/dports/net-im/prosody/prosody-0.11.13/plugins/ |
H A D | mod_auth_internal_hashed.lua | 58 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, credentials.salt, cr… 61 local server_key_hex = to_hex(server_key); 76 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, account.salt, accoun… 81 local server_key_hex = to_hex(server_key); 84 account.server_key = server_key_hex 110 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, salt, default_iterat… 115 local server_key_hex = to_hex(server_key); 117 stored_key = stored_key_hex, server_key = server_key_hex, 142 local stored_key, server_key = credentials.stored_key, credentials.server_key; 145 server_key = server_key and from_hex(server_key); [all …]
|
/dports/databases/pecl-memcached/php-memcached-058e9f5/ |
H A D | php_memcached.stub.php | 19 public function getMultiByKey(string $server_key, array $keys, int $get_flags=0): false|array {} argument 26 public function setByKey(string $server_key, string $key, mixed $value, int $expiration=0): bool {} argument 29 public function touchByKey(string $server_key, string $key, int $expiration=0): bool {} argument 32 public function setMultiByKey(string $server_key, array $items, int $expiration=0): bool {} argument 37 public function addByKey(string $server_key, string $key, mixed $value, int $expiration=0): bool {} argument 39 public function appendByKey(string $server_key, string $key, string $value): ?bool {} argument 41 public function prependByKey(string $server_key, string $key, string $value): ?bool {} argument 43 …public function replaceByKey(string $server_key, string $key, mixed $value, int $expiration=0): bo… argument 46 public function deleteByKey(string $server_key, string $key, int $time=0): bool {} argument 47 public function deleteMultiByKey(string $server_key, array $keys, int $time=0): array {} argument [all …]
|
H A D | memcached-api.php | 266 public function getByKey( $server_key, $key, callable $cache_cb = null, $flags = 0 ) {} argument 270 public function getMultiByKey( $server_key, array $keys, $flags = 0) {} argument 286 public function setByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument 290 public function setMultiByKey( $server_key, array $items, $expiration = 0, $udf_flags = 0 ) {} argument 298 public function addByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument 302 public function appendByKey( $server_key, $key, $value ) {} argument 306 public function prependByKey( $server_key, $key, $value ) {} argument 310 public function replaceByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument 314 public function deleteByKey( $server_key, $key, $time = 0 ) {} argument 318 public function deleteMultiByKey( $server_key, array $keys, $expiration = 0 ) {} argument [all …]
|
/dports/mail/horde-imp/imp-6.2.27/lib/ |
H A D | Auth.php | 171 $server_key = null; 173 if (is_null($server_key) && (substr($key, 0, 1) != '_')) { 174 $server_key = $key; 188 return $server_key; 194 * @param string $server_key The server to check. Defaults to the 202 static protected function _canAutoLogin($server_key = null, $force = false) argument 210 if (is_null($server_key) || !$force) { 212 if (is_null($server_key)) { 213 $server_key = $auto_server; 219 !empty($servers[$server_key]->hordeauth)) { [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | kexecdhs.c | 50 EC_KEY *server_key; in kexecdh_server() local 58 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) in kexecdh_server() 60 if (EC_KEY_generate_key(server_key) != 1) in kexecdh_server() 62 group = EC_KEY_get0_group(server_key); in kexecdh_server() 66 key_dump_ec_key(server_key); in kexecdh_server() 96 server_key, NULL) != (int)klen) in kexecdh_server() 120 EC_KEY_get0_public_key(server_key), in kexecdh_server() 142 packet_put_ecpoint(group, EC_KEY_get0_public_key(server_key)); in kexecdh_server() 149 EC_KEY_free(server_key); in kexecdh_server()
|
H A D | sshconnect1.c | 486 Key *host_key, *server_key; in ssh_kex() local 505 server_key = key_new(KEY_RSA1); in ssh_kex() 507 packet_get_bignum(server_key->rsa->e); in ssh_kex() 508 packet_get_bignum(server_key->rsa->n); in ssh_kex() 510 rbits = BN_num_bits(server_key->rsa->n); in ssh_kex() 592 BN_num_bits(server_key->rsa->n), in ssh_kex() 595 rsa_public_encrypt(key, key, server_key->rsa); in ssh_kex() 599 if (BN_num_bits(server_key->rsa->n) < in ssh_kex() 603 BN_num_bits(server_key->rsa->n), in ssh_kex() 608 rsa_public_encrypt(key, key, server_key->rsa); in ssh_kex() [all …]
|
