| /freebsd/crypto/openssh/ |
| H A D | kexecdh.c | 97 EC_KEY *server_key = NULL; in kex_ecdh_enc() local 104 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_enc() 108 if (EC_KEY_generate_key(server_key) != 1) { in kex_ecdh_enc() 112 group = EC_KEY_get0_group(server_key); in kex_ecdh_enc() 116 sshkey_dump_ec_key(server_key); in kex_ecdh_enc() 118 pub_key = EC_KEY_get0_public_key(server_key); in kex_ecdh_enc() 126 if ((r = kex_ecdh_dec_key_group(kex, client_blob, server_key, group, in kex_ecdh_enc() 132 EC_KEY_free(server_key); in kex_ecdh_enc()
|
| H A D | kexc25519.c | 121 u_char server_key[CURVE25519_SIZE]; in kex_c25519_enc() local 142 kexc25519_keygen(server_key, server_pub); in kex_c25519_enc() 148 if ((r = kexc25519_shared_key_ext(server_key, client_pub, buf, 0)) < 0) in kex_c25519_enc() 159 explicit_bzero(server_key, sizeof(server_key)); in kex_c25519_enc()
|
| H A D | kexsntrup761x25519.c | 85 u_char server_key[CURVE25519_SIZE]; in kex_kem_sntrup761x25519_enc() local 128 kexc25519_keygen(server_key, server_pub); in kex_kem_sntrup761x25519_enc() 131 if ((r = kexc25519_shared_key_ext(server_key, client_pub, buf, 1)) < 0) in kex_kem_sntrup761x25519_enc() 157 explicit_bzero(server_key, sizeof(server_key)); in kex_kem_sntrup761x25519_enc()
|
| H A D | kexmlkem768x25519.c | 100 u_char server_pub[CURVE25519_SIZE], server_key[CURVE25519_SIZE]; in kex_kem_mlkem768x25519_enc() local 147 kexc25519_keygen(server_key, server_pub); in kex_kem_mlkem768x25519_enc() 154 if ((r = kexc25519_shared_key_ext(server_key, client_pub, buf, 1)) < 0) in kex_kem_mlkem768x25519_enc() 182 explicit_bzero(server_key, sizeof(server_key)); in kex_kem_mlkem768x25519_enc()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | pac_sign.c | 212 krb5_const_principal principal, const krb5_keyblock *server_key, in sign_pac() argument 231 ret = insert_checksum(context, pac, KRB5_PAC_SERVER_CHECKSUM, server_key, in sign_pac() 263 server_key, server_cksumtype, &pac->data, in sign_pac() 288 krb5_const_principal principal, const krb5_keyblock *server_key, in krb5_pac_sign() argument 291 return sign_pac(context, pac, authtime, principal, server_key, in krb5_pac_sign() 298 const krb5_keyblock *server_key, in krb5_pac_sign_ext() argument 302 return sign_pac(context, pac, authtime, principal, server_key, privsvr_key, in krb5_pac_sign_ext()
|
| H A D | cammac_util.c | 38 const krb5_keyblock *server_key) in check_svcver() argument 52 ret = krb5_c_verify_checksum(context, server_key, KRB5_KEYUSAGE_CAMMAC, in check_svcver()
|
| H A D | t_pac.c | 506 const krb5_keyblock *server_key, const krb5_keyblock *kdc_key) in check_pac() argument 521 ret = krb5_pac_verify_ext(context, pac, auth_time, p, server_key, kdc_key, in check_pac() 526 ret = krb5_pac_sign_ext(context, pac, auth_time, p, server_key, in check_pac() 538 ret = krb5_pac_verify_ext(context, pac, auth_time, p, server_key, kdc_key, in check_pac() 584 ret = krb5_pac_sign_ext(context, pac2, auth_time, p, server_key, in check_pac() 595 ret = krb5_pac_verify_ext(context, pac2, auth_time, p, server_key, in check_pac()
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_authdata.c | 302 krb5_keyblock *server_key, krb5_db_entry *krbtgt, in add_auth_indicators() argument 324 ret = cammac_create(context, enc_tkt_reply, server_key, krbtgt, krbtgt_key, in add_auth_indicators() 465 krb5_keyblock *server_key, krb5_keyblock *subject_key, in handle_pac() argument 492 return add_auth_indicators(context, *auth_indicators, server_key, in handle_pac() 517 ret = add_auth_indicators(context, *auth_indicators, server_key, in handle_pac() 563 pac_client, server_key, privsvr_key, in handle_pac() 580 krb5_keyblock *client_key, krb5_keyblock *server_key, in handle_authdata() argument 607 subject_server, client_key, server_key, in handle_authdata() 624 local_tgt_key, server_key, subject_key, in handle_authdata()
|
| H A D | cammac.c | 57 krb5_keyblock *server_key, krb5_db_entry *tgt, in cammac_create() argument 91 ret = krb5_c_make_checksum(context, 0, server_key, KRB5_KEYUSAGE_CAMMAC, in cammac_create()
|
| H A D | kdc_util.c | 422 krb5_key_data * server_key; in find_server_key() local 427 kvno ? (krb5_int32)kvno : -1, &server_key); in find_server_key() 430 if (!server_key) in find_server_key() 434 retval = krb5_dbe_decrypt_key_data(context, NULL, server_key, in find_server_key() 453 *kvno_out = server_key->key_data_kvno; in find_server_key() 568 krb5_db_entry *server, krb5_keyblock *server_key, in try_verify_pac() argument 577 ret = krb5_kdc_verify_ticket(context, enc_tkt, server->princ, server_key, in try_verify_pac() 591 krb5_db_entry *server, krb5_keyblock *server_key, in get_verified_pac() argument 605 server_key, NULL, pac_out); in get_verified_pac() 608 ret = try_verify_pac(context, enc_tkt, server, server_key, tgt_key, in get_verified_pac() [all …]
