/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | debug.c | 56 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n", 57 auth_tok->session_key.flags); 58 if (auth_tok->session_key.flags 62 if (auth_tok->session_key.flags 66 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { 69 " * session_key.decrypted_key_size = [0x%x]\n", 70 auth_tok->session_key.decrypted_key_size); 74 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, 77 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { 80 " * session_key [all...] |
H A D | keystore.c | 139 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument 157 + session_key->encrypted_key_size); 177 session_key->encrypted_key_size, 185 memcpy(&message[i], session_key->encrypted_key, 186 session_key->encrypted_key_size); 187 i += session_key->encrypted_key_size; 194 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, argument 252 session_key->decrypted_key_size = m_size - 3; 253 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { 256 session_key [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | ntlmssp.c | 473 ntlmssp_state->session_key.data, 474 ntlmssp_state->session_key.length); 629 DATA_BLOB session_key = data_blob(NULL, 0); local 831 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16); 833 sizeof(session_nonce), session_key.data); 835 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length); 839 session_key = data_blob(NULL, 0); 844 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16); 845 if (session_key 1030 DATA_BLOB session_key = data_blob(NULL, 0); local [all...] |
H A D | ntlmssp_sign.c | 40 DATA_BLOB session_key, 45 MD5Update(&ctx3, session_key.data, session_key.length); 147 if (!ntlmssp_state->session_key.length) { 174 if (!ntlmssp_state->session_key.length) { 244 if (!ntlmssp_state->session_key.length) { 305 if (!ntlmssp_state->session_key.length) { 341 if (ntlmssp_state->session_key.length < 8) { 348 DATA_BLOB weak_session_key = ntlmssp_state->session_key; 391 ntlmssp_state->session_key, send_sign_cons 39 calc_ntlmv2_key(unsigned char subkey[16], DATA_BLOB session_key, const char *constant) argument [all...] |
H A D | cliconnect.c | 46 * @param session_key The session key used. (A copy of this is taken for the cli struct) 50 static void cli_set_session_key (struct cli_state *cli, const DATA_BLOB session_key) argument 52 cli->user_session_key = data_blob(session_key.data, session_key.length); 64 DATA_BLOB session_key = data_blob(NULL, 0); local 136 if (session_key.data) { 138 cli_set_session_key(cli, session_key); 304 DATA_BLOB session_key = data_blob(NULL, 0); local 324 &lm_response, &nt_response, &session_key)) { 356 session_key [all...] |
H A D | smbencrypt.c | 595 void sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key, int forward) argument 607 if (k + 7 > session_key->length) { 608 k = (session_key->length - k); 610 memcpy(key, &session_key->data[k], 7);
|
H A D | clikrb5.c | 724 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote) argument 736 *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey)); 737 dump_data_pw("KRB5 Session Key:\n", session_key->data, session_key->length);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | auth_x.h | 17 struct ceph_crypto_key session_key; member in struct:ceph_x_ticket_handler
|
H A D | auth_x.c | 125 ceph_crypto_key_destroy(&th->session_key); 204 memcpy(&old_key, &th->session_key, sizeof(old_key)); 245 ceph_crypto_key_destroy(&th->session_key); 248 th->session_key = new_session_key; 322 ret = ceph_x_encrypt(&th->session_key, &msg_b, sizeof(msg_b), 512 ret = ceph_x_proc_ticket_reply(ac, &th->session_key, 571 ret = ceph_x_decrypt(&th->session_key, &p, end, &reply, sizeof(reply));
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/ |
H A D | rxrpc-type.h | 34 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key 107 u8 session_key[8]; member in struct:rxrpc_key_data_v1
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth_diagnostics.c | 55 DATA_BLOB session_key = data_blob(NULL, 16); local 76 SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data); 136 if (memcmp(session_key.data, user_session_key, 142 dump_data(1, (const char *)session_key.data, session_key.length); 244 DATA_BLOB session_key = data_blob(NULL, 16); local 261 SMBsesskeygen_ntv1((const unsigned char *)nt_hash, NULL, session_key.data); 294 if (memcmp(session_key.data, user_session_key, 300 dump_data(1, (const char *)session_key.data, session_key [all...] |
