/macosx-10.10/OpenSSH-189/openssh/ |
H A D | kexecdhs.c | 55 EC_KEY *server_key; local 66 if ((server_key = EC_KEY_new_by_curve_name(curve_nid)) == NULL) 68 if (EC_KEY_generate_key(server_key) != 1) 70 group = EC_KEY_get0_group(server_key); 74 key_dump_ec_key(server_key); 107 server_key, NULL) != (int)klen) 131 EC_KEY_get0_public_key(server_key), 154 packet_put_ecpoint(group, EC_KEY_get0_public_key(server_key)); 161 EC_KEY_free(server_key);
|
H A D | sshconnect1.c | 494 Key *host_key, *server_key; local 513 server_key = key_new(KEY_RSA1); 515 packet_get_bignum(server_key->rsa->e); 516 packet_get_bignum(server_key->rsa->n); 518 rbits = BN_num_bits(server_key->rsa->n); 546 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); 553 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id); 596 if (BN_cmp(server_key->rsa->n, host_key->rsa->n) < 0) { 599 BN_num_bits(server_key->rsa->n) + SSH_KEY_BITS_RESERVED) { 600 fatal("respond_to_rsa_challenge: host_key %d < server_key [all...] |
H A D | sshd.c | 217 Key *server_key; /* ephemeral server key */ member in struct:__anon3230 397 sensitive_data.server_key ? "new " : "", options.server_key_bits); 398 if (sensitive_data.server_key != NULL) 399 key_free(sensitive_data.server_key); 400 sensitive_data.server_key = key_generate(KEY_RSA1, 564 if (sensitive_data.server_key) { 565 key_free(sensitive_data.server_key); 566 sensitive_data.server_key = NULL; 589 if (sensitive_data.server_key) { 590 tmp = key_demote(sensitive_data.server_key); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | heimscram-protos.h | 75 heim_scram_data *server_key); 88 const heim_scram_data *server_key,
|
H A D | test_scram.c | 219 heim_scram_data client_key, client_key2, stored_key, server_key, clientSig; local 226 &client_key, &stored_key, &server_key); 231 ret = heim_scram_generate(method, &stored_key, &server_key, 233 heim_scram_data_free(&server_key);
|
H A D | scram.c | 558 const heim_scram_data *server_key, 575 ret = scram_authmessage_signature(method, server_key, 658 heim_scram_data client, stored, server_key; local 667 &client, &stored, &server_key); 671 ret = heim_scram_generate(method, &stored, &server_key, 695 heim_scram_data_free(&server_key); 1030 heim_scram_data *server_key) 1038 scram_data_zero(server_key); 1058 if (server_key) { 1059 scram_data_alloc(server_key, lengt 556 heim_scram_generate(heim_scram_method method, const heim_scram_data *stored_key, const heim_scram_data *server_key, const heim_scram_data *c1, const heim_scram_data *s1, const heim_scram_data *c2noproof, heim_scram_data *clientSig, heim_scram_data *serverSig) argument 1024 heim_scram_stored_key(heim_scram_method method, const char *password, unsigned int iterations, heim_scram_data *salt, heim_scram_data *client_key, heim_scram_data *stored_key, heim_scram_data *server_key) argument [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPClientModule.c | 58 EAPClientPluginFuncSessionKey * server_key; member in struct:__anon8585 213 info->server_key = (EAPClientPluginFuncServerKey *) 347 EAPClientPluginFuncServerKey * server_key; local 349 server_key = module->info->server_key; 350 if (server_key == NULL) { 353 return (*server_key)(plugin, key_length);
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ |
H A D | test_gssscram.c | 96 heim_scram_data client_key, client_key2, stored_key, server_key, clientSig; local 103 &client_key, &stored_key, &server_key); 107 ret = heim_scram_generate(method, &stored_key, &server_key, 109 heim_scram_data_free(&server_key);
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | pac.c | 937 const krb5_keyblock *server_key, 956 if (server_key != NULL && p->server_checksum == NULL) 975 if (server_key != NULL && p->server_checksum == NULL) { 995 if (server_key != NULL) { 996 ret = pac_checksum(context, server_key, &server_cksumtype, &server_size); 1103 if (server_key != NULL) { 1104 ret = create_checksum(context, server_key, server_cksumtype, 933 _krb5_pac_sign(krb5_context context, krb5_pac p, time_t authtime, krb5_principal principal, const krb5_keyblock *server_key, const krb5_keyblock *priv_key, krb5_data *data) argument
|
H A D | krb5-private.h | 617 const krb5_keyblock *server_key,
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | ssltest.c | 402 char *server_key=NULL; local 548 server_key= *(++argv); 553 server_key= *(++argv); 825 (server_key?server_key:server_cert), SSL_FILETYPE_PEM))
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | ssltest.c | 402 char *server_key=NULL; local 548 server_key= *(++argv); 553 server_key= *(++argv); 825 (server_key?server_key:server_cert), SSL_FILETYPE_PEM))
|
/macosx-10.10/Heimdal-398.1.2/kcm/ |
H A D | protocol.c | 2431 heim_scram_data proof, server, client_key, stored, server_key, session_key; local 2447 memset(&server_key, 0, sizeof(server_key)); 2487 &client_key, &stored, &server_key); 2491 ret = heim_scram_generate(method, &stored, &server_key, 2536 heim_scram_data_free(&server_key);
|
/macosx-10.10/eap8021x-198/eapolclient.tproj/ |
H A D | Supplicant.c | 896 char * server_key, int server_key_length, 910 server_key, server_key_length, 934 char * server_key; local 946 server_key = eap_client_server_key(supp, &server_key_length); 947 if (server_key == NULL) { 957 server_key, server_key_length, 895 eapol_key_verify_signature(EAPOLPacketRef packet, int packet_length, char * server_key, int server_key_length, CFMutableStringRef debug_str) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-od.c | 1796 CFStringRef client_key, server_key; local 1806 server_key = CFSTR("dsAttrTypeNative:draft-krbPrincipalAliases"); 1818 server_key,
|