/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/ |
H A D | schannel.idl | 106 unsigned8 session_key[16];
|
/macosx-10.9.5/libtelnet-13/ |
H A D | kerberos.c | 99 static Block session_key = { 0 }; variable 217 des_new_random_key(session_key); 218 des_ecb_encrypt(&session_key, &session_key, sched, 0); 219 des_ecb_encrypt(&session_key, &challenge, sched, 0); 283 memmove((void *)session_key, (void *)adat.session, sizeof(Block)); 299 if (!VALIDKEY(session_key)) { 313 des_init_random_number_generator(session_key); 314 des_key_sched(session_key, sched); 318 * it again to get a unique session_key fo [all...] |
H A D | kerberos5.c | 134 krb5_keyblock *session_key = 0; variable 335 if (session_key) { 336 krb5_free_keyblock(telnet_context, session_key); 337 session_key = 0; 349 &session_key); 353 krb5_copy_keyblock(telnet_context, newkey, &session_key); 556 if (session_key) { 557 krb5_free_keyblock(telnet_context, session_key); 558 session_key = 0; 561 krb5_copy_keyblock(telnet_context, newkey, &session_key); [all...] |
H A D | krb4encpwd.c | 115 static Block session_key = { 0 }; variable 235 memmove((void *)session_key, (void *)adat.session, sizeof(Block));
|
/macosx-10.9.5/ppp-727.90.1/Drivers/PPTP/PPTP-extension/ |
H A D | ppp_mppe.c | 85 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 194 rc4_init(&(state->rc4_state), state->session_key, state->keylen); 206 GetNewKeyFromSHA(state->master_key, state->master_key, state->keylen, state->session_key); 210 state->session_key[0] = MPPE_40_SALT0; 211 state->session_key[1] = MPPE_40_SALT1; 212 state->session_key[2] = MPPE_40_SALT2; 226 GetNewKeyFromSHA(state->master_key, state->session_key, 233 rc4_crypt(&(state->rc4_state), InterimKey, state->session_key, state->keylen); 238 state->session_key[0] = MPPE_40_SALT0; 239 state->session_key[ [all...] |
/macosx-10.9.5/ruby-104/ruby/lib/cgi/ |
H A D | session.rb | 120 # 'session_key' => '_rb_sess_id', # custom session key 196 # session_key:: the parameter name used for the session id. 199 # it is retrieved from the +session_key+ parameter 247 session_key = option['session_key'] || '_session_id' 256 if request.key?(session_key) 257 session_id = request[session_key] 261 session_id, = request.cookies[session_key] 265 raise ArgumentError, "session_key `%s' should be supplied"%session_key [all...] |
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPClientModule.c | 57 EAPClientPluginFuncSessionKey * session_key; member in struct:__anon8540 210 info->session_key = (EAPClientPluginFuncSessionKey *) 331 EAPClientPluginFuncSessionKey * session_key; local 333 session_key = module->info->session_key; 334 if (session_key == NULL) { 337 return (*session_key)(plugin, key_length);
|
H A D | eapmschapv2_plugin.c | 241 uint8_t session_key[NT_SESSION_KEY_SIZE * 2]; member in struct:__anon8606 450 context->session_key, 454 context->session_key + NT_SESSION_KEY_SIZE, 1295 *key_length = sizeof(context->session_key); 1296 return (context->session_key); 1309 *key_length = sizeof(context->session_key); 1310 return (context->session_key);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | kdc_locl.h | 73 krb5_keyblock session_key; member in struct:kdc_request_desc
|
H A D | kerberos5.c | 334 &r->reply_key, &r->session_key, &r->outpadata); 2123 if (r->session_key.keytype == ETYPE_NULL) { 2124 ret = krb5_generate_random_keyblock(context, r->sessionetype, &r->session_key); 2135 ret = copy_EncryptionKey(&r->session_key, &r->et.key); 2139 ret = copy_EncryptionKey(&r->session_key, &r->ek.key); 2335 krb5_free_keyblock_contents(r->context, &r->session_key);
|
H A D | digest.c | 984 r.u.response.session_key = 985 calloc(1, sizeof(*r.u.response.session_key)); 986 if (r.u.response.session_key == NULL) { 992 ret = krb5_data_copy(r.u.response.session_key, md, 16);
|
/macosx-10.9.5/eap8021x-180/eapolclient.tproj/ |
H A D | EAPOLSocket.h | 72 const uint8_t * session_key, int session_key_length,
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/ |
H A D | CredentialsCache2.h | 91 /*
* This is backwards compatibility for CCache API v2 clients to be able to run
* against the CCache API v3 library
*/
#ifndef __CREDENTIALSCACHE2__
#define __CREDENTIALSCACHE2__
#include <CredentialsCache/CredentialsCache.h>
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include <KerberosSupport/KerberosConditionalMacros.h>
#if PRAGMA_IMPORT
# pragma import on
#endif
/* This stuff is to make sure that we always use the same compiler options for
this header file. Otherwise we get really exciting failure modes -- meeroh */
/* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS
(where our implementation defined it to be 2-byte aligned) */
#if TARGET_OS_MAC
