Home
last modified time | relevance | path

Searched refs:secretlen (Results 1 – 25 of 345) sorted by relevance

12345678910>>...14

/dports/security/libotr/libotr-4.1.1/toolkit/
H A Dsesskeys.c49 size_t secretlen; in sesskeys_gen() local
63 gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &secretlen, secretv); in sesskeys_gen()
64 secret = malloc(secretlen + 5); in sesskeys_gen()
66 secret[1] = (secretlen >> 24) & 0xff; in sesskeys_gen()
67 secret[2] = (secretlen >> 16) & 0xff; in sesskeys_gen()
68 secret[3] = (secretlen >> 8) & 0xff; in sesskeys_gen()
69 secret[4] = (secretlen) & 0xff; in sesskeys_gen()
70 gcry_mpi_print(GCRYMPI_FMT_USG, secret+5, secretlen, NULL, secretv); in sesskeys_gen()
77 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen()
82 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen()
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/libotr/toolkit/
H A Dsesskeys.c49 size_t secretlen; in sesskeys_gen() local
63 gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &secretlen, secretv); in sesskeys_gen()
64 secret = malloc(secretlen + 5); in sesskeys_gen()
66 secret[1] = (secretlen >> 24) & 0xff; in sesskeys_gen()
67 secret[2] = (secretlen >> 16) & 0xff; in sesskeys_gen()
68 secret[3] = (secretlen >> 8) & 0xff; in sesskeys_gen()
69 secret[4] = (secretlen) & 0xff; in sesskeys_gen()
70 gcry_mpi_print(GCRYMPI_FMT_USG, secret+5, secretlen, NULL, secretv); in sesskeys_gen()
77 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen()
82 gcry_md_hash_buffer(GCRY_MD_SHA1, hash, secret, secretlen+5); in sesskeys_gen()
[all …]
/dports/net/gnu-radius/radius-1.6.1/lib/
H A Dcryptpass.c84 int secretlen; in grad_encrypt_text() local
106 secretlen = strlen(secret); in grad_encrypt_text()
107 md5len = secretlen + GRAD_AUTHENTICATOR_LENGTH; in grad_encrypt_text()
109 memcpy(md5buf, secret, secretlen); in grad_encrypt_text()
144 int secretlen; in grad_decrypt_text() local
151 secretlen = strlen(secret); in grad_decrypt_text()
152 md5len = secretlen + GRAD_AUTHENTICATOR_LENGTH; in grad_decrypt_text()
154 memcpy(md5buf, secret, secretlen); in grad_decrypt_text()
222 int secretlen; in grad_decrypt_password_broken() local
232 secretlen = strlen(secret); in grad_decrypt_password_broken()
[all …]
/dports/security/oath-toolkit/oath-toolkit-2.6.2/liboath/tests/
H A Dtst_coding.c35 size_t secretlen; in main() local
41 secretlen = 0; in main()
42 rc = oath_hex2bin (hexsecret, secret, &secretlen); in main()
48 if (secretlen != 20) in main()
54 rc = oath_hex2bin ("abcd", secret, &secretlen); in main()
61 rc = oath_hex2bin ("ABCD", secret, &secretlen); in main()
68 rc = oath_hex2bin ("ABC", secret, &secretlen); in main()
75 rc = oath_hex2bin ("JUNK", secret, &secretlen); in main()
82 secretlen = sizeof (secret); in main()
83 rc = oath_hex2bin (hexsecret, secret, &secretlen); in main()
[all …]
H A Dtst_hotp_validate.c128 size_t secretlen = sizeof (secret); in main() local
144 rc = oath_hotp_validate (secret, secretlen, 0, 20, in main()
155 rc = oath_hotp_validate (secret, secretlen, 0, i, in main()
165 rc = oath_hotp_validate_callback (secret, secretlen, 0, 20, in main()
179 rc = oath_hotp_validate_callback (secret, secretlen, 0, i, in main()
H A Dtst_totp_validate.c63 size_t secretlen = sizeof (secret); in main() local
82 rc = oath_totp_validate (secret, secretlen, tv[i].now, time_step_size, in main()
91 rc = oath_totp_validate_callback (secret, secretlen, tv[i].now, in main()
104 rc = oath_totp_validate2 (secret, secretlen, tv[i].now, time_step_size, in main()
122 rc = oath_totp_validate2_callback (secret, secretlen, tv[i].now, in main()
