/freebsd/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | kdc.c | 51 krb5_data sessionkey; member 221 krb5_data_free(&c->sessionkey); in kdc_destroy() 348 struct ntlm_buf *sessionkey) in kdc_type3() argument 353 sessionkey->data = NULL; in kdc_type3() 354 sessionkey->length = 0; in kdc_type3() 372 if (type3->sessionkey.length) { in kdc_type3() 374 type3->sessionkey.data, in kdc_type3() 375 type3->sessionkey.length); in kdc_type3() 394 if (type3->sessionkey.length) { in kdc_type3() 397 &c->sessionkey); in kdc_type3() [all …]
|
H A D | init_sec_context.c | 338 struct ntlm_buf sessionkey; in _gss_ntlm_init_sec_context() local 370 &sessionkey, in _gss_ntlm_init_sec_context() 371 &type3.sessionkey); in _gss_ntlm_init_sec_context() 382 ret = krb5_data_copy(&ctx->sessionkey, in _gss_ntlm_init_sec_context() 383 sessionkey.data, sessionkey.length); in _gss_ntlm_init_sec_context() 384 free(sessionkey.data); in _gss_ntlm_init_sec_context() 397 struct ntlm_buf sessionkey; in _gss_ntlm_init_sec_context() local 434 &sessionkey, in _gss_ntlm_init_sec_context() 435 &type3.sessionkey); in _gss_ntlm_init_sec_context() 446 ret = krb5_data_copy(&ctx->sessionkey, in _gss_ntlm_init_sec_context() [all …]
|
H A D | accept_sec_context.c | 222 ret = krb5_data_copy(&ctx->sessionkey, in _gss_ntlm_accept_sec_context() 239 ctx->sessionkey.data, in _gss_ntlm_accept_sec_context() 240 ctx->sessionkey.length); in _gss_ntlm_accept_sec_context() 243 ctx->sessionkey.data, in _gss_ntlm_accept_sec_context() 244 ctx->sessionkey.length); in _gss_ntlm_accept_sec_context() 247 ctx->sessionkey.length, in _gss_ntlm_accept_sec_context() 248 ctx->sessionkey.data); in _gss_ntlm_accept_sec_context() 250 ctx->sessionkey.length, in _gss_ntlm_accept_sec_context() 251 ctx->sessionkey.data); in _gss_ntlm_accept_sec_context()
|
H A D | inquire_sec_context_by_oid.c | 55 value.length = ctx->sessionkey.length; in _gss_ntlm_inquire_sec_context_by_oid() 56 value.value = ctx->sessionkey.data; in _gss_ntlm_inquire_sec_context_by_oid()
|
H A D | ntlm.h | 120 krb5_data sessionkey; member
|
/freebsd/crypto/heimdal/lib/gssapi/ |
H A D | test_ntlm.c | 125 struct ntlm_buf sessionkey; in test_libntlm_v1() local 127 &sessionkey, in test_libntlm_v1() 128 &type3.sessionkey); in test_libntlm_v1() 129 free(sessionkey.data); in test_libntlm_v1() 255 struct ntlm_buf sessionkey; in test_libntlm_v2() local 257 &sessionkey, in test_libntlm_v2() 258 &type3.sessionkey); in test_libntlm_v2() 259 free(sessionkey.data); in test_libntlm_v2()
|
/freebsd/lib/libc/rpc/ |
H A D | svc_auth_des.c | 118 des_block *sessionkey; in _svcauth_des() local 178 sessionkey = &cred->adc_fullname.key; in _svcauth_des() 186 sessionkey) < 0) { in _svcauth_des() 196 sessionkey = &authdes_cache[sid].key; in _svcauth_des() 208 status = cbc_crypt((char *)sessionkey, (char *)cryptbuf, in _svcauth_des() 212 status = ecb_crypt((char *)sessionkey, (char *)cryptbuf, in _svcauth_des() 245 sid = cache_spot(sessionkey, cred->adc_fullname.name, in _svcauth_des() 291 status = ecb_crypt((char *)sessionkey, (char *)cryptbuf, in _svcauth_des() 332 entry->key = *sessionkey; in _svcauth_des()
|
/freebsd/crypto/heimdal/kcm/ |
H A D | protocol.c | 1442 struct ntlm_buf ndata, sessionkey; in kcm_op_do_ntlm() local 1449 sessionkey.data = NULL; in kcm_op_do_ntlm() 1450 sessionkey.length = 0; in kcm_op_do_ntlm() 1498 struct ntlm_buf sessionkey; in kcm_op_do_ntlm() local 1525 &sessionkey, in kcm_op_do_ntlm() 1526 &type3.sessionkey); in kcm_op_do_ntlm() 1535 free(sessionkey.data); in kcm_op_do_ntlm() 1546 struct ntlm_buf sessionkey; in kcm_op_do_ntlm() 1583 &sessionkey, in kcm_op_do_ntlm() 1584 &type3.sessionkey); in kcm_op_do_ntlm() [all …]
|
/freebsd/crypto/heimdal/lib/ntlm/ |
