_auth() 463 req->passwordlen = passwordlen; in parse_socks5_userpass_auth()
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/core/proto/ |
H A D | proto_socks.c | 103 memwipe(req->password, 0x04, req->passwordlen); in socks_request_free_() 447 uint8_t passwordlen = in parse_socks5_userpass_auth() local 460 if (passwordlen && password) { in parse_socks5_userpass_auth() 462 req->password = tor_memdup_nulterm(password, passwordlen); in parse_socks5_userpass_auth() 463 req->passwordlen = passwordlen; in parse_socks5_userpass_auth()
|
/dports/net/samba412/samba-4.12.15/source4/heimdal/lib/hx509/ |
H A D | ks_file.c | 74 size_t passwordlen, in try_decrypt() argument 92 password, passwordlen, in try_decrypt() 260 size_t passwordlen; in parse_pem_private_key() local 264 passwordlen = strlen(password); in parse_pem_private_key() 267 password, passwordlen, data, len); in parse_pem_private_key()
|