H A D | sshd.c | 394 if (sensitive_data.server_key != NULL) in generate_ephemeral_server_key() 395 key_free(sensitive_data.server_key); in generate_ephemeral_server_key() 567 if (sensitive_data.server_key) { in destroy_sensitive_data() 568 key_free(sensitive_data.server_key); in destroy_sensitive_data() 569 sensitive_data.server_key = NULL; in destroy_sensitive_data() 592 if (sensitive_data.server_key) { in demote_sensitive_data() 594 key_free(sensitive_data.server_key); in demote_sensitive_data() 595 sensitive_data.server_key = tmp; in demote_sensitive_data() 1021 key_free(sensitive_data.server_key); 1030 sensitive_data.server_key->rsa); [all …]
|
H A D | kexc25519s.c | 47 u_char server_key[CURVE25519_SIZE]; in kexc25519_server() local 55 kexc25519_keygen(server_key, server_pubkey); in kexc25519_server() 57 dump_digest("server private key:", server_key, sizeof(server_key)); in kexc25519_server() 80 kexc25519_shared_key(server_key, client_pubkey, &shared_secret); in kexc25519_server()
|
/dports/security/wolfssl/wolfssl-5.1.0/scripts/ |
H A D | trusted_peer.test | 34 server_key=`pwd`/certs/server-key.pem 99 server_key=`pwd`/certs/ecc-key.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re… 244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p… [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 34 server_key=`pwd`/certs/server-key.pem 99 server_key=`pwd`/certs/ecc-key.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re… 244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p… [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 34 server_key=`pwd`/certs/server-key.pem 99 server_key=`pwd`/certs/ecc-key.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re… 244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p… [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 34 server_key=`pwd`/certs/server-key.pem 99 server_key=`pwd`/certs/ecc-key.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re… 244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p… [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 34 server_key=`pwd`/certs/server-key.pem 99 server_key=`pwd`/certs/ecc-key.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port & 227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re… 244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p… [all …]
|
/dports/databases/p5-Memcached-libmemcached/Memcached-libmemcached-1.001801/src/libmemcached/libmemcached/ |
H A D | delete.cc | 69 uint32_t server_key, in binary_delete() argument 114 ++server_key; in binary_delete() 116 if (server_key == memcached_server_count(instance->root)) in binary_delete() 118 server_key= 0; in binary_delete() 121 memcached_instance_st* replica= memcached_instance_fetch(instance->root, server_key); in binary_delete() 163 …uint32_t server_key= memcached_generate_hash_with_redistribution(memc, group_key, group_key_length… in memcached_delete_by_key() local 164 memcached_instance_st* instance= memcached_instance_fetch(memc, server_key); in memcached_delete_by_key() 187 rc= binary_delete(instance, server_key, key, key_length, is_replying, is_buffering); in memcached_delete_by_key() 191 rc= ascii_delete(instance, server_key, key, key_length, is_replying, is_buffering); in memcached_delete_by_key()
|
/dports/databases/libmemcached/libmemcached-1.0.18/libmemcached/ |
H A D | delete.cc | 69 uint32_t server_key, 114 ++server_key; 116 if (server_key == memcached_server_count(instance->root)) 118 server_key= 0; 121 memcached_instance_st* replica= memcached_instance_fetch(instance->root, server_key); 163 …uint32_t server_key= memcached_generate_hash_with_redistribution(memc, group_key, group_key_length… 164 memcached_instance_st* instance= memcached_instance_fetch(memc, server_key); 187 rc= binary_delete(instance, server_key, key, key_length, is_replying, is_buffering); 191 rc= ascii_delete(instance, server_key, key, key_length, is_replying, is_buffering);
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/rust/protocol/tests/ |
H A D | sealed_sender.rs | 19 let server_key = KeyPair::generate(&mut rng); in test_server_cert() localVariable 62 let server_key = KeyPair::generate(&mut rng); in test_revoked_server_cert() localVariable 68 server_key.public_key, in test_revoked_server_cert() 86 let server_key = KeyPair::generate(&mut rng); in test_sender_cert() localVariable 102 &server_key.private_key, in test_sender_cert() 185 &server_key.private_key, in test_sealed_sender() 355 &server_key.private_key, in test_sender_key_in_sealed_sender() 478 &server_key.private_key, in test_sealed_sender_multi_recipient() 711 &server_key.private_key, in test_sealed_sender_multi_recipient_encrypt_with_archived_session() 817 &server_key.private_key, in test_sealed_sender_multi_recipient_encrypt_with_bad_registration_id() [all …]
