/macosx-10.10/OpenSSH-189/openssh/ |
H A D | kexdhc.c | 54 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 127 if ((shared_secret = BN_new()) == NULL) 129 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 143 shared_secret, 162 kex_derive_keys(kex, hash, hashlen, shared_secret); 163 BN_clear_free(shared_secret);
|
H A D | kexdhs.c | 57 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 120 if ((shared_secret = BN_new()) == NULL) 122 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 138 shared_secret, 169 kex_derive_keys(kex, hash, hashlen, shared_secret); 170 BN_clear_free(shared_secret);
|
H A D | kexecdhc.c | 55 BIGNUM *shared_secret; local 121 if ((shared_secret = BN_new()) == NULL) 123 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 139 shared_secret, 158 kex_derive_keys(kex, hash, hashlen, shared_secret); 159 BN_clear_free(shared_secret);
|
H A D | kexecdhs.c | 57 BIGNUM *shared_secret; local 103 /* Calculate shared_secret */ 113 if ((shared_secret = BN_new()) == NULL) 115 if (BN_bin2bn(kbuf, klen, shared_secret) == NULL) 132 shared_secret, 163 kex_derive_keys(kex, hash, hashlen, shared_secret); 164 BN_clear_free(shared_secret);
|
H A D | kexgexc.c | 56 BIGNUM *dh_server_pub = NULL, *shared_secret = NULL; local 165 if ((shared_secret = BN_new()) == NULL) 167 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 187 shared_secret, 207 kex_derive_keys(kex, hash, hashlen, shared_secret); 208 BN_clear_free(shared_secret);
|
H A D | kexgexs.c | 60 BIGNUM *shared_secret = NULL, *dh_client_pub = NULL; local 157 if ((shared_secret = BN_new()) == NULL) 159 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 181 shared_secret, 213 kex_derive_keys(kex, hash, hashlen, shared_secret); 214 BN_clear_free(shared_secret);
|
H A D | kexdh.c | 53 BIGNUM *shared_secret, 76 buffer_put_bignum2(&b, shared_secret); 45 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgssc.c | 62 BIGNUM *shared_secret = NULL; local 261 shared_secret = BN_new(); 262 if (shared_secret == NULL) 265 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 281 shared_secret, /* K */ 297 shared_secret, 334 kex_derive_keys(kex, hash, hashlen, shared_secret); 335 BN_clear_free(shared_secret);
|
H A D | kexgsss.c | 74 BIGNUM *shared_secret = NULL; local 207 shared_secret = BN_new(); 208 if (shared_secret == NULL) 211 if (BN_bin2bn(kbuf, kout, shared_secret) == NULL) 225 dh_client_pub, dh->pub_key, shared_secret, 240 shared_secret, 284 kex_derive_keys(kex, hash, hashlen, shared_secret); 285 BN_clear_free(shared_secret);
|
H A D | kexecdh.c | 77 const BIGNUM *shared_secret, 99 buffer_put_bignum2(&b, shared_secret); 67 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 56 BIGNUM *shared_secret, 87 buffer_put_bignum2(&b, shared_secret); 46 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kex.c | 517 BIGNUM *shared_secret) 531 buffer_put_bignum2(&b, shared_secret); 567 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument 574 shared_secret); 516 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-51-state.c | 391 static uint8_t shared_secret[] = "secret"; variable 394 .data = shared_secret, 395 .length = sizeof(shared_secret), 411 require_noerr(SSLSetPSKSharedSecret(ctx, shared_secret, sizeof(shared_secret)), out);
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | remoteconf.h | 111 vchar_t *shared_secret; /* shared secret */ member in struct:remoteconf
|
H A D | remoteconf.c | 363 new->shared_secret = NULL; /* shared secret */ 444 if (rmconf->shared_secret) 445 vfree(rmconf->shared_secret);
|
H A D | oakley.c | 2532 if (iph1->rmconf->shared_secret) { 2537 secret = getpsk(iph1->rmconf->shared_secret->v, iph1->rmconf->shared_secret->l-1); 2542 secret = getpskfromkeychain(iph1->rmconf->shared_secret->v, iph1->etype, iph1->rmconf->secrettype, NULL); 2546 secret = getpskfromkeychain(iph1->rmconf->shared_secret->v, iph1->etype, iph1->rmconf->secrettype, iph1->id_p); 2552 /* rmconf->shared_secret is a string and contains a NULL character that must be removed */ 2553 secret = vmalloc(iph1->rmconf->shared_secret->l - 1); 2558 memcpy(secret->v, iph1->rmconf->shared_secret->v, secret->l);
|
H A D | cftoken.l | 323 <S_RMTS>shared_secret {
|
H A D | cfparse.y | 1605 cur_rmconf->shared_secret = $3;
|