Searched refs:session_key (Results 1 - 25 of 27) sorted by relevance

12

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/
H A Ddebug.c58 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
59 auth_tok->session_key.flags);
60 if (auth_tok->session_key.flags
64 if (auth_tok->session_key.flags
68 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
71 " * session_key.decrypted_key_size = [0x%x]\n",
72 auth_tok->session_key.decrypted_key_size);
76 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
79 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
82 " * session_key
[all...]
H A Dkeystore.c138 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument
156 + session_key->encrypted_key_size);
175 rc = write_packet_length(&message[i], session_key->encrypted_key_size,
183 memcpy(&message[i], session_key->encrypted_key,
184 session_key->encrypted_key_size);
185 i += session_key->encrypted_key_size;
192 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u16 *cipher_code, argument
250 session_key->decrypted_key_size = m_size - 3;
251 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
254 session_key
932 char *session_key; local
[all...]
H A Decryptfs_kernel.h148 struct ecryptfs_session_key session_key; member in struct:ecryptfs_auth_tok
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dntlmssp_sign.c82 DATA_BLOB session_key,
93 MD5Update(&ctx3, session_key.data, session_key.length);
155 if (!ntlmssp_state->session_key.length) {
180 if (!ntlmssp_state->session_key.length) {
225 if (!ntlmssp_state->session_key.length) {
292 if (!ntlmssp_state->session_key.length) {
322 if (!ntlmssp_state->session_key.length) {
357 ntlmssp_state->session_key, send_sign_const);
364 ntlmssp_state->session_key, send_seal_cons
81 calc_ntlmv2_hash(unsigned char hash[258], unsigned char digest[16], DATA_BLOB session_key, const char *constant) argument
[all...]
H A Dcredentials.c45 uchar session_key[8])
56 cred_hash1(session_key, sum2, pass);
64 DEBUG(5,(" sess_key : %s\n", credstr(session_key)));
79 void cred_create(uchar session_key[8], DOM_CHAL *stor_cred, UTIME timestamp, argument
87 cred_hash2(cred->data, time_cred.data, session_key);
92 DEBUG(5,(" sess_key : %s\n", credstr(session_key)));
113 int cred_assert(DOM_CHAL *cred, uchar session_key[8], DOM_CHAL *stored_cred, argument
118 cred_create(session_key, stored_cred, timestamp, &cred2);
44 cred_session_key(const DOM_CHAL *clnt_chal, const DOM_CHAL *srv_chal, const uchar *pass, uchar session_key[8]) argument
H A Dntlmssp.c496 DATA_BLOB session_key = data_blob(NULL, 0); local
695 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16);
697 sizeof(session_nonce), session_key.data);
699 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length);
703 session_key = data_blob(NULL, 0);
708 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16);
710 session_key.data);
712 dump_data_pw("LM session key:\n", session_key.data, session_key
881 DATA_BLOB session_key = data_blob(NULL, 0); local
[all...]
H A Dcliconnect.c46 * @param session_key The session key used. (A copy of this is taken for the cli struct)
50 static void cli_set_session_key (struct cli_state *cli, const DATA_BLOB session_key) argument
52 cli->user_session_key = data_blob(session_key.data, session_key.length);
62 DATA_BLOB session_key = data_blob(NULL, 0); local
132 if (session_key.data) {
134 cli_set_session_key(cli, session_key);
287 DATA_BLOB session_key = data_blob(NULL, 0); local
307 &lm_response, &nt_response, &session_key)) {
339 session_key
[all...]
H A Dclikrb5.c498 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote) argument
510 *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey));
511 dump_data_pw("KRB5 Session Key:\n", session_key->data, session_key->length);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/
H A Dar-key.c114 tsec->session_key[0], tsec->session_key[1],
115 tsec->session_key[2], tsec->session_key[3],
116 tsec->session_key[4], tsec->session_key[5],
117 tsec->session_key[6], tsec->session_key[7]);
287 const void *session_key,
316 memcpy(&data.tsec.session_key, session_ke
286 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument
[all...]
H A Drxkad.c78 if (crypto_blkcipher_setkey(ci, payload->k.session_key,
79 sizeof(payload->k.session_key)) < 0)
127 memcpy(&iv, payload->k.session_key, sizeof(iv));
225 memcpy(&iv, payload->k.session_key, sizeof(iv));
433 memcpy(&iv, payload->k.session_key, sizeof(iv));
718 memcpy(&iv, s2->session_key, sizeof(iv));
961 const struct rxrpc_crypt *session_key)
