/dports/security/libotr/libotr-4.1.1/toolkit/ |
H A D | sesskeys.c | 49 size_t secretlen; in sesskeys_gen() local 63 gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &secretlen, secretv); in sesskeys_gen() 64 secret = malloc(secretlen + 5); in sesskeys_gen() 66 secret[1] = (secretlen >> 24) & 0xff; in sesskeys_gen() 67 secret[2] = (secretlen >> 16) & 0xff; in sesskeys_gen() 68 secret[3] = (secretlen >> 8) & 0xff; in sesskeys_gen() 69 secret[4] = (secretlen) & 0xff; in sesskeys_gen() 70 gcry_mpi_print(GCRYMPI_FMT_USG, secret+5, secretlen, NULL, secretv); in sesskeys_gen() 77 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen() 82 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/libotr/toolkit/ |
H A D | sesskeys.c | 49 size_t secretlen; in sesskeys_gen() local 63 gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &secretlen, secretv); in sesskeys_gen() 64 secret = malloc(secretlen + 5); in sesskeys_gen() 66 secret[1] = (secretlen >> 24) & 0xff; in sesskeys_gen() 67 secret[2] = (secretlen >> 16) & 0xff; in sesskeys_gen() 68 secret[3] = (secretlen >> 8) & 0xff; in sesskeys_gen() 69 secret[4] = (secretlen) & 0xff; in sesskeys_gen() 70 gcry_mpi_print(GCRYMPI_FMT_USG, secret+5, secretlen, NULL, secretv); in sesskeys_gen() 77 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen() 82 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen() [all …]
|
/dports/net/gnu-radius/radius-1.6.1/lib/ |
H A D | cryptpass.c | 84 int secretlen; in grad_encrypt_text() local 106 secretlen = strlen(secret); in grad_encrypt_text() 107 md5len = secretlen + GRAD_AUTHENTICATOR_LENGTH; in grad_encrypt_text() 109 memcpy(md5buf, secret, secretlen); in grad_encrypt_text() 144 int secretlen; in grad_decrypt_text() local 151 secretlen = strlen(secret); in grad_decrypt_text() 152 md5len = secretlen + GRAD_AUTHENTICATOR_LENGTH; in grad_decrypt_text() 154 memcpy(md5buf, secret, secretlen); in grad_decrypt_text() 222 int secretlen; in grad_decrypt_password_broken() local 232 secretlen = strlen(secret); in grad_decrypt_password_broken() [all …]
|
/dports/security/oath-toolkit/oath-toolkit-2.6.2/liboath/tests/ |
H A D | tst_coding.c | 35 size_t secretlen; in main() local 41 secretlen = 0; in main() 42 rc = oath_hex2bin (hexsecret, secret, &secretlen); in main() 48 if (secretlen != 20) in main() 54 rc = oath_hex2bin ("abcd", secret, &secretlen); in main() 61 rc = oath_hex2bin ("ABCD", secret, &secretlen); in main() 68 rc = oath_hex2bin ("ABC", secret, &secretlen); in main() 75 rc = oath_hex2bin ("JUNK", secret, &secretlen); in main() 82 secretlen = sizeof (secret); in main() 83 rc = oath_hex2bin (hexsecret, secret, &secretlen); in main() [all …]
|
H A D | tst_hotp_validate.c | 128 size_t secretlen = sizeof (secret); in main() local 144 rc = oath_hotp_validate (secret, secretlen, 0, 20, in main() 155 rc = oath_hotp_validate (secret, secretlen, 0, i, in main() 165 rc = oath_hotp_validate_callback (secret, secretlen, 0, 20, in main() 179 rc = oath_hotp_validate_callback (secret, secretlen, 0, i, in main()
|
H A D | tst_totp_validate.c | 63 size_t secretlen = sizeof (secret); in main() local 82 rc = oath_totp_validate (secret, secretlen, tv[i].now, time_step_size, in main() 91 rc = oath_totp_validate_callback (secret, secretlen, tv[i].now, in main() 104 rc = oath_totp_validate2 (secret, secretlen, tv[i].now, time_step_size, in main() 122 rc = oath_totp_validate2_callback (secret, secretlen, tv[i].now, in main() 142 rc = oath_totp_validate3 (secret, secretlen, tv[i].now, time_step_size, in main() 167 rc = oath_totp_validate3_callback (secret, secretlen, tv[i].now, in main()