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | kexecdh.c | 97 EC_KEY *server_key = NULL; in kex_ecdh_enc() local 104 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_enc() 108 if (EC_KEY_generate_key(server_key) != 1) { in kex_ecdh_enc() 112 group = EC_KEY_get0_group(server_key); in kex_ecdh_enc() 116 sshkey_dump_ec_key(server_key); in kex_ecdh_enc() 118 pub_key = EC_KEY_get0_public_key(server_key); in kex_ecdh_enc() 126 if ((r = kex_ecdh_dec_key_group(kex, client_blob, server_key, group, in kex_ecdh_enc() 132 EC_KEY_free(server_key); in kex_ecdh_enc()
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | kexecdh.c | 97 EC_KEY *server_key = NULL; in kex_ecdh_enc() local 104 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_enc() 108 if (EC_KEY_generate_key(server_key) != 1) { in kex_ecdh_enc() 112 group = EC_KEY_get0_group(server_key); in kex_ecdh_enc() 116 sshkey_dump_ec_key(server_key); in kex_ecdh_enc() 118 pub_key = EC_KEY_get0_public_key(server_key); in kex_ecdh_enc() 126 if ((r = kex_ecdh_dec_key_group(kex, client_blob, server_key, group, in kex_ecdh_enc() 132 EC_KEY_free(server_key); in kex_ecdh_enc()
|
/dports/net-im/prosody/prosody-0.11.13/util/sasl/ |
H A D | scram.lua | 115 local server_key = hmac_sha1(salted_password, "Server Key"); 116 return true, stored_key, server_key 168 local stored_key, server_key, salt, iteration_count; 184 succ, stored_key, server_key = getAuthenticationDatabaseSHA1(password, salt, iteration_count); 191 …stored_key, server_key, iteration_count, salt, status = self.profile[profile_name](self, username,… 204 server_key = server_key; 235 local ServerKey = state.server_key;
|
/dports/mail/dovecot/dovecot-2.3.17/src/auth/ |
H A D | password-scheme-scram.c | 114 unsigned char server_key[hmethod->digest_size]; in scram_verify() local 119 stored_key, server_key, error_r) < 0) in scram_verify() 154 unsigned char server_key[hmethod->digest_size]; in scram_generate() local 181 hmac_final(&ctx, server_key); in scram_generate() 183 base64_encode(server_key, sizeof(server_key), str); in scram_generate() 187 safe_memset(server_key, 0, sizeof(server_key)); in scram_generate()
|
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | tls_crypt.c | 350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key() 363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key() 404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument 450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key() 472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key() 474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key() 476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key() 644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local 683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file() 727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/ |
H A D | tls_crypt.c | 350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key() 363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key() 404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument 450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key() 472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key() 474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key() 476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key() 644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local 683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file() 727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | tls_crypt.c | 350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key() 363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key() 404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument 450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key() 472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key() 474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key() 476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key() 644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local 683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file() 727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/net-im/pidgin-sipe/pidgin-sipe-1.24.0/src/core/ |
H A D | sip-sec-tls-dsk.c | 54 guchar *server_key; member 84 state->client_key && state->server_key) { in sip_sec_init_sec_context__tls_dsk() 93 ctx->server_key = g_memdup(state->server_key, in sip_sec_init_sec_context__tls_dsk() 167 sipe_digest_hmac_md5(ctx->server_key, ctx->key_length, in sip_sec_verify_signature__tls_dsk() 175 sipe_digest_hmac_sha1(ctx->server_key, ctx->key_length, in sip_sec_verify_signature__tls_dsk() 200 g_free(ctx->server_key); in sip_sec_destroy_sec_context__tls_dsk()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/grpc/src/src/ruby/spec/ |
H A D | server_credentials_spec.rb | 55 root_cert, server_key, _ = load_test_certs 58 [{ server_key: server_key, cert_chain: nil }], 68 [{ server_key: nil, cert_chain: cert_chain }])
|