Home
last modified time | relevance | path

Searched refs:server_key (Results 1 – 25 of 1005) sorted by relevance

12345678910>>...41

/dports/net-im/prosody/prosody-0.11.13/plugins/
H A Dmod_auth_internal_hashed.lua58 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, credentials.salt, cr…
61 local server_key_hex = to_hex(server_key);
76 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, account.salt, accoun…
81 local server_key_hex = to_hex(server_key);
84 account.server_key = server_key_hex
110 …local valid, stored_key, server_key = getAuthenticationDatabaseSHA1(password, salt, default_iterat…
115 local server_key_hex = to_hex(server_key);
117 stored_key = stored_key_hex, server_key = server_key_hex,
142 local stored_key, server_key = credentials.stored_key, credentials.server_key;
145 server_key = server_key and from_hex(server_key);
[all …]
/dports/databases/pecl-memcached/php-memcached-058e9f5/
H A Dphp_memcached.stub.php19 public function getMultiByKey(string $server_key, array $keys, int $get_flags=0): false|array {} argument
26 public function setByKey(string $server_key, string $key, mixed $value, int $expiration=0): bool {} argument
29 public function touchByKey(string $server_key, string $key, int $expiration=0): bool {} argument
32 public function setMultiByKey(string $server_key, array $items, int $expiration=0): bool {} argument
37 public function addByKey(string $server_key, string $key, mixed $value, int $expiration=0): bool {} argument
39 public function appendByKey(string $server_key, string $key, string $value): ?bool {} argument
41 public function prependByKey(string $server_key, string $key, string $value): ?bool {} argument
43 …public function replaceByKey(string $server_key, string $key, mixed $value, int $expiration=0): bo… argument
46 public function deleteByKey(string $server_key, string $key, int $time=0): bool {} argument
47 public function deleteMultiByKey(string $server_key, array $keys, int $time=0): array {} argument
[all …]
H A Dmemcached-api.php266 public function getByKey( $server_key, $key, callable $cache_cb = null, $flags = 0 ) {} argument
270 public function getMultiByKey( $server_key, array $keys, $flags = 0) {} argument
286 public function setByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument
290 public function setMultiByKey( $server_key, array $items, $expiration = 0, $udf_flags = 0 ) {} argument
298 public function addByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument
302 public function appendByKey( $server_key, $key, $value ) {} argument
306 public function prependByKey( $server_key, $key, $value ) {} argument
310 public function replaceByKey( $server_key, $key, $value, $expiration = 0, $udf_flags = 0 ) {} argument
314 public function deleteByKey( $server_key, $key, $time = 0 ) {} argument
318 public function deleteMultiByKey( $server_key, array $keys, $expiration = 0 ) {} argument
[all …]
/dports/mail/horde-imp/imp-6.2.27/lib/
H A DAuth.php171 $server_key = null;
173 if (is_null($server_key) && (substr($key, 0, 1) != '_')) {
174 $server_key = $key;
188 return $server_key;
194 * @param string $server_key The server to check. Defaults to the
202 static protected function _canAutoLogin($server_key = null, $force = false) argument
210 if (is_null($server_key) || !$force) {
212 if (is_null($server_key)) {
213 $server_key = $auto_server;
219 !empty($servers[$server_key]->hordeauth)) {
[all …]
/dports/security/gnome-ssh-askpass/openssh-6.6p1/
H A Dkexecdhs.c50 EC_KEY *server_key; in kexecdh_server() local
58 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) in kexecdh_server()
60 if (EC_KEY_generate_key(server_key) != 1) in kexecdh_server()
62 group = EC_KEY_get0_group(server_key); in kexecdh_server()
66 key_dump_ec_key(server_key); in kexecdh_server()
96 server_key, NULL) != (int)klen) in kexecdh_server()
120 EC_KEY_get0_public_key(server_key), in kexecdh_server()
142 packet_put_ecpoint(group, EC_KEY_get0_public_key(server_key)); in kexecdh_server()
149 EC_KEY_free(server_key); in kexecdh_server()
H A Dsshconnect1.c486 Key *host_key, *server_key; in ssh_kex() local
505 server_key = key_new(KEY_RSA1); in ssh_kex()
507 packet_get_bignum(server_key->rsa->e); in ssh_kex()
508 packet_get_bignum(server_key->rsa->n); in ssh_kex()
510 rbits = BN_num_bits(server_key->rsa->n); in ssh_kex()
592 BN_num_bits(server_key->rsa->n), in ssh_kex()
595 rsa_public_encrypt(key, key, server_key->rsa); in ssh_kex()
599 if (BN_num_bits(server_key->rsa->n) < in ssh_kex()
603 BN_num_bits(server_key->rsa->n), in ssh_kex()
608 rsa_public_encrypt(key, key, server_key->rsa); in ssh_kex()
[all …]
H A Dsshd.c394 if (sensitive_data.server_key != NULL) in generate_ephemeral_server_key()
395 key_free(sensitive_data.server_key); in generate_ephemeral_server_key()
567 if (sensitive_data.server_key) { in destroy_sensitive_data()
568 key_free(sensitive_data.server_key); in destroy_sensitive_data()