H A D | ntlm_auth.c | 687 static DATA_BLOB session_key; local 740 char *key64 = base64_encode_data_blob(session_key); 787 data_blob_free(&session_key); 788 session_key = data_blob(ntlmssp_state->session_key.data, 789 ntlmssp_state->session_key.length); 809 static DATA_BLOB session_key; local 890 char *key64 = base64_encode_data_blob(session_key); 945 data_blob_free(&session_key); 947 session_key 1156 DATA_BLOB session_key; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | password.c | 104 data_blob_free(&vuser->session_key); 139 * @param session_key The User session key for the login session (now also 153 DATA_BLOB session_key, DATA_BLOB response_blob, 165 data_blob_free(&session_key); 171 data_blob_free(&session_key); 220 data_blob_free(&session_key); 271 vuser->session_key = session_key; 288 data_blob_free(&session_key); 350 srv_set_signing(vuser->session_key, response_blo 152 register_vuid(auth_serversupplied_info *server_info, DATA_BLOB session_key, DATA_BLOB response_blob, const char *smb_name) argument [all...] |
H A D | sesssetup.c | 243 DATA_BLOB session_key = data_blob(NULL, 0); local 270 ret = ads_verify_ticket(mem_ctx, lp_realm(), 0, &ticket, &client, &pac_data, &ap_rep, &session_key); 327 data_blob_free(&session_key); 348 data_blob_free(&session_key); 418 data_blob_free(&session_key); 442 data_blob_free(&session_key); 466 data_blob_free(&session_key); 479 data_blob_free(&session_key); 503 data_blob_free(&session_key); 511 /* register_vuid takes ownership of session_key, n 583 DATA_BLOB session_key = data_blob((*auth_ntlmssp_state)->ntlmssp_state->session_key.data, (*auth_ntlmssp_state)->ntlmssp_state->session_key.length); local 1236 DATA_BLOB session_key; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/ |
H A D | ppp_mppe.c | 101 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); 173 setup_sg(sg_out, state->session_key, state->keylen); 179 memcpy(state->session_key, state->sha1_digest, state->keylen); 183 state->session_key[0] = 0xd1; 184 state->session_key[1] = 0x26; 185 state->session_key[2] = 0x9e; 187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); 230 memcpy(state->session_key, state->master_key, 302 char skey[sizeof(state->session_key) * [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-key.c | 109 memcpy(&token->kad->session_key, &xdr[2], 8); 118 token->kad->session_key[0], token->kad->session_key[1], 119 token->kad->session_key[2], token->kad->session_key[3], 120 token->kad->session_key[4], token->kad->session_key[5], 121 token->kad->session_key[6], token->kad->session_key[7]); 713 v1->session_key[ 918 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument [all...] |
H A D | rxkad.c | 80 if (crypto_blkcipher_setkey(ci, token->kad->session_key, 81 sizeof(token->kad->session_key)) < 0) 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); 225 memcpy(&iv, token->kad->session_key, sizeof(iv)); 437 memcpy(&iv, token->kad->session_key, sizeof(iv)); 726 memcpy(&iv, s2->session_key, sizeof(iv)); 967 const struct rxrpc_crypt *session_key) 974 ntohl(session_key->n[0]), ntohl(session_key->n[1])); 979 if (crypto_blkcipher_setkey(rxkad_ci, session_key 965 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument 1005 struct rxrpc_crypt session_key; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 554 u_char session_key[16]; local 583 session_key, 585 mppe_set_keys(challenge, session_key); 604 u_char session_key[MD4_SIGNATURE_SIZE]; local 623 session_key, 626 GenerateAuthenticatorResponse(session_key, 630 mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP],
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | ntdomain.h | 185 DATA_BLOB session_key; member in struct:kerberos_auth_struct 249 DATA_BLOB session_key; member in struct:pipes_struct
|
H A D | ntlmssp.h | 101 DATA_BLOB session_key; member in struct:ntlmssp_state
|
H A D | authdata.h | 105 uint8 session_key[16]; /* samba4 idl */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | kerberos_verify.c | 310 DATA_BLOB *session_key) 337 *session_key = data_blob(NULL,0); 456 get_krb5_smb_session_key(context, auth_context, session_key, True); 457 dump_data_pw("SMB session key (from ticket)\n", session_key->data, session_key->length); 303 ads_verify_ticket(TALLOC_CTX *mem_ctx, const char *realm, time_t time_offset, const DATA_BLOB *ticket, char **principal, PAC_DATA **pac_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
|
H A D | sasl.c | 147 DATA_BLOB session_key = data_blob(NULL, 0); local 150 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0, 164 data_blob_free(&session_key);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | proxy.c | 719 HASHHEX session_key; local 750 session_key); 751 DigestCalcResponse(session_key,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_pipe_hnd.c | 353 p->session_key = data_blob(vuser->session_key.data, vuser->session_key.length); 1236 data_blob_free(&p->session_key);
|