/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | kexecdh.c | 98 struct sshbuf *server_blob = NULL; in kex_ecdh_enc() local 119 if ((server_blob = sshbuf_new()) == NULL) { in kex_ecdh_enc() 123 if ((r = sshbuf_put_ec(server_blob, pub_key, group)) != 0 || in kex_ecdh_enc() 124 (r = sshbuf_get_u32(server_blob, NULL)) != 0) in kex_ecdh_enc() 129 *server_blobp = server_blob; in kex_ecdh_enc() 130 server_blob = NULL; in kex_ecdh_enc() 133 sshbuf_free(server_blob); in kex_ecdh_enc() 200 kex_ecdh_dec(struct kex *kex, const struct sshbuf *server_blob, in kex_ecdh_dec() argument 205 r = kex_ecdh_dec_key_group(kex, server_blob, kex->ec_client_key, in kex_ecdh_dec() 234 kex_ecdh_dec(struct kex *kex, const struct sshbuf *server_blob, in kex_ecdh_dec() argument
|
H A D | kexc25519.c | 117 struct sshbuf *server_blob = NULL; in kex_c25519_enc() local 136 if ((server_blob = sshbuf_new()) == NULL) { in kex_c25519_enc() 140 if ((r = sshbuf_reserve(server_blob, CURVE25519_SIZE, &server_pub)) != 0) in kex_c25519_enc() 154 *server_blobp = server_blob; in kex_c25519_enc() 156 server_blob = NULL; in kex_c25519_enc() 160 sshbuf_free(server_blob); in kex_c25519_enc() 166 kex_c25519_dec(struct kex *kex, const struct sshbuf *server_blob, in kex_c25519_dec() argument 175 if (sshbuf_len(server_blob) != CURVE25519_SIZE) { in kex_c25519_dec() 179 server_pub = sshbuf_ptr(server_blob); in kex_c25519_dec()
|
H A D | kexsntrup761x25519.c | 77 struct sshbuf *server_blob = NULL; in kex_kem_sntrup761x25519_enc() local 113 if ((server_blob = sshbuf_new()) == NULL) { in kex_kem_sntrup761x25519_enc() 118 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) in kex_kem_sntrup761x25519_enc() 147 *server_blobp = server_blob; in kex_kem_sntrup761x25519_enc() 149 server_blob = NULL; in kex_kem_sntrup761x25519_enc() 154 sshbuf_free(server_blob); in kex_kem_sntrup761x25519_enc() 161 const struct sshbuf *server_blob, struct sshbuf **shared_secretp) in kex_kem_sntrup761x25519_dec() argument 173 if (sshbuf_len(server_blob) != need) { in kex_kem_sntrup761x25519_dec() 177 ciphertext = sshbuf_ptr(server_blob); in kex_kem_sntrup761x25519_dec() 247 const struct sshbuf *server_blob, struct sshbuf **shared_secretp) in kex_kem_sntrup761x25519_dec() argument
|
H A D | kexdh.c | 147 struct sshbuf *server_blob = NULL; in kex_dh_enc() local 156 if ((server_blob = sshbuf_new()) == NULL) { in kex_dh_enc() 160 if ((r = sshbuf_put_bignum2(server_blob, pub_key)) != 0 || in kex_dh_enc() 161 (r = sshbuf_get_u32(server_blob, NULL)) != 0) in kex_dh_enc() 165 *server_blobp = server_blob; in kex_dh_enc() 166 server_blob = NULL; in kex_dh_enc() 170 sshbuf_free(server_blob); in kex_dh_enc()
|
H A D | kexgen.c | 144 struct sshbuf *server_blob = NULL; in input_kex_gen_reply() local 169 if ((r = sshpkt_getb_froms(ssh, &server_blob)) != 0 || in input_kex_gen_reply() 182 r = kex_dh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 185 r = kex_ecdh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 189 r = kex_c25519_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 192 r = kex_kem_sntrup761x25519_dec(kex, server_blob, in input_kex_gen_reply() 212 server_blob, in input_kex_gen_reply() 232 sshbuf_free(server_blob); in input_kex_gen_reply()
