/macosx-10.10/dcerpc-61/dcerpc/include/dce/ |
H A D | schannel.idl | 106 unsigned8 session_key[16];
|
/macosx-10.10/libtelnet-13/ |
H A D | kerberos.c | 99 static Block session_key = { 0 }; variable 217 des_new_random_key(session_key); 218 des_ecb_encrypt(&session_key, &session_key, sched, 0); 219 des_ecb_encrypt(&session_key, &challenge, sched, 0); 283 memmove((void *)session_key, (void *)adat.session, sizeof(Block)); 299 if (!VALIDKEY(session_key)) { 313 des_init_random_number_generator(session_key); 314 des_key_sched(session_key, sched); 318 * it again to get a unique session_key fo [all...] |
H A D | kerberos5.c | 134 krb5_keyblock *session_key = 0; variable 335 if (session_key) { 336 krb5_free_keyblock(telnet_context, session_key); 337 session_key = 0; 349 &session_key); 353 krb5_copy_keyblock(telnet_context, newkey, &session_key); 556 if (session_key) { 557 krb5_free_keyblock(telnet_context, session_key); 558 session_key = 0; 561 krb5_copy_keyblock(telnet_context, newkey, &session_key); [all...] |
H A D | krb4encpwd.c | 115 static Block session_key = { 0 }; variable 235 memmove((void *)session_key, (void *)adat.session, sizeof(Block));
|
/macosx-10.10/ppp-786.1.1/Drivers/PPTP/PPTP-extension/ |
H A D | ppp_mppe.c | 85 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 194 rc4_init(&(state->rc4_state), state->session_key, state->keylen); 206 GetNewKeyFromSHA(state->master_key, state->master_key, state->keylen, state->session_key); 210 state->session_key[0] = MPPE_40_SALT0; 211 state->session_key[1] = MPPE_40_SALT1; 212 state->session_key[2] = MPPE_40_SALT2; 226 GetNewKeyFromSHA(state->master_key, state->session_key, 233 rc4_crypt(&(state->rc4_state), InterimKey, state->session_key, state->keylen); 238 state->session_key[0] = MPPE_40_SALT0; 239 state->session_key[ [all...] |
/macosx-10.10/ruby-106/ruby/lib/cgi/ |
H A D | session.rb | 120 # 'session_key' => '_rb_sess_id', # custom session key 196 # session_key:: the parameter name used for the session id. 199 # it is retrieved from the +session_key+ parameter 247 session_key = option['session_key'] || '_session_id' 256 if request.key?(session_key) 257 session_id = request[session_key] 261 session_id, = request.cookies[session_key] 265 raise ArgumentError, "session_key `%s' should be supplied"%session_key [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPClientModule.c | 57 EAPClientPluginFuncSessionKey * session_key; member in struct:__anon8585 211 info->session_key = (EAPClientPluginFuncSessionKey *) 334 EAPClientPluginFuncSessionKey * session_key; local 336 session_key = module->info->session_key; 337 if (session_key == NULL) { 340 return (*session_key)(plugin, key_length);
|
H A D | eapmschapv2_plugin.c | 247 eapmschap2_session_key session_key; member in struct:__anon8652 457 context->session_key.master_send_key, 462 context->session_key.master_receive_key, 1304 *key_length = sizeof(context->session_key); 1305 return (&context->session_key); 1318 *key_length = sizeof(context->session_key); 1319 return (&context->session_key); 1340 bcopy(context->session_key.master_receive_key, offset, 1341 sizeof(context->session_key.master_receive_key)); 1342 offset += sizeof(context->session_key [all...] |
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | kdc_locl.h | 73 krb5_keyblock session_key; member in struct:kdc_request_desc
|
H A D | digest.c | 984 r.u.response.session_key = 985 calloc(1, sizeof(*r.u.response.session_key)); 986 if (r.u.response.session_key == NULL) { 992 ret = krb5_data_copy(r.u.response.session_key, md, 16);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sshconnect1.c | 497 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 566 session_key[i] = rnd & 0xff; 583 if (BN_add_word(key, session_key[i] ^ session_id[i]) 587 if (BN_add_word(key, session_key[i]) == 0) 664 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); 667 memset(session_key, 0, sizeof(session_key));
|
H A D | sshd.c | 2239 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 2334 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8); 2336 if (len < 0 || (u_int)len > sizeof(session_key)) { 2338 "session_key_int %d > sizeof(session_key) %lu", 2339 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); 2342 memset(session_key, 0, sizeof(session_key)); 2344 session_key + sizeof(session_key) - len); 2355 session_key[ [all...] |
/macosx-10.10/xnu-2782.1.97/osfmk/kdp/ |
H A D | kdp_internal.h | 42 uint32_t session_key; member in struct:__anon15338
|
H A D | kdp.c | 222 (key == kdp.session_key)) 232 kdp.session_key = key; 273 kdp.session_key = 0;
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | comsoc_smb.c | 151 } session_key; member in struct:rpc_smb_transport_info_s 304 if (smb_info->session_key.data) 306 free(smb_info->session_key.data); 340 *sess_key = smb_info->session_key.data; 345 *sess_key_len = (unsigned32) smb_info->session_key.length; 1140 smb->info.session_key.length = sesskeylen; 1141 smb->info.session_key.data = malloc(sesskeylen); 1142 if (!smb->info.session_key.data) 1147 memcpy(smb->info.session_key.data, sesskey, sesskeylen); 1305 &npsmb->info.session_key [all...] |
H A D | schnauth.c | 199 memcpy(schnauth_info->sec_ctx.session_key, auth_info->session_key, 16);
|
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kdigest.c | 138 krb5_data session_key; local 206 ret = krb5_digest_get_session_key(context, digest, &session_key); 210 if (session_key.length) { 212 hex_encode(session_key.data, session_key.length, &key); 215 krb5_data_free(&session_key);
|
/macosx-10.10/MITKerberosShim-66/Kerberos/ |
H A D | CredentialsCache2.h | 107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
|
/macosx-10.10/MITKerberosShim-66/include/ |
H A D | mit-CredentialsCache2.h | 107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
|
H A D | mit-CredentialsCache.h | 523 unsigned char session_key [cc_v4_key_size]; member in struct:cc_credentials_v4_t
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_proto.c | 636 pkeyid = session_key( 651 session_key(&rbufp->recv_srcadr, 653 tkeyid = session_key( 657 tkeyid = session_key( 1256 tkeyid = session_key( 3142 session_key(&peer->dstadr->sin, &peer->srcadr, 3345 cookie = session_key(&rbufp->recv_srcadr, 3348 session_key(&rbufp->dstadr->sin, 3356 session_key(&rbufp->dstadr->sin,
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | krb5-private.h | 647 const void *session_key, 851 const void *session_key,
|
/macosx-10.10/ntp-92/include/ |
H A D | ntpd.h | 152 extern keyid_t session_key (sockaddr_u *, sockaddr_u *, keyid_t,
|
H A D | ntpd.h.orig | 152 extern keyid_t session_key (sockaddr_u *, sockaddr_u *, keyid_t,
|
/macosx-10.10/Heimdal-398.1.2/kcm/ |
H A D | protocol.c | 2431 heim_scram_data proof, server, client_key, stored, server_key, session_key; local 2448 memset(&session_key, 0, sizeof(session_key)); 2499 &session_key); 2518 ret = krb5_store_data(response, session_key); 2537 heim_scram_data_free(&session_key);
|