Searched refs:session_key (Results 1 - 25 of 35) sorted by relevance

12

/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/
H A Dschannel.idl106 unsigned8 session_key[16];
/macosx-10.9.5/libtelnet-13/
H A Dkerberos.c99 static Block session_key = { 0 }; variable
217 des_new_random_key(session_key);
218 des_ecb_encrypt(&session_key, &session_key, sched, 0);
219 des_ecb_encrypt(&session_key, &challenge, sched, 0);
283 memmove((void *)session_key, (void *)adat.session, sizeof(Block));
299 if (!VALIDKEY(session_key)) {
313 des_init_random_number_generator(session_key);
314 des_key_sched(session_key, sched);
318 * it again to get a unique session_key fo
[all...]
H A Dkerberos5.c134 krb5_keyblock *session_key = 0; variable
335 if (session_key) {
336 krb5_free_keyblock(telnet_context, session_key);
337 session_key = 0;
349 &session_key);
353 krb5_copy_keyblock(telnet_context, newkey, &session_key);
556 if (session_key) {
557 krb5_free_keyblock(telnet_context, session_key);
558 session_key = 0;
561 krb5_copy_keyblock(telnet_context, newkey, &session_key);
[all...]
H A Dkrb4encpwd.c115 static Block session_key = { 0 }; variable
235 memmove((void *)session_key, (void *)adat.session, sizeof(Block));
/macosx-10.9.5/ppp-727.90.1/Drivers/PPTP/PPTP-extension/
H A Dppp_mppe.c85 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state
194 rc4_init(&(state->rc4_state), state->session_key, state->keylen);
206 GetNewKeyFromSHA(state->master_key, state->master_key, state->keylen, state->session_key);
210 state->session_key[0] = MPPE_40_SALT0;
211 state->session_key[1] = MPPE_40_SALT1;
212 state->session_key[2] = MPPE_40_SALT2;
226 GetNewKeyFromSHA(state->master_key, state->session_key,
233 rc4_crypt(&(state->rc4_state), InterimKey, state->session_key, state->keylen);
238 state->session_key[0] = MPPE_40_SALT0;
239 state->session_key[
[all...]
/macosx-10.9.5/ruby-104/ruby/lib/cgi/
H A Dsession.rb120 # 'session_key' => '_rb_sess_id', # custom session key
196 # session_key:: the parameter name used for the session id.
199 # it is retrieved from the +session_key+ parameter
247 session_key = option['session_key'] || '_session_id'
256 if request.key?(session_key)
257 session_id = request[session_key]
261 session_id, = request.cookies[session_key]
265 raise ArgumentError, "session_key `%s' should be supplied"%session_key
[all...]
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DEAPClientModule.c57 EAPClientPluginFuncSessionKey * session_key; member in struct:__anon8540
210 info->session_key = (EAPClientPluginFuncSessionKey *)
331 EAPClientPluginFuncSessionKey * session_key; local
333 session_key = module->info->session_key;
334 if (session_key == NULL) {
337 return (*session_key)(plugin, key_length);
H A Deapmschapv2_plugin.c241 uint8_t session_key[NT_SESSION_KEY_SIZE * 2]; member in struct:__anon8606
450 context->session_key,
454 context->session_key + NT_SESSION_KEY_SIZE,
1295 *key_length = sizeof(context->session_key);
1296 return (context->session_key);
1309 *key_length = sizeof(context->session_key);
1310 return (context->session_key);
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Dkdc_locl.h73 krb5_keyblock session_key; member in struct:kdc_request_desc
H A Dkerberos5.c334 &r->reply_key, &r->session_key, &r->outpadata);
2123 if (r->session_key.keytype == ETYPE_NULL) {
2124 ret = krb5_generate_random_keyblock(context, r->sessionetype, &r->session_key);
2135 ret = copy_EncryptionKey(&r->session_key, &r->et.key);
2139 ret = copy_EncryptionKey(&r->session_key, &r->ek.key);
2335 krb5_free_keyblock_contents(r->context, &r->session_key);
H A Ddigest.c984 r.u.response.session_key =
985 calloc(1, sizeof(*r.u.response.session_key));
986 if (r.u.response.session_key == NULL) {
992 ret = krb5_data_copy(r.u.response.session_key, md, 16);
/macosx-10.9.5/eap8021x-180/eapolclient.tproj/
H A DEAPOLSocket.h72 const uint8_t * session_key, int session_key_length,
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/