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | kexc25519.c | 117 struct sshbuf *server_blob = NULL; in kex_c25519_enc() local 136 if ((server_blob = sshbuf_new()) == NULL) { in kex_c25519_enc() 140 if ((r = sshbuf_reserve(server_blob, CURVE25519_SIZE, &server_pub)) != 0) in kex_c25519_enc() 154 *server_blobp = server_blob; in kex_c25519_enc() 156 server_blob = NULL; in kex_c25519_enc() 160 sshbuf_free(server_blob); in kex_c25519_enc() 166 kex_c25519_dec(struct kex *kex, const struct sshbuf *server_blob, in kex_c25519_dec() argument 175 if (sshbuf_len(server_blob) != CURVE25519_SIZE) { in kex_c25519_dec() 179 server_pub = sshbuf_ptr(server_blob); in kex_c25519_dec()
|
H A D | kexecdh.c | 98 struct sshbuf *server_blob = NULL; in kex_ecdh_enc() local 119 if ((server_blob = sshbuf_new()) == NULL) { in kex_ecdh_enc() 123 if ((r = sshbuf_put_ec(server_blob, pub_key, group)) != 0 || in kex_ecdh_enc() 124 (r = sshbuf_get_u32(server_blob, NULL)) != 0) in kex_ecdh_enc() 129 *server_blobp = server_blob; in kex_ecdh_enc() 130 server_blob = NULL; in kex_ecdh_enc() 133 sshbuf_free(server_blob); in kex_ecdh_enc() 200 kex_ecdh_dec(struct kex *kex, const struct sshbuf *server_blob, in kex_ecdh_dec() argument 205 r = kex_ecdh_dec_key_group(kex, server_blob, kex->ec_client_key, in kex_ecdh_dec()
|
H A D | kexsntrup4591761x25519.c | 75 struct sshbuf *server_blob = NULL; in kex_kem_sntrup4591761x25519_enc() local 111 if ((server_blob = sshbuf_new()) == NULL) { in kex_kem_sntrup4591761x25519_enc() 116 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) in kex_kem_sntrup4591761x25519_enc() 145 *server_blobp = server_blob; in kex_kem_sntrup4591761x25519_enc() 147 server_blob = NULL; in kex_kem_sntrup4591761x25519_enc() 152 sshbuf_free(server_blob); in kex_kem_sntrup4591761x25519_enc() 159 const struct sshbuf *server_blob, struct sshbuf **shared_secretp) in kex_kem_sntrup4591761x25519_dec() argument 171 if (sshbuf_len(server_blob) != need) { in kex_kem_sntrup4591761x25519_dec() 175 ciphertext = sshbuf_ptr(server_blob); in kex_kem_sntrup4591761x25519_dec()
|
H A D | kexdh.c | 146 struct sshbuf *server_blob = NULL; in kex_dh_enc() local 155 if ((server_blob = sshbuf_new()) == NULL) { in kex_dh_enc() 159 if ((r = sshbuf_put_bignum2(server_blob, pub_key)) != 0 || in kex_dh_enc() 160 (r = sshbuf_get_u32(server_blob, NULL)) != 0) in kex_dh_enc() 164 *server_blobp = server_blob; in kex_dh_enc() 165 server_blob = NULL; in kex_dh_enc() 169 sshbuf_free(server_blob); in kex_dh_enc()
|
H A D | kexgen.c | 143 struct sshbuf *server_blob = NULL; in input_kex_gen_reply() local 165 if ((r = sshpkt_getb_froms(ssh, &server_blob)) != 0 || in input_kex_gen_reply() 178 r = kex_dh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 181 r = kex_ecdh_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 185 r = kex_c25519_dec(kex, server_blob, &shared_secret); in input_kex_gen_reply() 188 r = kex_kem_sntrup4591761x25519_dec(kex, server_blob, in input_kex_gen_reply() 208 server_blob, in input_kex_gen_reply() 228 sshbuf_free(server_blob); in input_kex_gen_reply()