|
| H A D | kdc_util.h | 139 krb5_keyblock *server_key, krb5_db_entry *tgt, 237 krb5_keyblock *client_key, krb5_keyblock *server_key, 261 krb5_db_entry *server, krb5_keyblock *server_key,
|
| H A D | do_tgs_req.c | 965 krb5_keyblock session_key = { 0 }, server_key = { 0 }; in tgs_issue_ticket() local 1004 ret = get_first_current_key(context, t->server, &server_key); in tgs_issue_ticket() 1009 ticket_encrypting_key = &server_key; in tgs_issue_ticket() 1136 krb5_free_keyblock_contents(context, &server_key); in tgs_issue_ticket()
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_sslkeylogfile.t | 33 my $server_key = srctop_file("test", "certs", "serverkey.pem"); 41 "-cert", $server_pem, "-key", $server_key);
|
| /freebsd/crypto/openssl/test/ |
| H A D | cmp_protect_test.c | 73 static EVP_PKEY *server_key = NULL; variable 242 || !TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, server_key)) in test_MSG_protect_with_certificate_and_key() 261 || !TEST_true(EVP_PKEY_up_ref(server_key)) in test_MSG_protect_certificate_based_without_cert() 262 || !TEST_true(OSSL_CMP_CTX_set0_newPkey(ctx, 1, server_key))) { in test_MSG_protect_certificate_based_without_cert() 526 EVP_PKEY_free(server_key); in cleanup_tests() 581 if (!TEST_ptr(server_key = load_pkey_pem(server_key_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
| H A D | cmp_client_test.c | 34 static EVP_PKEY *server_key = NULL; variable 69 || !OSSL_CMP_CTX_set1_pkey(srv_cmp_ctx, server_key)) in set_up() 278 EVP_PKEY *key = raverified /* wrong key */ ? server_key : client_key; in test_exec_KUR_ses() 514 EVP_PKEY_free(server_key); in cleanup_tests() 545 if (!TEST_ptr(server_key = load_pkey_pem(server_key_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | kdcauthdata_plugin.h | 112 krb5_keyblock *server_key,
|
| H A D | krb5.hin | 8366 krb5_const_principal principal, const krb5_keyblock *server_key, 8373 const krb5_keyblock *server_key,
|
| /freebsd/contrib/unbound/dnstap/ |
| H A D | unbound-dnstap-socket.c | 332 void (*ev_cb)(int, short, void*), void* data, char* server_key, in tap_socket_new_tlsaccept() argument 349 s->sslctx = listen_sslctx_create(server_key, server_cert, verifypem, in tap_socket_new_tlsaccept() 1263 struct config_strlist_head* tls_list, char* server_key, in setup_tls_list() 1270 maindata, server_key, server_cert, verifypem); in setup_tls_list() 1302 struct config_strlist_head* tls_list, char* server_key, in setup_and_run() 1328 setup_tls_list(maindata, tls_list, server_key, server_cert, in setup_and_run() 1464 char* server_key = NULL, *server_cert = NULL, *verifypem = NULL; in main() 1520 server_key = optarg; in main() 1573 setup_and_run(&local_list, &tcp_list, &tls_list, server_key, in main() 1262 setup_tls_list(struct main_tap_data * maindata,struct config_strlist_head * tls_list,char * server_key,char * server_cert,char * verifypem) setup_tls_list() argument 1301 setup_and_run(struct config_strlist_head * local_list,struct config_strlist_head * tcp_list,struct config_strlist_head * tls_list,char * server_key,char * server_cert,char * verifypem) setup_and_run() argument 1463 char* server_key = NULL, *server_cert = NULL, *verifypem = NULL; main() local
|
| /freebsd/crypto/krb5/src/plugins/authdata/greet_server/ |
| H A D | greet_auth.c | 102 krb5_keyblock *server_key, in greet_authdata() argument
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_srv.c | 744 unsigned char *dh_pubkey = NULL, *server_key = NULL; in pkinit_server_return_padata() local 816 &server_key, &server_key_len); in pkinit_server_return_padata() 879 secret = make_data(server_key, server_key_len); in pkinit_server_return_padata() 913 free(server_key); in pkinit_server_return_padata()
|
| H A D | pkinit_crypto_openssl.c | 3059 unsigned char *dh_pubkey = NULL, *server_key = NULL; in server_process_dh() local 3070 if (!dh_result(server_pkey, cryptoctx->client_pkey, &server_key, in server_process_dh() 3079 *server_key_out = server_key; in server_process_dh() 3081 dh_pubkey = server_key = NULL; in server_process_dh() 3088 free(server_key); in server_process_dh()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | pac.c | 1037 const krb5_keyblock *server_key, in _krb5_pac_sign() argument 1102 ret = pac_checksum(context, server_key, &server_cksumtype, &server_size); in _krb5_pac_sign() 1237 ret = create_checksum(context, server_key, server_cksumtype, in _krb5_pac_sign()
|