H A D | ntlm.c | 826 heim_ntlm_free_buf(&data->sessionkey); in heim_ntlm_free_type3() 843 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; in heim_ntlm_decode_type3() local 847 memset(&sessionkey, 0, sizeof(sessionkey)); in heim_ntlm_decode_type3() 877 CHECK(ret_sec_buffer(in, &sessionkey), 0); in heim_ntlm_decode_type3() 878 min_offset = max(min_offset, sessionkey.offset); in heim_ntlm_decode_type3() 890 if (sessionkey.offset) in heim_ntlm_decode_type3() 891 CHECK(ret_buf(in, &sessionkey, &type3->sessionkey), 0); in heim_ntlm_decode_type3() 918 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; in heim_ntlm_encode_type3() local 929 memset(&sessionkey, 0, sizeof(sessionkey)); in heim_ntlm_encode_type3() 963 sessionkey.offset = ntlm.offset + ntlm.allocated; in heim_ntlm_encode_type3() [all …]
|
H A D | heimntlm.h | 149 struct ntlm_buf sessionkey; /**< */ member
|
H A D | heimntlm-protos.h | 92 const unsigned char sessionkey[16],
|
/freebsd/crypto/heimdal/kdc/ |
H A D | digest-service.c | 58 unsigned char sessionkey[16]; in ntlm_service() local 78 ntp.sessionkey = NULL; in ntlm_service() 144 sessionkey); in ntlm_service() 192 EVP_DigestFinal_ex(ctxp, sessionkey, NULL); in ntlm_service()
|
H A D | digest.c | 1141 unsigned char sessionkey[16]; in _kdc_do_digest() local 1150 r.u.ntlmResponse.sessionkey = NULL; in _kdc_do_digest() 1249 sessionkey); in _kdc_do_digest() 1328 EVP_DigestFinal_ex(ctx, sessionkey, NULL); in _kdc_do_digest() 1334 if (ireq.u.ntlmRequest.sessionkey) { in _kdc_do_digest() 1347 len = ireq.u.ntlmRequest.sessionkey->length; in _kdc_do_digest() 1364 EVP_CipherInit_ex(rc4, EVP_rc4(), NULL, sessionkey, NULL, 1); in _kdc_do_digest() 1366 masterkey, ireq.u.ntlmRequest.sessionkey->data, in _kdc_do_digest() 1370 r.u.ntlmResponse.sessionkey = in _kdc_do_digest() 1371 malloc(sizeof(*r.u.ntlmResponse.sessionkey)); in _kdc_do_digest() [all …]
|
H A D | krb5tgs.c | 736 const krb5_keyblock *sessionkey, in tgs_make_reply() argument 922 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); in tgs_make_reply() 1499 krb5_keyblock sessionkey; in tgs_build_reply() local 1520 memset(&sessionkey, 0, sizeof(sessionkey)); in tgs_build_reply() 1724 ret = krb5_generate_random_keyblock(context, etype, &sessionkey); in tgs_build_reply() 2214 ret = krb5_crypto_init(context, &sessionkey, 0, &crypto); in tgs_build_reply() 2249 &sessionkey, in tgs_build_reply() 2275 krb5_free_keyblock_contents(context, &sessionkey); in tgs_build_reply()
|
H A D | pkinit.c | 1249 krb5_keyblock *sessionkey, in _kdc_pk_mk_pa_reply() argument 1326 sessionkey); in _kdc_pk_mk_pa_reply() 1380 sessionkey); in _kdc_pk_mk_pa_reply() 1475 sessionkey); in _kdc_pk_mk_pa_reply()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 1131 void *sessionkey, size_t length) in krb5_ntlm_req_set_session() argument 1133 ntlm->request.sessionkey = calloc(1, sizeof(*ntlm->request.sessionkey)); in krb5_ntlm_req_set_session() 1134 if (ntlm->request.sessionkey == NULL) { in krb5_ntlm_req_set_session() 1138 ntlm->request.sessionkey->data = malloc(length); in krb5_ntlm_req_set_session() 1139 if (ntlm->request.sessionkey->data == NULL && length != 0) { in krb5_ntlm_req_set_session() 1143 memcpy(ntlm->request.sessionkey->data, sessionkey, length); in krb5_ntlm_req_set_session() 1144 ntlm->request.sessionkey->length = length; in krb5_ntlm_req_set_session() 1160 if (ntlm->response.sessionkey == NULL) { in krb5_ntlm_rep_get_sessionkey() 1167 ntlm->response.sessionkey->data, in krb5_ntlm_rep_get_sessionkey() 1168 ntlm->response.sessionkey->length); in krb5_ntlm_rep_get_sessionkey()
|
H A D | ticket.c | 193 krb5_keyblock *sessionkey, in find_type_in_ad() argument 240 sessionkey, &child, level + 1); in find_type_in_ad() 276 ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf, in find_type_in_ad() 290 ret = find_type_in_ad(context, type, data, found, failp, sessionkey, in find_type_in_ad()
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | digest.asn1 | 93 sessionkey [7] OCTET STRING OPTIONAL 99 sessionkey [2] OCTET STRING OPTIONAL, 115 sessionkey [2] OCTET STRING OPTIONAL
|
/freebsd/crypto/heimdal/doc/doxyout/ntlm/ |
H A D | manpages | 35 ntlm/man/man3/sessionkey.3
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2006 | 70 * lib/krb5/digest.c: Add sessionkey accessor functions.
|