/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | digest.c | 51 krb5_data sessionkey; member in struct:ntlmkrb5 220 krb5_data_free(&c->sessionkey); 347 struct ntlm_buf *sessionkey) 352 sessionkey->data = NULL; 353 sessionkey->length = 0; 371 if (type3->sessionkey.length) { 373 type3->sessionkey.data, 374 type3->sessionkey.length); 393 if (type3->sessionkey.length) { 396 &c->sessionkey); 344 kdc_type3(OM_uint32 *minor_status, void *ctx, const struct ntlm_type3 *type3, struct ntlm_buf *sessionkey) argument 416 kdc_free_buffer(struct ntlm_buf *sessionkey) argument [all...] |
H A D | init_sec_context.c | 349 struct ntlm_buf sessionkey; local 381 &sessionkey, 382 &type3.sessionkey); 393 ret = krb5_data_copy(&ctx->sessionkey, 394 sessionkey.data, sessionkey.length); 395 free(sessionkey.data); 408 struct ntlm_buf sessionkey; local 445 &sessionkey, 446 &type3.sessionkey); [all...] |
H A D | accept_sec_context.c | 214 ret = krb5_data_copy(&ctx->sessionkey, 229 ctx->sessionkey.data, 230 ctx->sessionkey.length); 233 ctx->sessionkey.data, 234 ctx->sessionkey.length); 237 ctx->sessionkey.length, 238 ctx->sessionkey.data); 240 ctx->sessionkey.length, 241 ctx->sessionkey.data);
|
H A D | ntlm.h | 116 krb5_data sessionkey; member in struct:__anon4588
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ |
H A D | test_ntlm.c | 127 struct ntlm_buf sessionkey; local 129 &sessionkey, 130 &type3.sessionkey); 131 free(sessionkey.data); 257 struct ntlm_buf sessionkey; local 259 &sessionkey, 260 &type3.sessionkey); 261 free(sessionkey.data);
|
/freebsd-9.3-release/crypto/heimdal/lib/ntlm/ |
H A D | heimntlm.h | 117 struct ntlm_buf sessionkey; /**< */ member in struct:ntlm_type3
|
H A D | ntlm.c | 683 heim_ntlm_free_buf(&data->sessionkey); 700 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 703 memset(&sessionkey, 0, sizeof(sessionkey)); 722 CHECK(ret_sec_buffer(in, &sessionkey), 0); 736 if (sessionkey.offset) 737 CHECK(ret_buf(in, &sessionkey, &type3->sessionkey), 0); 763 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 774 memset(&sessionkey, 1002 unsigned char sessionkey[MD4_DIGEST_LENGTH]; local [all...] |
/freebsd-9.3-release/lib/libc/rpc/ |
H A D | svc_auth_des.c | 124 des_block *sessionkey; local 184 sessionkey = &cred->adc_fullname.key; 192 sessionkey) < 0) { 202 sessionkey = &authdes_cache[sid].key; 214 status = cbc_crypt((char *)sessionkey, (char *)cryptbuf, 218 status = ecb_crypt((char *)sessionkey, (char *)cryptbuf, 251 sid = cache_spot(sessionkey, cred->adc_fullname.name, 297 status = ecb_crypt((char *)sessionkey, (char *)cryptbuf, 338 entry->key = *sessionkey;
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | ticket.c | 113 krb5_keyblock *sessionkey, 155 sessionkey, &child, level + 1); 189 ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf, 203 ret = find_type_in_ad(context, type, data, found, failp, sessionkey, 108 find_type_in_ad(krb5_context context, int type, krb5_data *data, krb5_boolean *found, krb5_boolean failp, krb5_keyblock *sessionkey, const AuthorizationData *ad, int level) argument
|
H A D | digest.c | 1108 void *sessionkey, size_t length) 1110 ntlm->request.sessionkey = calloc(1, sizeof(*ntlm->request.sessionkey)); 1111 if (ntlm->request.sessionkey == NULL) { 1115 ntlm->request.sessionkey->data = malloc(length); 1116 if (ntlm->request.sessionkey->data == NULL) { 1120 memcpy(ntlm->request.sessionkey->data, sessionkey, length); 1121 ntlm->request.sessionkey->length = length; 1137 if (ntlm->response.sessionkey 1106 krb5_ntlm_req_set_session(krb5_context context, krb5_ntlm ntlm, void *sessionkey, size_t length) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | digest.c | 1107 unsigned char sessionkey[16]; local 1116 r.u.ntlmResponse.sessionkey = NULL; 1213 sessionkey); 1283 MD4_Final(sessionkey, &ctx); 1287 if (ireq.u.ntlmRequest.sessionkey) { 1300 len = ireq.u.ntlmRequest.sessionkey->length; 1308 RC4_set_key(&rc4, sizeof(sessionkey), sessionkey); 1311 ireq.u.ntlmRequest.sessionkey->data, 1315 r.u.ntlmResponse.sessionkey [all...] |
H A D | krb5tgs.c | 662 const krb5_keyblock *sessionkey, 834 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); 1268 krb5_keyblock sessionkey; local 1280 memset(&sessionkey, 0, sizeof(sessionkey)); 1717 ret = krb5_generate_random_keyblock(context, etype, &sessionkey); 1769 &sessionkey, 1788 krb5_free_keyblock_contents(context, &sessionkey); 656 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, KRB5SignedPathPrincipals *spp, const krb5_data *rspac, const char **e_text, krb5_data *reply) argument
|
/freebsd-9.3-release/contrib/bind9/bin/named/include/named/ |
H A D | server.h | 112 dns_tsigkey_t *sessionkey; member in struct:ns_server
|
/freebsd-9.3-release/contrib/bind9/bin/nsupdate/ |
H A D | nsupdate.c | 592 cfg_obj_t *sessionkey = NULL; local 610 &sessionkey); 614 result = cfg_map_get(sessionkey, "key", &key); 634 if (sessionkey != NULL) 635 cfg_obj_destroy(pctx, &sessionkey);
|
/freebsd-9.3-release/contrib/bind9/bin/named/ |
H A D | server.c | 2860 if (ns_g_server->sessionkey != NULL) { 2862 ns_g_server->sessionkey)); 4593 if (server->sessionkey != NULL) 4594 dns_tsigkey_detach(&server->sessionkey); 4754 INSIST(server->sessionkey != NULL); 4760 INSIST(server->sessionkey == NULL); 4781 &server->sessionkey)); 6241 server->sessionkey = NULL;
|