569 sensitive_data.server_key = NULL; in destroy_sensitive_data()
592 if (sensitive_data.server_key) { in demote_sensitive_data()
594 key_free(sensitive_data.server_key); in demote_sensitive_data()
595 sensitive_data.server_key = tmp; in demote_sensitive_data()
1021 key_free(sensitive_data.server_key);
1030 sensitive_data.server_key->rsa);
[all …]
H A Dkexc25519s.c47 u_char server_key[CURVE25519_SIZE]; in kexc25519_server() local
55 kexc25519_keygen(server_key, server_pubkey); in kexc25519_server()
57 dump_digest("server private key:", server_key, sizeof(server_key)); in kexc25519_server()
80 kexc25519_shared_key(server_key, client_pubkey, &shared_secret); in kexc25519_server()
/dports/security/wolfssl/wolfssl-5.1.0/scripts/
H A Dtrusted_peer.test34 server_key=`pwd`/certs/server-key.pem
99 server_key=`pwd`/certs/ecc-key.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re…
244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p…
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test34 server_key=`pwd`/certs/server-key.pem
99 server_key=`pwd`/certs/ecc-key.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re…
244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p…
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test34 server_key=`pwd`/certs/server-key.pem
99 server_key=`pwd`/certs/ecc-key.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re…
244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p…
[all …]
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test34 server_key=`pwd`/certs/server-key.pem
99 server_key=`pwd`/certs/ecc-key.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re…
244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p…
[all …]
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test34 server_key=`pwd`/certs/server-key.pem
99 server_key=`pwd`/certs/ecc-key.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
173 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
190 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
209 ./examples/server/server -c "$server_cert" -k "$server_key" -R "$ready_file" -p $port &
227 ./examples/server/server -A "$wrong_ca" -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$re…
244 ./examples/server/server -E "$wrong_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $p…
[all …]
/dports/databases/p5-Memcached-libmemcached/Memcached-libmemcached-1.001801/src/libmemcached/libmemcached/
H A Ddelete.cc69 uint32_t server_key, in binary_delete() argument
114 ++server_key; in binary_delete()
116 if (server_key == memcached_server_count(instance->root)) in binary_delete()
118 server_key= 0; in binary_delete()
121 memcached_instance_st* replica= memcached_instance_fetch(instance->root, server_key); in binary_delete()
163 …uint32_t server_key= memcached_generate_hash_with_redistribution(memc, group_key, group_key_length… in memcached_delete_by_key() local
164 memcached_instance_st* instance= memcached_instance_fetch(memc, server_key); in memcached_delete_by_key()
187 rc= binary_delete(instance, server_key, key, key_length, is_replying, is_buffering); in memcached_delete_by_key()
191 rc= ascii_delete(instance, server_key, key, key_length, is_replying, is_buffering); in memcached_delete_by_key()
/dports/databases/libmemcached/libmemcached-1.0.18/libmemcached/
H A Ddelete.cc69 uint32_t server_key,
114 ++server_key;
116 if (server_key == memcached_server_count(instance->root))
118 server_key= 0;
121 memcached_instance_st* replica= memcached_instance_fetch(instance->root, server_key);
163 …uint32_t server_key= memcached_generate_hash_with_redistribution(memc, group_key, group_key_length…
164 memcached_instance_st* instance= memcached_instance_fetch(memc, server_key);
187 rc= binary_delete(instance, server_key, key, key_length, is_replying, is_buffering);
191 rc= ascii_delete(instance, server_key, key, key_length, is_replying, is_buffering);
/dports/net-im/libsignal-client/libsignal-client-0.9.6/rust/protocol/tests/
H A Dsealed_sender.rs19 let server_key = KeyPair::generate(&mut rng); in test_server_cert() localVariable
62 let server_key = KeyPair::generate(&mut rng); in test_revoked_server_cert() localVariable
68 server_key.public_key, in test_revoked_server_cert()
86 let server_key = KeyPair::generate(&mut rng); in test_sender_cert() localVariable
102 &server_key.private_key, in test_sender_cert()
185 &server_key.private_key, in test_sealed_sender()
355 &server_key.private_key, in test_sender_key_in_sealed_sender()
478 &server_key.private_key, in test_sealed_sender_multi_recipient()
711 &server_key.private_key, in test_sealed_sender_multi_recipient_encrypt_with_archived_session()
817 &server_key.private_key, in test_sealed_sender_multi_recipient_encrypt_with_bad_registration_id()
[all …]
/dports/security/pam_ssh/pam_ssh-8.0/openssh/
H A Dkexecdh.c97 EC_KEY *server_key = NULL; in kex_ecdh_enc() local
104 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_enc()
