Searched refs:session_key (Results 1 - 25 of 33) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Ddebug.c56 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
57 auth_tok->session_key.flags);
58 if (auth_tok->session_key.flags
62 if (auth_tok->session_key.flags
66 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
69 " * session_key.decrypted_key_size = [0x%x]\n",
70 auth_tok->session_key.decrypted_key_size);
74 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
77 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
80 " * session_key
[all...]
H A Dkeystore.c139 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument
157 + session_key->encrypted_key_size);
177 session_key->encrypted_key_size,
185 memcpy(&message[i], session_key->encrypted_key,
186 session_key->encrypted_key_size);
187 i += session_key->encrypted_key_size;
194 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, argument
252 session_key->decrypted_key_size = m_size - 3;
253 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
256 session_key
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dntlmssp.c473 ntlmssp_state->session_key.data,
474 ntlmssp_state->session_key.length);
629 DATA_BLOB session_key = data_blob(NULL, 0); local
831 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16);
833 sizeof(session_nonce), session_key.data);
835 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length);
839 session_key = data_blob(NULL, 0);
844 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16);
845 if (session_key
1030 DATA_BLOB session_key = data_blob(NULL, 0); local
[all...]
H A Dntlmssp_sign.c40 DATA_BLOB session_key,
45 MD5Update(&ctx3, session_key.data, session_key.length);
147 if (!ntlmssp_state->session_key.length) {
174 if (!ntlmssp_state->session_key.length) {
244 if (!ntlmssp_state->session_key.length) {
305 if (!ntlmssp_state->session_key.length) {
341 if (ntlmssp_state->session_key.length < 8) {
348 DATA_BLOB weak_session_key = ntlmssp_state->session_key;
391 ntlmssp_state->session_key, send_sign_cons
39 calc_ntlmv2_key(unsigned char subkey[16], DATA_BLOB session_key, const char *constant) argument
[all...]
H A Dcliconnect.c46 * @param session_key The session key used. (A copy of this is taken for the cli struct)
50 static void cli_set_session_key (struct cli_state *cli, const DATA_BLOB session_key) argument
52 cli->user_session_key = data_blob(session_key.data, session_key.length);
64 DATA_BLOB session_key = data_blob(NULL, 0); local
136 if (session_key.data) {
138 cli_set_session_key(cli, session_key);
304 DATA_BLOB session_key = data_blob(NULL, 0); local
324 &lm_response, &nt_response, &session_key)) {
356 session_key
[all...]
H A Dsmbencrypt.c595 void sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key, int forward) argument
607 if (k + 7 > session_key->length) {
608 k = (session_key->length - k);
610 memcpy(key, &session_key->data[k], 7);
H A Dclikrb5.c724 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote) argument
736 *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey));
737 dump_data_pw("KRB5 Session Key:\n", session_key->data, session_key->length);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/
H A Dauth_x.h17 struct ceph_crypto_key session_key; member in struct:ceph_x_ticket_handler
H A Dauth_x.c125 ceph_crypto_key_destroy(&th->session_key);
204 memcpy(&old_key, &th->session_key, sizeof(old_key));
245 ceph_crypto_key_destroy(&th->session_key);
248 th->session_key = new_session_key;
322 ret = ceph_x_encrypt(&th->session_key, &msg_b, sizeof(msg_b),
512 ret = ceph_x_proc_ticket_reply(ac, &th->session_key,
571 ret = ceph_x_decrypt(&th->session_key, &p, end, &reply, sizeof(reply));
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/
H A Drxrpc-type.h34 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key
107 u8 session_key[8]; member in struct:rxrpc_key_data_v1
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dntlm_auth_diagnostics.c55 DATA_BLOB session_key = data_blob(NULL, 16); local
76 SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data);
136 if (memcmp(session_key.data, user_session_key,
142 dump_data(1, (const char *)session_key.data, session_key.length);
244 DATA_BLOB session_key = data_blob(NULL, 16); local
261 SMBsesskeygen_ntv1((const unsigned char *)nt_hash, NULL, session_key.data);
294 if (memcmp(session_key.data, user_session_key,
300 dump_data(1, (const char *)session_key.data, session_key
[all...]