|
/dports/net/libngtcp2/ngtcp2-224bd62/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 175 const uint8_t *secret, size_t secretlen, 190 size_t secretlen, 220 size_t secretlen, 275 const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen); 432 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen); 522 size_t secretlen); 539 size_t secretlen, void *user_data); 642 uint8_t *token, const uint8_t *secret, size_t secretlen, 712 uint8_t *token, const uint8_t *secret, size_t secretlen, 757 uint8_t *token, const uint8_t *secret, size_t secretlen, [all …]
|
/dports/net/radiusclient/radiusclient-ng-0.5.6/lib/ |
H A D | sendserver.c | 38 int length, i, pc, secretlen, padded_length; in rc_pack_list() local 83 secretlen = strlen (secret); in rc_pack_list() 89 memcpy ((char *) md5buf + secretlen, vector, in rc_pack_list() 122 secretlen = strlen (secret); in rc_pack_list() 126 rc_md5_calc (buf, md5buf, secretlen + AUTH_VECTOR_LEN); in rc_pack_list() 191 int secretlen; in rc_send_server() local 272 secretlen = strlen (secret); in rc_send_server() 405 int secretlen; in rc_check_reply() local 414 secretlen = strlen (secret); in rc_check_reply() 424 if ((totallen + secretlen) > bufferlen) in rc_check_reply() [all …]
|
/dports/security/oath-toolkit/oath-toolkit-2.6.2/oathtool/ |
H A D | oathtool.c | 128 size_t secretlen = 0; in main() local 179 &secret, &secretlen); in main() 186 secretlen = 1 + strlen (args_info.inputs[0]) / 2; in main() 187 secret = malloc (secretlen); in main() 229 tmp = malloc (2 * secretlen + 1); in main() 233 oath_bin2hex (secret, secretlen, tmp); in main() 238 rc = oath_base32_encode (secret, secretlen, &tmp, NULL); in main() 291 secretlen, in main() 310 secretlen, in main() 325 secretlen, in main() [all …]
|
/dports/net/libngtcp2/ngtcp2-224bd62/crypto/ |
H A D | shared.c | 159 size_t secretlen) { in ngtcp2_crypto_update_traffic_secret() argument 162 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret() 174 size_t secretlen) { in ngtcp2_crypto_derive_and_install_rx_key() argument 308 size_t secretlen) { in ngtcp2_crypto_derive_and_install_tx_key() argument 558 size_t secretlen) { in ngtcp2_crypto_update_key() argument 565 secretlen) != 0) { in ngtcp2_crypto_update_key() 575 secretlen) != 0) { in ngtcp2_crypto_update_key() 637 size_t secretlen, void *user_data) { in ngtcp2_crypto_update_key_cb() argument 646 secretlen) != 0) { in ngtcp2_crypto_update_key_cb() 731 uint8_t *token, const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_generate_retry_token() argument [all …]
|
/dports/net/freeradius-client/freeradius-client-1.1.7/lib/ |
H A D | sendserver.c | 42 size_t secretlen; in rc_pack_list() local 86 secretlen = strlen (secret); in rc_pack_list() 92 memcpy ((char *) md5buf + secretlen, vector, in rc_pack_list() 125 secretlen = strlen (secret); in rc_pack_list() 129 rc_md5_calc (buf, md5buf, secretlen + AUTH_VECTOR_LEN); in rc_pack_list() 230 size_t secretlen; in rc_send_server() local 327 secretlen = strlen (secret); in rc_send_server() 470 int secretlen; in rc_check_reply() local 479 secretlen = (int)strlen (secret); in rc_check_reply() 489 if ((totallen + secretlen) > bufferlen) in rc_check_reply() [all …]
|
/dports/net/freeradius-client/freeradius-client-1.1.7/patches/ |
H A D | merit-2.4.21-CHAP.diff | 11 int secretlen; 19 secretlen = strlen ((char *) ptr); 20 ptr += secretlen; 37 - 1 + CHAP_VALUE_LENGTH + secretlen); 38 + 1 + chall_len + secretlen);