#if PRAGMA_STRUCT_ALIGN
#pragma options align=mac68k
#elif PRAGMA_STRUCT_PACKPUSH
#pragma pack(push, 2)
#elif PRAGMA_STRUCT_PACK
#pragma pack(2)
#endif
#endif
#if PRAGMA_ENUM_ALWAYSINT
#pragma enumsalwaysint on
#endif
#if TARGET_CPU_68K
#pragma fourbyteints on
#endif
/* Some old types get directly mapped to new types */
typedef cc_context_d apiCB;
typedef cc_ccache_d ccache_p;
typedef cc_credentials_iterator_d ccache_cit_creds;
typedef cc_ccache_iterator_d ccache_cit_ccache;
typedef cc_data cc_data_compat;
typedef cc_int32 cc_cred_vers;
typedef cc_int32 cc_result;
/* This doesn't exist in API v3 */
typedef cc_uint32 cc_flags;
/* Credentials types are visible to the caller so we have to keep binary compatibility */
typedef struct cc_credentials_v5_compat {
char* client;
char* server;
cc_data_compat keyblock;
cc_time_t authtime;
cc_time_t starttime;
cc_time_t endtime;
cc_time_t renew_till;
cc_uint32 is_skey;
cc_uint32 ticket_flags;
cc_data_compat** addresses;
cc_data_compat ticket;
cc_data_compat second_ticket;
cc_data_compat** authdata;
} cc_credentials_v5_compat;
enum {
MAX_V4_CRED_LEN = 1250
};
enum {
KRB_NAME_SZ = 40,
KRB_INSTANCE_SZ = 40,
KRB_REALM_SZ = 40
};
typedef struct cc_credentials_v4_compat {
unsigned char kversion;
char principal[KRB_NAME_SZ+1];
char principal_instance[KRB_INSTANCE_SZ+1];
char service[KRB_NAME_SZ+1];
char service_instance[KRB_INSTANCE_SZ+1];
char realm[KRB_REALM_SZ+1];
unsigned char session_key[8];
cc_int32 kvno;
cc_int32 str_to_key;
long issue_date;
cc_int32 lifetime;
cc_uint32 (…) 1 / member in struct:cc_credentials_v4_compat
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | sshconnect1.c | 497 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 566 session_key[i] = rnd & 0xff; 583 if (BN_add_word(key, session_key[i] ^ session_id[i]) 587 if (BN_add_word(key, session_key[i]) == 0) 664 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); 667 memset(session_key, 0, sizeof(session_key));
|
H A D | sshd.c | 2239 u_char session_key[SSH_SESSION_KEY_LENGTH]; local 2334 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8); 2336 if (len < 0 || (u_int)len > sizeof(session_key)) { 2338 "session_key_int %d > sizeof(session_key) %lu", 2339 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); 2342 memset(session_key, 0, sizeof(session_key)); 2344 session_key + sizeof(session_key) - len); 2355 session_key[ [all...] |
/macosx-10.9.5/xnu-2422.115.4/osfmk/kdp/ |
H A D | kdp_internal.h | 42 uint32_t session_key; member in struct:__anon15328
|
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | comsoc_smb.c | 151 } session_key; member in struct:rpc_smb_transport_info_s 304 if (smb_info->session_key.data) 306 free(smb_info->session_key.data); 340 *sess_key = smb_info->session_key.data; 345 *sess_key_len = (unsigned32) smb_info->session_key.length; 1140 smb->info.session_key.length = sesskeylen; 1141 smb->info.session_key.data = malloc(sesskeylen); 1142 if (!smb->info.session_key.data) 1147 memcpy(smb->info.session_key.data, sesskey, sesskeylen); 1305 &npsmb->info.session_key [all...] |
H A D | schnauth.c | 199 memcpy(schnauth_info->sec_ctx.session_key, auth_info->session_key, 16);
|
/macosx-10.9.5/Heimdal-323.92.1/kuser/ |
H A D | kdigest.c | 138 krb5_data session_key; local 206 ret = krb5_digest_get_session_key(context, digest, &session_key); 210 if (session_key.length) { 212 hex_encode(session_key.data, session_key.length, &key); 215 krb5_data_free(&session_key);
|
/macosx-10.9.5/MITKerberosShim-62.1/Kerberos/ |
H A D | CredentialsCache2.h | 107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
|
/macosx-10.9.5/MITKerberosShim-62.1/include/ |
H A D | mit-CredentialsCache2.h | 107 unsigned char session_key[8]; member in struct:cc_credentials_v4_compat
|
H A D | mit-CredentialsCache.h | 523 unsigned char session_key [cc_v4_key_size]; member in struct:cc_credentials_v4_t
|
/macosx-10.9.5/ntp-88/ntpd/ |
H A D | ntp_proto.c | 634 pkeyid = session_key( 649 session_key(&rbufp->recv_srcadr, 651 tkeyid = session_key( 655 tkeyid = session_key( 1254 tkeyid = session_key( 3134 session_key(&peer->dstadr->sin, &peer->srcadr, 3337 cookie = session_key(&rbufp->recv_srcadr, 3340 session_key(&rbufp->dstadr->sin, 3348 session_key(&rbufp->dstadr->sin,
|
/macosx-10.9.5/ntp-88/include/ |
H A D | ntpd.h | 152 extern keyid_t session_key (sockaddr_u *, sockaddr_u *, keyid_t,
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | protocol.c | 2434 heim_scram_data proof, server, client_key, stored, server_key, session_key; local 2451 memset(&session_key, 0, sizeof(session_key)); 2502 &session_key); 2521 ret = krb5_store_data(response, session_key); 2540 heim_scram_data_free(&session_key);
|