968 ntohl(session_key->n[0]), ntohl(session_key->n[1]));
973 if (crypto_blkcipher_setkey(rxkad_ci, session_key
959 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument
1000 struct rxrpc_crypt session_key; local
[all...]
H A Dar-internal.h406 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/
H A Dpassword.c81 data_blob_free(&vuser->session_key);
115 * @param session_key The User session key for the login session (now also 'owned' by register_vuid)
126 int register_vuid(auth_serversupplied_info *server_info, DATA_BLOB session_key, DATA_BLOB response_blob, const char *smb_name) argument
132 data_blob_free(&session_key);
138 data_blob_free(&session_key);
144 data_blob_free(&session_key);
173 data_blob_free(&session_key);
215 vuser->session_key = session_key;
229 data_blob_free(&session_key);
[all...]
H A Dsesssetup.c157 DATA_BLOB session_key = data_blob(NULL, 0); local
172 ret = ads_verify_ticket(lp_realm(), &ticket, &client, &auth_data, &ap_rep, &session_key);
189 data_blob_free(&session_key);
199 data_blob_free(&session_key);
258 data_blob_free(&session_key);
273 data_blob_free(&session_key);
285 /* register_vuid takes ownership of session_key, no need to free after this.
287 sess_vuid = register_vuid(server_info, session_key, nullblob, client);
365 DATA_BLOB session_key = data_blob((*auth_ntlmssp_state)->ntlmssp_state->session_key local
695 DATA_BLOB session_key; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth_diagnostics.c55 DATA_BLOB session_key = data_blob(NULL, 16); local
76 SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data);
136 if (memcmp(session_key.data, user_session_key,
142 dump_data(1, (const char *)session_key.data, session_key.length);
244 DATA_BLOB session_key = data_blob(NULL, 16); local
261 SMBsesskeygen_ntv1((const unsigned char *)nt_hash, NULL, session_key.data);
294 if (memcmp(session_key.data, user_session_key,
300 dump_data(1, (const char *)session_key.data, session_key
[all...]
H A Dntlm_auth.c900 DATA_BLOB session_key; local
916 &session_key);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/
H A Dppp_mppe.c104 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state
148 nbytes += setup_sg(&sg[2], state->session_key, state->keylen);
174 setup_sg(sg_out, state->session_key, state->keylen);
180 memcpy(state->session_key, InterimKey, state->keylen);
184 state->session_key[0] = 0xd1;
185 state->session_key[1] = 0x26;
186 state->session_key[2] = 0x9e;
188 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen);
232 memcpy(state->session_key, state->master_key,
304 char skey[sizeof(state->session_key) *
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c554 u_char session_key[16]; local
583 session_key,
585 mppe_set_keys(challenge, session_key);
604 u_char session_key[MD4_SIGNATURE_SIZE]; local
623 session_key,
626 GenerateAuthenticatorResponse(session_key,
630 mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP],
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/
H A Dkerberos_verify.c254 DATA_BLOB *session_key)
273 ZERO_STRUCTP(session_key);
362 get_krb5_smb_session_key(context, auth_context, session_key, True);
363 dump_data_pw("SMB session key (from ticket)\n", session_key->data, session_key->length);
251 ads_verify_ticket(const char *realm, const DATA_BLOB *ticket, char **principal, DATA_BLOB *auth_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
H A Dsasl.c142 DATA_BLOB session_key = data_blob(NULL, 0); local
145 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key);
158 data_blob_free(&session_key);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dntlmssp.h92 DATA_BLOB session_key; member in struct:ntlmssp_state
H A Dntdomain.h242 DATA_BLOB session_key; member in struct:pipes_struct
H A Dincludes.h1338 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/
H A Dsrv_pipe_hnd.c343 p->session_key = data_blob(vuser->session_key.data, vuser->session_key.length);
1132 data_blob_free(&p->session_key);
H A Dsrv_pipe.c504 if (p->session_key.data) {
505 data_blob_free(&p->session_key);
507 p->session_key = data_blob(server_info->lm_session_key.data, server_info->lm_session_key.length);
H A Dsrv_samr_nt.c3093 if (!p->session_key.length) {
3096 SamOEMhashBlob(ctr->info.id24->pass, 516, &p->session_key);
3114 if (!p->session_key.length) {
3117 SamOEMhashBlob(ctr->info.id25->pass, 532, &p->session_key);
3129 if (!p->session_key.length) {
3132 SamOEMhashBlob(ctr->info.id23->pass, 516, &p->session_key);

Completed in 234 milliseconds

12