H A Dntlm_auth.c687 static DATA_BLOB session_key; local
740 char *key64 = base64_encode_data_blob(session_key);
787 data_blob_free(&session_key);
788 session_key = data_blob(ntlmssp_state->session_key.data,
789 ntlmssp_state->session_key.length);
809 static DATA_BLOB session_key; local
890 char *key64 = base64_encode_data_blob(session_key);
945 data_blob_free(&session_key);
947 session_key
1156 DATA_BLOB session_key; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dpassword.c104 data_blob_free(&vuser->session_key);
139 * @param session_key The User session key for the login session (now also
153 DATA_BLOB session_key, DATA_BLOB response_blob,
165 data_blob_free(&session_key);
171 data_blob_free(&session_key);
220 data_blob_free(&session_key);
271 vuser->session_key = session_key;
288 data_blob_free(&session_key);
350 srv_set_signing(vuser->session_key, response_blo
152 register_vuid(auth_serversupplied_info *server_info, DATA_BLOB session_key, DATA_BLOB response_blob, const char *smb_name) argument
[all...]
H A Dsesssetup.c243 DATA_BLOB session_key = data_blob(NULL, 0); local
270 ret = ads_verify_ticket(mem_ctx, lp_realm(), 0, &ticket, &client, &pac_data, &ap_rep, &session_key);
327 data_blob_free(&session_key);
348 data_blob_free(&session_key);
418 data_blob_free(&session_key);
442 data_blob_free(&session_key);
466 data_blob_free(&session_key);
479 data_blob_free(&session_key);
503 data_blob_free(&session_key);
511 /* register_vuid takes ownership of session_key, n
583 DATA_BLOB session_key = data_blob((*auth_ntlmssp_state)->ntlmssp_state->session_key.data, (*auth_ntlmssp_state)->ntlmssp_state->session_key.length); local
1236 DATA_BLOB session_key; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/
H A Dppp_mppe.c101 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state
147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen);
173 setup_sg(sg_out, state->session_key, state->keylen);
179 memcpy(state->session_key, state->sha1_digest, state->keylen);
183 state->session_key[0] = 0xd1;
184 state->session_key[1] = 0x26;
185 state->session_key[2] = 0x9e;
187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen);
230 memcpy(state->session_key, state->master_key,
302 char skey[sizeof(state->session_key) *
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-key.c109 memcpy(&token->kad->session_key, &xdr[2], 8);
118 token->kad->session_key[0], token->kad->session_key[1],
119 token->kad->session_key[2], token->kad->session_key[3],
120 token->kad->session_key[4], token->kad->session_key[5],
121 token->kad->session_key[6], token->kad->session_key[7]);
713 v1->session_key[
918 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument
[all...]
H A Drxkad.c80 if (crypto_blkcipher_setkey(ci, token->kad->session_key,
81 sizeof(token->kad->session_key)) < 0)
129 memcpy(&iv, token->kad->session_key, sizeof(iv));
225 memcpy(&iv, token->kad->session_key, sizeof(iv));
437 memcpy(&iv, token->kad->session_key, sizeof(iv));
726 memcpy(&iv, s2->session_key, sizeof(iv));
967 const struct rxrpc_crypt *session_key)
974 ntohl(session_key->n[0]), ntohl(session_key->n[1]));
979 if (crypto_blkcipher_setkey(rxkad_ci, session_key
965 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument
1005 struct rxrpc_crypt session_key; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c554 u_char session_key[16]; local
583 session_key,
585 mppe_set_keys(challenge, session_key);
604 u_char session_key[MD4_SIGNATURE_SIZE]; local
623 session_key,
626 GenerateAuthenticatorResponse(session_key,
630 mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP],
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dntdomain.h185 DATA_BLOB session_key; member in struct:kerberos_auth_struct
249 DATA_BLOB session_key; member in struct:pipes_struct
H A Dntlmssp.h101 DATA_BLOB session_key; member in struct:ntlmssp_state
H A Dauthdata.h105 uint8 session_key[16]; /* samba4 idl */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dkerberos_verify.c310 DATA_BLOB *session_key)
337 *session_key = data_blob(NULL,0);
456 get_krb5_smb_session_key(context, auth_context, session_key, True);
457 dump_data_pw("SMB session key (from ticket)\n", session_key->data, session_key->length);
303 ads_verify_ticket(TALLOC_CTX *mem_ctx, const char *realm, time_t time_offset, const DATA_BLOB *ticket, char **principal, PAC_DATA **pac_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
H A Dsasl.c147 DATA_BLOB session_key = data_blob(NULL, 0); local
150 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0,
164 data_blob_free(&session_key);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dproxy.c719 HASHHEX session_key; local
750 session_key);
751 DigestCalcResponse(session_key,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/
H A Dsrv_pipe_hnd.c353 p->session_key = data_blob(vuser->session_key.data, vuser->session_key.length);
1236 data_blob_free(&p->session_key);

Completed in 131 milliseconds

12