/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 226 if (netr_gen_credentials(netr_info->session_key.key, in netr_server_authenticate2() 232 if (netr_gen_credentials(netr_info->session_key.key, in netr_server_authenticate2() 327 netr_info->session_key.key); in netr_gen_skey128() 329 netr_info->session_key.len = NETR_SESSKEY128_SZ; in netr_gen_skey128() 409 netr_info->session_key.len = NETR_SESSKEY64_SZ; in netr_gen_skey64() 410 rc = smb_auth_DES(netr_info->session_key.key, in netr_gen_skey64() 411 netr_info->session_key.len, &md4hash[9], NETR_DESKEY_LEN, buffer, in netr_gen_skey64() 445 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, in netr_gen_credentials() argument 461 if (smb_auth_DES(buffer, 8, session_key, NETR_DESKEY_LEN, in netr_gen_credentials() 465 rc = smb_auth_DES(out_cred->data, 8, &session_key[NETR_DESKEY_LEN], in netr_gen_credentials() [all …]
|
H A D | netr_logon.c | 260 bcopy(netr_info->session_key.key, rc4key, netr_info->session_key.len); in netr_setup_token() 416 (void) memcpy(key, netr_info->session_key.key, in netr_interactive_samlogon() 417 netr_info->session_key.len); in netr_interactive_samlogon() 489 if (netr_gen_credentials(netr_info->session_key.key, in netr_setup_authenticator() 531 if (netr_gen_credentials(netr_info->session_key.key, in netr_validate_chain()
|
/titanic_41/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 294 smb_auth_gen_session_key(smb_auth_info_t *auth, unsigned char *session_key) in smb_auth_gen_session_key() argument 299 rc = smb_auth_md4(session_key, auth->hash, SMBAUTH_HASH_SZ); in smb_auth_gen_session_key() 303 SMBAUTH_SESSION_KEY_SZ, session_key); in smb_auth_gen_session_key() 331 unsigned char *session_key) in smb_ntlm_password_ok() argument 342 if (ok && (session_key)) { in smb_ntlm_password_ok() 343 rc = smb_auth_md4(session_key, ntlm_hash, SMBAUTH_HASH_SZ); in smb_ntlm_password_ok() 359 uchar_t *session_key) in smb_ntlmv2_password_ok() argument 411 if (ok && session_key) { in smb_ntlmv2_password_ok() 414 SMBAUTH_SESSION_KEY_SZ, session_key); in smb_ntlmv2_password_ok() 542 uchar_t *session_key) in smb_auth_validate_nt() argument [all …]
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | fwd_tgt.c | 61 krb5_keyblock *session_key; in krb5_fwd_tgt_creds() local 72 retval = krb5_auth_con_getkey (context, auth_context, &session_key); in krb5_fwd_tgt_creds() 75 if (session_key) { in krb5_fwd_tgt_creds() 76 enctype = session_key->enctype; in krb5_fwd_tgt_creds() 77 krb5_free_keyblock (context, session_key); in krb5_fwd_tgt_creds() 78 session_key = NULL; in krb5_fwd_tgt_creds()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | kerberos5.c | 106 static krb5_keyblock *session_key = 0; variable 347 if (session_key) { in kerberos5_send() 348 krb5_free_keyblock(telnet_context, session_key); in kerberos5_send() 349 session_key = 0; in kerberos5_send() 361 &new_creds->keyblock, &session_key); in kerberos5_send() 364 newkey, &session_key); in kerberos5_send() 428 if (session_key) { in kerberos5_reply() 431 skey.data = session_key->contents; in kerberos5_reply() 469 if (session_key) { in kerberos5_reply() 472 skey.data = session_key->contents; in kerberos5_reply()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rlogind.c | 81 static krb5_keyblock *session_key = NULL; variable 545 &session_key); in recvauth() 554 if (session_key == NULL && in recvauth() 563 if (session_key != NULL && in recvauth() 575 if (session_key == NULL) { in recvauth() 582 &session_key); in recvauth() 593 if (session_key == NULL) { in recvauth() 1237 if (session_key->enctype == ENCTYPE_DES_CBC_CRC) { in doit() 1241 ivec.length = session_key->length; in doit() 1242 ivec.data = (char *)session_key->contents; in doit() [all …]
|
H A D | in.telnetd.c | 179 static krb5_keyblock *session_key = NULL; variable 737 if (session_key != NULL) { in kerberos5_is() 738 krb5_free_keyblock(telnet_context, session_key); in kerberos5_is() 739 session_key = 0; in kerberos5_is() 743 newkey, &session_key); in kerberos5_is() 747 ticket->enc_part2->session, &session_key); in kerberos5_is() 756 skey.data = session_key->contents; in kerberos5_is()
|