142 rc = oath_totp_validate3 (secret, secretlen, tv[i].now, time_step_size, in main()
167 rc = oath_totp_validate3_callback (secret, secretlen, tv[i].now, in main()
/dports/net/libngtcp2/ngtcp2-224bd62/crypto/includes/ngtcp2/
H A Dngtcp2_crypto.h175 const uint8_t *secret, size_t secretlen,
190 size_t secretlen,
220 size_t secretlen,
275 const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen);
432 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen);
522 size_t secretlen);
539 size_t secretlen, void *user_data);
642 uint8_t *token, const uint8_t *secret, size_t secretlen,
712 uint8_t *token, const uint8_t *secret, size_t secretlen,
757 uint8_t *token, const uint8_t *secret, size_t secretlen,
[all …]
/dports/net/radiusclient/radiusclient-ng-0.5.6/lib/
H A Dsendserver.c38 int length, i, pc, secretlen, padded_length; in rc_pack_list() local
83 secretlen = strlen (secret); in rc_pack_list()
89 memcpy ((char *) md5buf + secretlen, vector, in rc_pack_list()
122 secretlen = strlen (secret); in rc_pack_list()
126 rc_md5_calc (buf, md5buf, secretlen + AUTH_VECTOR_LEN); in rc_pack_list()
191 int secretlen; in rc_send_server() local
272 secretlen = strlen (secret); in rc_send_server()
405 int secretlen; in rc_check_reply() local
414 secretlen = strlen (secret); in rc_check_reply()
424 if ((totallen + secretlen) > bufferlen) in rc_check_reply()
[all …]
/dports/security/oath-toolkit/oath-toolkit-2.6.2/oathtool/
H A Doathtool.c128 size_t secretlen = 0; in main() local
179 &secret, &secretlen); in main()
186 secretlen = 1 + strlen (args_info.inputs[0]) / 2; in main()
187 secret = malloc (secretlen); in main()
229 tmp = malloc (2 * secretlen + 1); in main()
233 oath_bin2hex (secret, secretlen, tmp); in main()
238 rc = oath_base32_encode (secret, secretlen, &tmp, NULL); in main()
291 secretlen, in main()
310 secretlen, in main()
325 secretlen, in main()
[all …]
/dports/net/libngtcp2/ngtcp2-224bd62/crypto/
H A Dshared.c159 size_t secretlen) { in ngtcp2_crypto_update_traffic_secret() argument
162 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret()
174 size_t secretlen) { in ngtcp2_crypto_derive_and_install_rx_key() argument
308 size_t secretlen) { in ngtcp2_crypto_derive_and_install_tx_key() argument
558 size_t secretlen) { in ngtcp2_crypto_update_key() argument
565 secretlen) != 0) { in ngtcp2_crypto_update_key()
575 secretlen) != 0) { in ngtcp2_crypto_update_key()
637 size_t secretlen, void *user_data) { in ngtcp2_crypto_update_key_cb() argument
646 secretlen) != 0) { in ngtcp2_crypto_update_key_cb()
731 uint8_t *token, const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_generate_retry_token() argument
[all …]
/dports/net/freeradius-client/freeradius-client-1.1.7/lib/
H A Dsendserver.c42 size_t secretlen; in rc_pack_list() local
86 secretlen = strlen (secret); in rc_pack_list()
92 memcpy ((char *) md5buf + secretlen, vector, in rc_pack_list()
125 secretlen = strlen (secret); in rc_pack_list()
129 rc_md5_calc (buf, md5buf, secretlen + AUTH_VECTOR_LEN); in rc_pack_list()
230 size_t secretlen; in rc_send_server() local
327 secretlen = strlen (secret); in rc_send_server()
470 int secretlen; in rc_check_reply() local
479 secretlen = (int)strlen (secret); in rc_check_reply()
489 if ((totallen + secretlen) > bufferlen) in rc_check_reply()
[all …]
/dports/net/freeradius-client/freeradius-client-1.1.7/patches/
H A Dmerit-2.4.21-CHAP.diff11 int secretlen;
19 secretlen = strlen ((char *) ptr);
20 ptr += secretlen;
37 - 1 + CHAP_VALUE_LENGTH + secretlen);
38 + 1 + chall_len + secretlen);
/dports/net/radiusclient/radiusclient-ng-0.5.6/patches/
H A Dmerit-2.4.21-CHAP.diff11 int secretlen;
19 secretlen = strlen ((char *) ptr);