|
/dports/net/radiusclient/radiusclient-ng-0.5.6/patches/ |
H A D | merit-2.4.21-CHAP.diff | 11 int secretlen; 19 secretlen = strlen ((char *) ptr); 20 ptr += secretlen; 37 - 1 + CHAP_VALUE_LENGTH + secretlen); 38 + 1 + chall_len + secretlen);
|
/dports/www/libnghttp2/nghttp2-1.46.0/src/ |
H A D | shrpx_quic.cc | 261 size_t secretlen) { in generate_quic_stateless_reset_token() argument 262 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token() 273 size_t secretlen) { in generate_retry_token() argument 279 token, secret, secretlen, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 292 size_t secretlen) { in verify_retry_token() argument 299 secretlen, sa, salen, &dcid, in verify_retry_token() 308 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() argument 314 token, secret, secretlen, sa, salen, t); in generate_token() 325 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() argument 330 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token() [all …]
|
H A D | shrpx_quic.h | 108 size_t secretlen); 113 size_t secretlen); 118 size_t secretlen); 121 size_t salen, const uint8_t *secret, size_t secretlen); 124 socklen_t salen, const uint8_t *secret, size_t secretlen); 128 size_t secretlen,
|
/dports/www/nghttp2/nghttp2-1.46.0/src/ |
H A D | shrpx_quic.cc | 261 size_t secretlen) { in generate_quic_stateless_reset_token() argument 262 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token() 273 size_t secretlen) { in generate_retry_token() argument 279 token, secret, secretlen, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 292 size_t secretlen) { in verify_retry_token() argument 299 secretlen, sa, salen, &dcid, in verify_retry_token() 308 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() argument 314 token, secret, secretlen, sa, salen, t); in generate_token() 325 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() argument 330 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token() [all …]
|
H A D | shrpx_quic.h | 108 size_t secretlen); 113 size_t secretlen); 118 size_t secretlen); 121 size_t salen, const uint8_t *secret, size_t secretlen); 124 socklen_t salen, const uint8_t *secret, size_t secretlen); 128 size_t secretlen,
|
/dports/net/libngtcp2/ngtcp2-224bd62/examples/ |
H A D | server_base.cc | 53 size_t secretlen) { in on_rx_key() argument 58 secretlen) != 0) { in on_rx_key() 72 debug::print_secrets(secret, secretlen, key.data(), keylen, iv.data(), in on_rx_key() 80 size_t secretlen) { in on_tx_key() argument 85 secretlen) != 0) { in on_tx_key() 112 debug::print_secrets(secret, secretlen, key.data(), keylen, iv.data(), in on_tx_key()
|
/dports/net-mgmt/sysmon/sysmon-0.93/src/ |
H A D | radius.c | 247 int secretlen; in calculate_RA() local 250 secretlen = strlen(Secret); in calculate_RA() 251 md5sumlen = (secretlen+packetlen); in calculate_RA() 257 memcpy(temp_pkt+packetlen, Secret, secretlen); in calculate_RA() 268 int secretlen = strlen(secret); in gen_passwd() local 297 memcpy(md5buf, secret, secretlen); in gen_passwd() 298 memcpy(md5buf+secretlen, request_authenticator, 16); in gen_passwd() 304 md5_calc (pw_digest, md5buf, secretlen + 16); in gen_passwd() 309 memcpy ((char *) md5buf + secretlen, (char *) ptr, 16); in gen_passwd() 312 memset(md5buf, 0, secretlen); in gen_passwd()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
/dports/security/openssl-devel/openssl-3.0.2/doc/man3/ |
H A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|