/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | sshd.c | 1745 u_char session_key[SSH_SESSION_KEY_LENGTH]; in do_ssh1_kex() local 1863 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8); in do_ssh1_kex() 1865 if (len < 0 || len > sizeof(session_key)) { in do_ssh1_kex() 1868 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); in do_ssh1_kex() 1871 (void) memset(session_key, 0, sizeof(session_key)); in do_ssh1_kex() 1873 session_key + sizeof(session_key) - len); in do_ssh1_kex() 1883 session_key[i] ^= session_id[i]; in do_ssh1_kex() 1896 MD5_Final(session_key, &md); in do_ssh1_kex() 1898 MD5_Update(&md, session_key, 16); in do_ssh1_kex() 1901 MD5_Final(session_key + 16, &md); in do_ssh1_kex() [all …]
|
/titanic_41/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 72 krb5_keyblock session_key; in process_as_req() local 96 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in process_as_req() 195 &session_key))) { in process_as_req() 219 enc_tkt_reply.session = &session_key; in process_as_req() 397 reply_encpart.session = &session_key; in process_as_req() 545 if (session_key.contents) in process_as_req() 546 krb5_free_keyblock_contents(kdc_context, &session_key); in process_as_req()
|
H A D | do_tgs_req.c | 82 krb5_keyblock session_key; in process_tgs_req() local 101 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in process_tgs_req() 277 errcode = krb5_c_make_random_key(kdc_context, useenctype, &session_key); in process_tgs_req() 477 enc_tkt_reply.session = &session_key; in process_tgs_req() 646 reply_encpart.session = &session_key; in process_tgs_req() 754 if (session_key.contents) in process_tgs_req() 755 krb5_free_keyblock_contents(kdc_context, &session_key); in process_tgs_req()
|
H A D | kdc_preauth.c | 2069 krb5_keyblock session_key; in get_sam_edata() local 2073 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in get_sam_edata() 2078 &session_key); in get_sam_edata() 2089 if (session_key.length != 8) { in get_sam_edata() 2097 inputblock[i] = '0' + ((session_key.contents[i]/2) % 10); in get_sam_edata() 2099 if (session_key.contents) in get_sam_edata() 2100 krb5_free_keyblock_contents(kdc_context, &session_key); in get_sam_edata()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/ |
H A D | rsh.c | 62 static krb5_keyblock *session_key; variable 615 session_key = &cred->keyblock; in main() 621 &session_key); in main() 627 if (session_key == NULL) { in main() 634 eblock.crypto_entry = session_key->enctype; in main() 635 eblock.key = (krb5_keyblock *)session_key; in main()
|
H A D | rcp.c | 140 static krb5_keyblock *session_key; /* static key for session */ variable 658 session_key = &cred->keyblock; in toremote() 661 status = krb5_auth_con_getlocalsubkey(bsd_context, auth_context, &session_key); in toremote() 669 if (!session_key) { in toremote() 678 session_key->enctype; in toremote() 680 (krb5_keyblock *)session_key; in toremote() 879 session_key = &cred->keyblock; in tolocal() 883 &session_key); in tolocal() 890 if (!session_key) { in tolocal() 897 eblock.crypto_entry = session_key->enctype; in tolocal() [all …]
|
H A D | rlogin.c | 95 static krb5_keyblock *session_key; variable 696 session_key = &cred->keyblock; in main() 702 &session_key); in main() 708 if (session_key == NULL) { in main() 716 eblock.crypto_entry = session_key->enctype; in main() 717 eblock.key = (krb5_keyblock *)session_key; in main()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/rdist/ |
H A D | docmd.c | 396 session_key = &cred->keyblock; 401 &session_key); 407 if (!session_key) { 414 eblock.crypto_entry = session_key->enctype; 415 eblock.key = (krb5_keyblock *)session_key;
|
H A D | krb5defs.h | 63 static krb5_keyblock *session_key; variable
|
/titanic_41/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 966 u_char session_key[SSH_SESSION_KEY_LENGTH]; in ssh_kex() local 1035 session_key[i] = rand & 0xff; in ssh_kex() 1050 BN_add_word(key, session_key[i] ^ session_id[i]); in ssh_kex() 1052 BN_add_word(key, session_key[i]); in ssh_kex() 1127 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); in ssh_kex() 1130 memset(session_key, 0, sizeof(session_key)); in ssh_kex()
|
/titanic_41/usr/src/uts/common/smbsrv/ |
H A D | netrauth.h | 101 netr_session_key_t session_key; member
|
/titanic_41/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 2469 allow session_key_int != sizeof(session_key)
|