|
/dports/www/squid/squid-4.15/src/auth/negotiate/ |
H A D | UserRequest.cc | 32 server_blob(nullptr), in UserRequest() 41 safe_free(server_blob); in ~UserRequest() 105 assert(server_blob); in module_direction() 202 if (server_blob) { in authenticate() 304 safe_free(lm_request->server_blob); in HandleReply() 308 lm_request->server_blob = xstrdup(tokenNote); in HandleReply() 331 safe_free(lm_request->server_blob); in HandleReply() 332 lm_request->server_blob = xstrdup(tokenNote); in HandleReply() 363 safe_free(lm_request->server_blob); in HandleReply() 365 lm_request->server_blob = xstrdup(tokenNote); in HandleReply() [all …]
|
H A D | Config.cc | 214 if (negotiate_request->server_blob) { in fixHeader() 215 … << "Sending type:" << reqType << " header: 'Negotiate " << negotiate_request->server_blob << "'"); in fixHeader() 216 … httpHeaderPutStrf(&rep->header, reqType, "Negotiate %s", negotiate_request->server_blob); in fixHeader() 217 safe_free(negotiate_request->server_blob); in fixHeader() 233 … << "Sending type:" << reqType << " header: 'Negotiate " << negotiate_request->server_blob << "'"); in fixHeader() 234 … httpHeaderPutStrf(&rep->header, reqType, "Negotiate %s", negotiate_request->server_blob); in fixHeader() 235 safe_free(negotiate_request->server_blob); in fixHeader()
|
H A D | UserRequest.h | 50 char *server_blob; variable
|
/dports/www/squid/squid-4.15/src/auth/ntlm/ |
H A D | UserRequest.cc | 31 server_blob(nullptr), in UserRequest() 40 safe_free(server_blob); in ~UserRequest() 104 assert(server_blob); in module_direction() 196 if (server_blob) { in authenticate() 197 debugs(29, 2, HERE << "need to challenge client '" << server_blob << "'!"); in authenticate() 299 safe_free(lm_request->server_blob); in HandleReply() 303 lm_request->server_blob = xstrdup(serverBlob); in HandleReply() 318 safe_free(lm_request->server_blob); in HandleReply() 325 safe_free(lm_request->server_blob); in HandleReply() 358 safe_free(lm_request->server_blob); in HandleReply() [all …]
|
H A D | Config.cc | 213 …9, 9, HERE << "Sending type:" << hdrType << " header: 'NTLM " << ntlm_request->server_blob << "'"); in fixHeader() 214 httpHeaderPutStrf(&rep->header, hdrType, "NTLM %s", ntlm_request->server_blob); in fixHeader() 215 safe_free(ntlm_request->server_blob); in fixHeader()
|
H A D | UserRequest.h | 46 char *server_blob; variable
|
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/ |
H A D | s2n_client_hello_retry_test.c | 364 struct s2n_blob server_blob; in main() local 365 EXPECT_SUCCESS(s2n_blob_init(&server_blob, server_digest_out, hash_digest_length)); in main() 392 S2N_BLOB_EXPECT_EQUAL(client_blob, server_blob); in main()
|
/dports/net/samba412/samba-4.12.15/source3/libads/ |
H A D | sasl.c | 129 const DATA_BLOB server_blob) in ads_sasl_spnego_gensec_bind() argument 157 if (server_blob.length == 0) { in ads_sasl_spnego_gensec_bind() 220 blob_in = data_blob_dup_talloc(talloc_tos(), server_blob); in ads_sasl_spnego_gensec_bind()
|