108 if (EC_KEY_generate_key(server_key) != 1) { in kex_ecdh_enc()
112 group = EC_KEY_get0_group(server_key); in kex_ecdh_enc()
116 sshkey_dump_ec_key(server_key); in kex_ecdh_enc()
118 pub_key = EC_KEY_get0_public_key(server_key); in kex_ecdh_enc()
126 if ((r = kex_ecdh_dec_key_group(kex, client_blob, server_key, group, in kex_ecdh_enc()
132 EC_KEY_free(server_key); in kex_ecdh_enc()
/dports/security/openssh-portable/openssh-8.8p1/
H A Dkexecdh.c97 EC_KEY *server_key = NULL; in kex_ecdh_enc() local
104 if ((server_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_enc()
108 if (EC_KEY_generate_key(server_key) != 1) { in kex_ecdh_enc()
112 group = EC_KEY_get0_group(server_key); in kex_ecdh_enc()
116 sshkey_dump_ec_key(server_key); in kex_ecdh_enc()
118 pub_key = EC_KEY_get0_public_key(server_key); in kex_ecdh_enc()
126 if ((r = kex_ecdh_dec_key_group(kex, client_blob, server_key, group, in kex_ecdh_enc()
132 EC_KEY_free(server_key); in kex_ecdh_enc()
/dports/net-im/prosody/prosody-0.11.13/util/sasl/
H A Dscram.lua115 local server_key = hmac_sha1(salted_password, "Server Key");
116 return true, stored_key, server_key
168 local stored_key, server_key, salt, iteration_count;
184 succ, stored_key, server_key = getAuthenticationDatabaseSHA1(password, salt, iteration_count);
191 …stored_key, server_key, iteration_count, salt, status = self.profile[profile_name](self, username,…
204 server_key = server_key;
235 local ServerKey = state.server_key;
/dports/mail/dovecot/dovecot-2.3.17/src/auth/
H A Dpassword-scheme-scram.c114 unsigned char server_key[hmethod->digest_size]; in scram_verify() local
119 stored_key, server_key, error_r) < 0) in scram_verify()
154 unsigned char server_key[hmethod->digest_size]; in scram_generate() local
181 hmac_final(&ctx, server_key); in scram_generate()
183 base64_encode(server_key, sizeof(server_key), str); in scram_generate()
187 safe_memset(server_key, 0, sizeof(server_key)); in scram_generate()
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/
H A Dtls_crypt.c350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key()
363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key()
404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument
450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key()
472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key()
474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key()
476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key()
644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local
683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file()
727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/
H A Dtls_crypt.c350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key()
363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key()
404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument
450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key()
472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key()
474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key()
476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key()
644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local
683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file()
727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/
H A Dtls_crypt.c350 cipher_ctx_t *cipher_ctx = server_key->cipher; in tls_crypt_v2_wrap_client_key()
363 hmac_ctx_t *hmac_ctx = server_key->hmac; in tls_crypt_v2_wrap_client_key()
404 struct key_ctx *server_key) in tls_crypt_v2_unwrap_client_key() argument
450 if (!cipher_ctx_reset(server_key->cipher, tag)) in tls_crypt_v2_unwrap_client_key()
472 hmac_ctx_reset(server_key->hmac); in tls_crypt_v2_unwrap_client_key()
474 hmac_ctx_update(server_key->hmac, BPTR(&plaintext), in tls_crypt_v2_unwrap_client_key()
476 hmac_ctx_final(server_key->hmac, tag_check); in tls_crypt_v2_unwrap_client_key()
644 struct key_ctx server_key = { 0 }; in tls_crypt_v2_write_client_key_file() local
683 tls_crypt_v2_init_server_key(&server_key, true, server_key_file, in tls_crypt_v2_write_client_key_file()
727 free_key_ctx(&server_key); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/net-im/pidgin-sipe/pidgin-sipe-1.24.0/src/core/
H A Dsip-sec-tls-dsk.c54 guchar *server_key; member
84 state->client_key && state->server_key) { in sip_sec_init_sec_context__tls_dsk()
93 ctx->server_key = g_memdup(state->server_key, in sip_sec_init_sec_context__tls_dsk()
167 sipe_digest_hmac_md5(ctx->server_key, ctx->key_length, in sip_sec_verify_signature__tls_dsk()
175 sipe_digest_hmac_sha1(ctx->server_key, ctx->key_length, in sip_sec_verify_signature__tls_dsk()
200 g_free(ctx->server_key); in sip_sec_destroy_sec_context__tls_dsk()
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/grpc/src/src/ruby/spec/
H A Dserver_credentials_spec.rb55 root_cert, server_key, _ = load_test_certs
58 [{ server_key: server_key, cert_chain: nil }],
68 [{ server_key: nil, cert_chain: cert_chain }])

12345678910>>...41