20 ptr += secretlen;
37 - 1 + CHAP_VALUE_LENGTH + secretlen);
38 + 1 + chall_len + secretlen);
/dports/www/libnghttp2/nghttp2-1.46.0/src/
H A Dshrpx_quic.cc261 size_t secretlen) { in generate_quic_stateless_reset_token() argument
262 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token()
273 size_t secretlen) { in generate_retry_token() argument
279 token, secret, secretlen, sa, salen, &retry_scid, &odcid, t); in generate_retry_token()
292 size_t secretlen) { in verify_retry_token() argument
299 secretlen, sa, salen, &dcid, in verify_retry_token()
308 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() argument
314 token, secret, secretlen, sa, salen, t); in generate_token()
325 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() argument
330 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token()
[all …]
H A Dshrpx_quic.h108 size_t secretlen);
113 size_t secretlen);
118 size_t secretlen);
121 size_t salen, const uint8_t *secret, size_t secretlen);
124 socklen_t salen, const uint8_t *secret, size_t secretlen);
128 size_t secretlen,
/dports/www/nghttp2/nghttp2-1.46.0/src/
H A Dshrpx_quic.cc261 size_t secretlen) { in generate_quic_stateless_reset_token() argument
262 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token()
273 size_t secretlen) { in generate_retry_token() argument
279 token, secret, secretlen, sa, salen, &retry_scid, &odcid, t); in generate_retry_token()
292 size_t secretlen) { in verify_retry_token() argument
299 secretlen, sa, salen, &dcid, in verify_retry_token()
308 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() argument
314 token, secret, secretlen, sa, salen, t); in generate_token()
325 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() argument
330 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token()
[all …]
H A Dshrpx_quic.h108 size_t secretlen);
113 size_t secretlen);
118 size_t secretlen);
121 size_t salen, const uint8_t *secret, size_t secretlen);
124 socklen_t salen, const uint8_t *secret, size_t secretlen);
128 size_t secretlen,
/dports/net/libngtcp2/ngtcp2-224bd62/examples/
H A Dserver_base.cc53 size_t secretlen) { in on_rx_key() argument
58 secretlen) != 0) { in on_rx_key()
72 debug::print_secrets(secret, secretlen, key.data(), keylen, iv.data(), in on_rx_key()
80 size_t secretlen) { in on_tx_key() argument
85 secretlen) != 0) { in on_tx_key()
112 debug::print_secrets(secret, secretlen, key.data(), keylen, iv.data(), in on_tx_key()
/dports/net-mgmt/sysmon/sysmon-0.93/src/
H A Dradius.c247 int secretlen; in calculate_RA() local
250 secretlen = strlen(Secret); in calculate_RA()
251 md5sumlen = (secretlen+packetlen); in calculate_RA()
257 memcpy(temp_pkt+packetlen, Secret, secretlen); in calculate_RA()
268 int secretlen = strlen(secret); in gen_passwd() local
297 memcpy(md5buf, secret, secretlen); in gen_passwd()
298 memcpy(md5buf+secretlen, request_authenticator, 16); in gen_passwd()
304 md5_calc (pw_digest, md5buf, secretlen + 16); in gen_passwd()
309 memcpy ((char *) md5buf + secretlen, (char *) ptr, 16); in gen_passwd()
312 memset(md5buf, 0, secretlen); in gen_passwd()
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
/dports/security/openssl-devel/openssl-3.0.2/doc/man3/
H A DEVP_PKEY_decapsulate.pod14 unsigned char *secret, size_t *secretlen,
27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the
29 the amount of data written to I<secretlen>.
54 size_t secretlen = 0;
68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0)
71 secret = OPENSSL_malloc(secretlen);
75 /* Decapsulated secret data is secretlen bytes long */
76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)

12345678910>>...14