/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | debug.c | 58 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n", 59 auth_tok->session_key.flags); 60 if (auth_tok->session_key.flags 64 if (auth_tok->session_key.flags 68 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { 71 " * session_key.decrypted_key_size = [0x%x]\n", 72 auth_tok->session_key.decrypted_key_size); 76 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, 79 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { 82 " * session_key [all...] |
H A D | keystore.c | 138 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument 156 + session_key->encrypted_key_size); 175 rc = write_packet_length(&message[i], session_key->encrypted_key_size, 183 memcpy(&message[i], session_key->encrypted_key, 184 session_key->encrypted_key_size); 185 i += session_key->encrypted_key_size; 192 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u16 *cipher_code, argument 250 session_key->decrypted_key_size = m_size - 3; 251 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { 254 session_key 932 char *session_key; local [all...] |
H A D | ecryptfs_kernel.h | 148 struct ecryptfs_session_key session_key; member in struct:ecryptfs_auth_tok
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | ntlmssp_sign.c | 82 DATA_BLOB session_key, 93 MD5Update(&ctx3, session_key.data, session_key.length); 155 if (!ntlmssp_state->session_key.length) { 180 if (!ntlmssp_state->session_key.length) { 225 if (!ntlmssp_state->session_key.length) { 292 if (!ntlmssp_state->session_key.length) { 322 if (!ntlmssp_state->session_key.length) { 357 ntlmssp_state->session_key, send_sign_const); 364 ntlmssp_state->session_key, send_seal_cons 81 calc_ntlmv2_hash(unsigned char hash[258], unsigned char digest[16], DATA_BLOB session_key, const char *constant) argument [all...] |
H A D | credentials.c | 45 uchar session_key[8]) 56 cred_hash1(session_key, sum2, pass); 64 DEBUG(5,(" sess_key : %s\n", credstr(session_key))); 79 void cred_create(uchar session_key[8], DOM_CHAL *stor_cred, UTIME timestamp, argument 87 cred_hash2(cred->data, time_cred.data, session_key); 92 DEBUG(5,(" sess_key : %s\n", credstr(session_key))); 113 int cred_assert(DOM_CHAL *cred, uchar session_key[8], DOM_CHAL *stored_cred, argument 118 cred_create(session_key, stored_cred, timestamp, &cred2); 44 cred_session_key(const DOM_CHAL *clnt_chal, const DOM_CHAL *srv_chal, const uchar *pass, uchar session_key[8]) argument
|
H A D | ntlmssp.c | 496 DATA_BLOB session_key = data_blob(NULL, 0); local 695 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16); 697 sizeof(session_nonce), session_key.data); 699 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length); 703 session_key = data_blob(NULL, 0); 708 session_key = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 16); 710 session_key.data); 712 dump_data_pw("LM session key:\n", session_key.data, session_key 881 DATA_BLOB session_key = data_blob(NULL, 0); local [all...] |
H A D | cliconnect.c | 46 * @param session_key The session key used. (A copy of this is taken for the cli struct) 50 static void cli_set_session_key (struct cli_state *cli, const DATA_BLOB session_key) argument 52 cli->user_session_key = data_blob(session_key.data, session_key.length); 62 DATA_BLOB session_key = data_blob(NULL, 0); local 132 if (session_key.data) { 134 cli_set_session_key(cli, session_key); 287 DATA_BLOB session_key = data_blob(NULL, 0); local 307 &lm_response, &nt_response, &session_key)) { 339 session_key [all...] |
H A D | clikrb5.c | 498 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote) argument 510 *session_key = data_blob(KRB5_KEY_DATA(skey), KRB5_KEY_LENGTH(skey)); 511 dump_data_pw("KRB5 Session Key:\n", session_key->data, session_key->length);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/ |
H A D | ar-key.c | 114 tsec->session_key[0], tsec->session_key[1], 115 tsec->session_key[2], tsec->session_key[3], 116 tsec->session_key[4], tsec->session_key[5], 117 tsec->session_key[6], tsec->session_key[7]); 287 const void *session_key, 316 memcpy(&data.tsec.session_key, session_ke 286 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) argument [all...] |
H A D | rxkad.c | 78 if (crypto_blkcipher_setkey(ci, payload->k.session_key, 79 sizeof(payload->k.session_key)) < 0) 127 memcpy(&iv, payload->k.session_key, sizeof(iv)); 225 memcpy(&iv, payload->k.session_key, sizeof(iv)); 433 memcpy(&iv, payload->k.session_key, sizeof(iv)); 718 memcpy(&iv, s2->session_key, sizeof(iv)); 961 const struct rxrpc_crypt *session_key) 968 ntohl(session_key->n[0]), ntohl(session_key->n[1])); 973 if (crypto_blkcipher_setkey(rxkad_ci, session_key 959 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument 1000 struct rxrpc_crypt session_key; local [all...] |
