/freebsd/contrib/telnet/libtelnet/ |
H A D | kerberos.c | 85 static Block session_key = { 0 }; variable 202 DES_random_key(&session_key); in kerberos4_send() 203 DES_ecb_encrypt(&session_key, &session_key, sched, 0); in kerberos4_send() 204 DES_ecb_encrypt(&session_key, &challenge, sched, 0); in kerberos4_send() 268 memmove((void *)session_key, (void *)adat.session, sizeof(Block)); in kerberos4_is() 283 if (!VALIDKEY(session_key)) { in kerberos4_is() 293 DES_key_sched(&session_key, sched); in kerberos4_is() 300 DES_ecb_encrypt(&datablock, &session_key, sched, 1); in kerberos4_is() 303 skey.data = session_key; in kerberos4_is() 357 Data(ap, KRB_CHALLENGE, session_key, in kerberos4_reply() [all …]
|
H A D | krb4encpwd.c | 105 static Block session_key = { 0 }; variable 225 memmove((void *)session_key, (void *)adat.session, sizeof(Block));
|
/freebsd/crypto/heimdal/kuser/ |
H A D | kdigest.c | 138 krb5_data session_key; in digest_server_request() local 206 ret = krb5_digest_get_session_key(context, digest, &session_key); in digest_server_request() 210 if (session_key.length) { in digest_server_request() 212 hex_encode(session_key.data, session_key.length, &key); in digest_server_request() 215 krb5_data_free(&session_key); in digest_server_request()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 357 int get_asymetric_start_key(const u8 *master_key, u8 *session_key, in get_asymetric_start_key() argument 414 os_memcpy(session_key, digest, session_key_len); in get_asymetric_start_key()
|
H A D | ms_funcs.h | 43 int get_asymetric_start_key(const u8 *master_key, u8 *session_key,
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 1162 pkeyid = session_key( in receive() 1177 session_key(&rbufp->recv_srcadr, in receive() 1179 tkeyid = session_key( in receive() 1183 tkeyid = session_key( in receive() 2499 tkeyid = session_key( in receive() 4484 session_key(&peer->dstadr->sin, &peer->srcadr, in peer_xmit() 4820 cookie = session_key(&rbufp->recv_srcadr, in fast_xmit() 4823 session_key(&rbufp->dstadr->sin, in fast_xmit() 4831 session_key(&rbufp->dstadr->sin, in fast_xmit()
|
H A D | ntp_crypto.c | 219 * session_key - generate session key 229 session_key( in session_key() function 280 DPRINTF(2, ("session_key: %s > %s %08x %08x hash %08x life %lu\n", in session_key() 358 keyid = session_key(&dstadr->sin, &peer->srcadr, keyid, in make_keylist()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | digest.c | 984 r.u.response.session_key = in _kdc_do_digest() 985 calloc(1, sizeof(*r.u.response.session_key)); in _kdc_do_digest() 986 if (r.u.response.session_key == NULL) { in _kdc_do_digest() 992 ret = krb5_data_copy(r.u.response.session_key, md, 16); in _kdc_do_digest()
|
H A D | kerberos5.c | 980 EncryptionKey *reply_key = NULL, session_key; in _kdc_as_rep() local 987 memset(&session_key, 0, sizeof(session_key)); in _kdc_as_rep()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | pkinit.c | 1320 krb5_keyblock *session_key, in _krb5_pk_kx_confirm() argument 1335 heim_assert(session_key != NULL, "session key is non-NULL"); in _krb5_pk_kx_confirm() 1377 &p1, &p2, session_key->keytype, in _krb5_pk_kx_confirm() 1382 if (sk_verify.keytype != session_key->keytype || in _krb5_pk_kx_confirm() 1383 krb5_data_ct_cmp(&sk_verify.keyvalue, &session_key->keyvalue) != 0) { in _krb5_pk_kx_confirm()
|
H A D | digest.c | 824 if (digest->response.session_key == NULL) in krb5_digest_get_session_key() 826 ret = der_copy_octet_string(digest->response.session_key, data); in krb5_digest_get_session_key()
|
/freebsd/contrib/ntp/include/ |
H A D | ntpd.h | 219 extern keyid_t session_key (sockaddr_u *, sockaddr_u *, keyid_t,
|
/freebsd/sys/dev/bnxt/bnxt_en/ |
H A D | hsi_struct_def.h | 2804 uint8_t session_key[32]; member 3121 uint8_t session_key[32]; member
|
/freebsd/contrib/ntp/ |
H A D | CommitLog-4.1.0 | 6023 * libntp/a_md5encrypt.c (session_key): Cast 2nd arg to MD5auth_setkey.
|