H A DCredentialsCache2.h91 /* * This is backwards compatibility for CCache API v2 clients to be able to run * against the CCache API v3 library */ #ifndef __CREDENTIALSCACHE2__ #define __CREDENTIALSCACHE2__ #include <CredentialsCache/CredentialsCache.h> #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #include <KerberosSupport/KerberosConditionalMacros.h> #if PRAGMA_IMPORT # pragma import on #endif /* This stuff is to make sure that we always use the same compiler options for this header file. Otherwise we get really exciting failure modes -- meeroh */ /* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS (where our implementation defined it to be 2-byte aligned) */ #if TARGET_OS_MAC #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 2) #elif PRAGMA_STRUCT_PACK #pragma pack(2) #endif #endif #if PRAGMA_ENUM_ALWAYSINT #pragma enumsalwaysint on #endif #if TARGET_CPU_68K #pragma fourbyteints on #endif /* Some old types get directly mapped to new types */ typedef cc_context_d apiCB; typedef cc_ccache_d ccache_p; typedef cc_credentials_iterator_d ccache_cit_creds; typedef cc_ccache_iterator_d ccache_cit_ccache; typedef cc_data cc_data_compat; typedef cc_int32 cc_cred_vers; typedef cc_int32 cc_result; /* This doesn't exist in API v3 */ typedef cc_uint32 cc_flags; /* Credentials types are visible to the caller so we have to keep binary compatibility */ typedef struct cc_credentials_v5_compat { char* client; char* server; cc_data_compat keyblock; cc_time_t authtime; cc_time_t starttime; cc_time_t endtime; cc_time_t renew_till; cc_uint32 is_skey; cc_uint32 ticket_flags; cc_data_compat** addresses; cc_data_compat ticket; cc_data_compat second_ticket; cc_data_compat** authdata; } cc_credentials_v5_compat; enum { MAX_V4_CRED_LEN = 1250 }; enum { KRB_NAME_SZ = 40, KRB_INSTANCE_SZ = 40, KRB_REALM_SZ = 40 }; typedef struct cc_credentials_v4_compat { unsigned char kversion; char principal[KRB_NAME_SZ+1]; char principal_instance[KRB_INSTANCE_SZ+1]; char service[KRB_NAME_SZ+1]; char service_instance[KRB_INSTANCE_SZ+1]; char realm[KRB_REALM_SZ+1]; unsigned char session_key[8]; cc_int32 kvno; cc_int32 str_to_key; long issue_date; cc_int32 lifetime; cc_uint32 (…)
1 / member in struct:cc_credentials_v4_compat
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dsshconnect1.c497 u_char session_key[SSH_SESSION_KEY_LENGTH]; local
566 session_key[i] = rnd & 0xff;
583 if (BN_add_word(key, session_key[i] ^ session_id[i])
587 if (BN_add_word(key, session_key[i]) == 0)
664 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher);
667 memset(session_key, 0, sizeof(session_key));
H A Dsshd.c2239 u_char session_key[SSH_SESSION_KEY_LENGTH]; local
2334 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8);
2336 if (len < 0 || (u_int)len > sizeof(session_key)) {
2338 "session_key_int %d > sizeof(session_key) %lu",
2339 get_remote_ipaddr(), len, (u_long)sizeof(session_key));
2342 memset(session_key, 0, sizeof(session_key));
2344 session_key + sizeof(session_key) - len);
2355 session_key[
[all...]
/macosx-10.9.5/xnu-2422.115.4/osfmk/kdp/
H A Dkdp_internal.h42 uint32_t session_key; member in struct:__anon15328
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/
H A Dcomsoc_smb.c151 } session_key; member in struct:rpc_smb_transport_info_s
304 if (smb_info->session_key.data)
306 free(smb_info->session_key.data);
340 *sess_key = smb_info->session_key.data;
345 *sess_key_len = (unsigned32) smb_info->session_key.length;
1140 smb->info.session_key.length = sesskeylen;
1141 smb->info.session_key.data = malloc(sesskeylen);
1142 if (!smb->info.session_key.data)
1147 memcpy(smb->info.session_key.data, sesskey, sesskeylen);
1305 &npsmb->info.session_key
[all...]
H A Dschnauth.c199 memcpy(schnauth_info->sec_ctx.session_key, auth_info->session_key, 16);
/macosx-10.9.5/Heimdal-323.92.1/kuser/
H A Dkdigest.c138 krb5_data session_key; local
206 ret = krb5_digest_get_session_key(context, digest, &session_key);
210 if (session_key.length) {
212 hex_encode(session_key.data, session_key.length, &key);
215 krb5_data_free(&session_key);
/macosx-10.9.5/MITKerberosShim-62.1/Kerberos/
H A DCredentialsCache2.h107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
/macosx-10.9.5/MITKerberosShim-62.1/include/
H A Dmit-CredentialsCache2.h107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
H A Dmit-CredentialsCache.h523 unsigned char session_key [cc_v4_key_size]; member in struct:cc_credentials_v4_t
/macosx-10.9.5/ntp-88/ntpd/
H A Dntp_proto.c634 pkeyid = session_key(
649 session_key(&rbufp->recv_srcadr,
651 tkeyid = session_key(
655 tkeyid = session_key(
1254 tkeyid = session_key(
3134 session_key(&peer->dstadr->sin, &peer->srcadr,
3337 cookie = session_key(&rbufp->recv_srcadr,
3340 session_key(&rbufp->dstadr->sin,
3348 session_key(&rbufp->dstadr->sin,
/macosx-10.9.5/ntp-88/include/
H A Dntpd.h152 extern keyid_t session_key (sockaddr_u *, sockaddr_u *, keyid_t,
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dprotocol.c2434 heim_scram_data proof, server, client_key, stored, server_key, session_key; local
2451 memset(&session_key, 0, sizeof(session_key));
2502 &session_key);
2521 ret = krb5_store_data(response, session_key);
2540 heim_scram_data_free(&session_key);

Completed in 349 milliseconds

12