H A D | ar-internal.h | 406 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | password.c | 81 data_blob_free(&vuser->session_key); 115 * @param session_key The User session key for the login session (now also 'owned' by register_vuid) 126 int register_vuid(auth_serversupplied_info *server_info, DATA_BLOB session_key, DATA_BLOB response_blob, const char *smb_name) argument 132 data_blob_free(&session_key); 138 data_blob_free(&session_key); 144 data_blob_free(&session_key); 173 data_blob_free(&session_key); 215 vuser->session_key = session_key; 229 data_blob_free(&session_key); [all...] |
H A D | sesssetup.c | 157 DATA_BLOB session_key = data_blob(NULL, 0); local 172 ret = ads_verify_ticket(lp_realm(), &ticket, &client, &auth_data, &ap_rep, &session_key); 189 data_blob_free(&session_key); 199 data_blob_free(&session_key); 258 data_blob_free(&session_key); 273 data_blob_free(&session_key); 285 /* register_vuid takes ownership of session_key, no need to free after this. 287 sess_vuid = register_vuid(server_info, session_key, nullblob, client); 365 DATA_BLOB session_key = data_blob((*auth_ntlmssp_state)->ntlmssp_state->session_key local 695 DATA_BLOB session_key; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth_diagnostics.c | 55 DATA_BLOB session_key = data_blob(NULL, 16); local 76 SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data); 136 if (memcmp(session_key.data, user_session_key, 142 dump_data(1, (const char *)session_key.data, session_key.length); 244 DATA_BLOB session_key = data_blob(NULL, 16); local 261 SMBsesskeygen_ntv1((const unsigned char *)nt_hash, NULL, session_key.data); 294 if (memcmp(session_key.data, user_session_key, 300 dump_data(1, (const char *)session_key.data, session_key [all...] |
H A D | ntlm_auth.c | 900 DATA_BLOB session_key; local 916 &session_key);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/ |
H A D | ppp_mppe.c | 104 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 148 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); 174 setup_sg(sg_out, state->session_key, state->keylen); 180 memcpy(state->session_key, InterimKey, state->keylen); 184 state->session_key[0] = 0xd1; 185 state->session_key[1] = 0x26; 186 state->session_key[2] = 0x9e; 188 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); 232 memcpy(state->session_key, state->master_key, 304 char skey[sizeof(state->session_key) * [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 554 u_char session_key[16]; local 583 session_key, 585 mppe_set_keys(challenge, session_key); 604 u_char session_key[MD4_SIGNATURE_SIZE]; local 623 session_key, 626 GenerateAuthenticatorResponse(session_key, 630 mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP],
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/ |
H A D | kerberos_verify.c | 254 DATA_BLOB *session_key) 273 ZERO_STRUCTP(session_key); 362 get_krb5_smb_session_key(context, auth_context, session_key, True); 363 dump_data_pw("SMB session key (from ticket)\n", session_key->data, session_key->length); 251 ads_verify_ticket(const char *realm, const DATA_BLOB *ticket, char **principal, DATA_BLOB *auth_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
|
H A D | sasl.c | 142 DATA_BLOB session_key = data_blob(NULL, 0); local 145 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key); 158 data_blob_free(&session_key);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | ntlmssp.h | 92 DATA_BLOB session_key; member in struct:ntlmssp_state
|
H A D | ntdomain.h | 242 DATA_BLOB session_key; member in struct:pipes_struct
|
H A D | includes.h | 1338 BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/ |
H A D | srv_pipe_hnd.c | 343 p->session_key = data_blob(vuser->session_key.data, vuser->session_key.length); 1132 data_blob_free(&p->session_key);
|
H A D | srv_pipe.c | 504 if (p->session_key.data) { 505 data_blob_free(&p->session_key); 507 p->session_key = data_blob(server_info->lm_session_key.data, server_info->lm_session_key.length);
|
H A D | srv_samr_nt.c | 3093 if (!p->session_key.length) { 3096 SamOEMhashBlob(ctr->info.id24->pass, 516, &p->session_key); 3114 if (!p->session_key.length) { 3117 SamOEMhashBlob(ctr->info.id25->pass, 532, &p->session_key); 3129 if (!p->session_key.length) { 3132 SamOEMhashBlob(ctr->info.id23->pass, 516, &p->session_key);
|