Searched refs:server_key (Results 1 - 6 of 6) sorted by relevance
/freebsd-10-stable/crypto/openssh/ |
H A D | kexecdhs.c | 66 EC_KEY *server_key = NULL; local 78 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { 82 if (EC_KEY_generate_key(server_key) != 1) { 86 group = EC_KEY_get0_group(server_key); 90 sshkey_dump_ec_key(server_key); 132 server_key, NULL) != (int)klen || 155 EC_KEY_get0_public_key(server_key), 178 public_key = EC_KEY_get0_public_key(server_key); 195 if (server_key) 196 EC_KEY_free(server_key); [all...] |
H A D | kexc25519s.c | 62 u_char server_key[CURVE25519_SIZE]; local 70 kexc25519_keygen(server_key, server_pubkey); 72 dump_digest("server private key:", server_key, sizeof(server_key)); 103 if ((r = kexc25519_shared_key(server_key, client_pubkey, 153 explicit_bzero(server_key, sizeof(server_key));
|
H A D | sshd.c | 222 Key *server_key; /* ephemeral server key */ member in struct:__anon526 407 sensitive_data.server_key ? "new " : "", options.server_key_bits); 408 if (sensitive_data.server_key != NULL) 409 key_free(sensitive_data.server_key); 410 sensitive_data.server_key = key_generate(KEY_RSA1, 586 if (sensitive_data.server_key) { 587 key_free(sensitive_data.server_key); 588 sensitive_data.server_key = NULL; 611 if (sensitive_data.server_key) { 612 tmp = key_demote(sensitive_data.server_key); [all...] |
H A D | sshconnect1.c | 505 Key *host_key, *server_key; local 524 server_key = key_new(KEY_RSA1); 526 packet_get_bignum(server_key->rsa->e); 527 packet_get_bignum(server_key->rsa->n); 529 rbits = BN_num_bits(server_key->rsa->n); 557 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); 564 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id); 604 if (BN_cmp(server_key->rsa->n, host_key->rsa->n) < 0) { 607 BN_num_bits(server_key->rsa->n) + SSH_KEY_BITS_RESERVED) { 608 fatal("respond_to_rsa_challenge: host_key %d < server_key [all...] |
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | pac.c | 956 const krb5_keyblock *server_key, 1011 ret = pac_checksum(context, server_key, &server_cksumtype, &server_size); 1115 ret = create_checksum(context, server_key, server_cksumtype, 952 _krb5_pac_sign(krb5_context context, krb5_pac p, time_t authtime, krb5_principal principal, const krb5_keyblock *server_key, const krb5_keyblock *priv_key, krb5_data *data) argument
|
/freebsd-10-stable/crypto/openssl/ssl/ |
H A D | ssltest.c | 523 char *server_key = NULL; local 705 server_key = *(++argv); 709 server_key = *(++argv); 969 (server_key ? server_key :
|
Completed in 61 milliseconds