Home
last modified time | relevance | path

Searched refs:session_key (Results 1 – 19 of 19) sorted by relevance

/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c226 if (netr_gen_credentials(netr_info->session_key.key, in netr_server_authenticate2()
232 if (netr_gen_credentials(netr_info->session_key.key, in netr_server_authenticate2()
327 netr_info->session_key.key); in netr_gen_skey128()
329 netr_info->session_key.len = NETR_SESSKEY128_SZ; in netr_gen_skey128()
409 netr_info->session_key.len = NETR_SESSKEY64_SZ; in netr_gen_skey64()
410 rc = smb_auth_DES(netr_info->session_key.key, in netr_gen_skey64()
411 netr_info->session_key.len, &md4hash[9], NETR_DESKEY_LEN, buffer, in netr_gen_skey64()
445 netr_gen_credentials(BYTE *session_key, netr_cred_t *challenge, in netr_gen_credentials() argument
461 if (smb_auth_DES(buffer, 8, session_key, NETR_DESKEY_LEN, in netr_gen_credentials()
465 rc = smb_auth_DES(out_cred->data, 8, &session_key[NETR_DESKEY_LEN], in netr_gen_credentials()
[all …]
H A Dnetr_logon.c260 bcopy(netr_info->session_key.key, rc4key, netr_info->session_key.len); in netr_setup_token()
416 (void) memcpy(key, netr_info->session_key.key, in netr_interactive_samlogon()
417 netr_info->session_key.len); in netr_interactive_samlogon()
489 if (netr_gen_credentials(netr_info->session_key.key, in netr_setup_authenticator()
531 if (netr_gen_credentials(netr_info->session_key.key, in netr_validate_chain()
/titanic_41/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c294 smb_auth_gen_session_key(smb_auth_info_t *auth, unsigned char *session_key) in smb_auth_gen_session_key() argument
299 rc = smb_auth_md4(session_key, auth->hash, SMBAUTH_HASH_SZ); in smb_auth_gen_session_key()
303 SMBAUTH_SESSION_KEY_SZ, session_key); in smb_auth_gen_session_key()
331 unsigned char *session_key) in smb_ntlm_password_ok() argument
342 if (ok && (session_key)) { in smb_ntlm_password_ok()
343 rc = smb_auth_md4(session_key, ntlm_hash, SMBAUTH_HASH_SZ); in smb_ntlm_password_ok()
359 uchar_t *session_key) in smb_ntlmv2_password_ok() argument
411 if (ok && session_key) { in smb_ntlmv2_password_ok()
414 SMBAUTH_SESSION_KEY_SZ, session_key); in smb_ntlmv2_password_ok()
542 uchar_t *session_key) in smb_auth_validate_nt() argument
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dfwd_tgt.c61 krb5_keyblock *session_key; in krb5_fwd_tgt_creds() local
72 retval = krb5_auth_con_getkey (context, auth_context, &session_key); in krb5_fwd_tgt_creds()
75 if (session_key) { in krb5_fwd_tgt_creds()
76 enctype = session_key->enctype; in krb5_fwd_tgt_creds()
77 krb5_free_keyblock (context, session_key); in krb5_fwd_tgt_creds()
78 session_key = NULL; in krb5_fwd_tgt_creds()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c106 static krb5_keyblock *session_key = 0; variable
347 if (session_key) { in kerberos5_send()
348 krb5_free_keyblock(telnet_context, session_key); in kerberos5_send()
349 session_key = 0; in kerberos5_send()
361 &new_creds->keyblock, &session_key); in kerberos5_send()
364 newkey, &session_key); in kerberos5_send()
428 if (session_key) { in kerberos5_reply()
431 skey.data = session_key->contents; in kerberos5_reply()
469 if (session_key) { in kerberos5_reply()
472 skey.data = session_key->contents; in kerberos5_reply()
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rlogind.c81 static krb5_keyblock *session_key = NULL; variable
545 &session_key); in recvauth()
554 if (session_key == NULL && in recvauth()
563 if (session_key != NULL && in recvauth()
575 if (session_key == NULL) { in recvauth()
582 &session_key); in recvauth()
593 if (session_key == NULL) { in recvauth()
1237 if (session_key->enctype == ENCTYPE_DES_CBC_CRC) { in doit()
1241 ivec.length = session_key->length; in doit()
1242 ivec.data = (char *)session_key->contents; in doit()
[all …]
H A Din.telnetd.c179 static krb5_keyblock *session_key = NULL; variable
737 if (session_key != NULL) { in kerberos5_is()
738 krb5_free_keyblock(telnet_context, session_key); in kerberos5_is()
739 session_key = 0; in kerberos5_is()
743 newkey, &session_key); in kerberos5_is()
747 ticket->enc_part2->session, &session_key); in kerberos5_is()
756 skey.data = session_key->contents; in kerberos5_is()
/titanic_41/usr/src/cmd/ssh/sshd/
H A Dsshd.c1745 u_char session_key[SSH_SESSION_KEY_LENGTH]; in do_ssh1_kex() local
1863 (void) BN_mask_bits(session_key_int, sizeof(session_key) * 8); in do_ssh1_kex()
1865 if (len < 0 || len > sizeof(session_key)) { in do_ssh1_kex()
1868 get_remote_ipaddr(), len, (u_long)sizeof(session_key)); in do_ssh1_kex()
1871 (void) memset(session_key, 0, sizeof(session_key)); in do_ssh1_kex()
1873 session_key + sizeof(session_key) - len); in do_ssh1_kex()
1883 session_key[i] ^= session_id[i]; in do_ssh1_kex()
1896 MD5_Final(session_key, &md); in do_ssh1_kex()
1898 MD5_Update(&md, session_key, 16); in do_ssh1_kex()
1901 MD5_Final(session_key + 16, &md); in do_ssh1_kex()
[all …]
/titanic_41/usr/src/cmd/krb5/krb5kdc/
H A Ddo_as_req.c72 krb5_keyblock session_key; in process_as_req() local
96 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in process_as_req()
195 &session_key))) { in process_as_req()
219 enc_tkt_reply.session = &session_key; in process_as_req()
397 reply_encpart.session = &session_key; in process_as_req()
545 if (session_key.contents) in process_as_req()
546 krb5_free_keyblock_contents(kdc_context, &session_key); in process_as_req()
H A Ddo_tgs_req.c82 krb5_keyblock session_key; in process_tgs_req() local
101 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in process_tgs_req()
277 errcode = krb5_c_make_random_key(kdc_context, useenctype, &session_key); in process_tgs_req()
477 enc_tkt_reply.session = &session_key; in process_tgs_req()
646 reply_encpart.session = &session_key; in process_tgs_req()
754 if (session_key.contents) in process_tgs_req()
755 krb5_free_keyblock_contents(kdc_context, &session_key); in process_tgs_req()
H A Dkdc_preauth.c2069 krb5_keyblock session_key; in get_sam_edata() local
2073 (void) memset(&session_key, 0, sizeof(krb5_keyblock)); in get_sam_edata()
2078 &session_key); in get_sam_edata()
2089 if (session_key.length != 8) { in get_sam_edata()
2097 inputblock[i] = '0' + ((session_key.contents[i]/2) % 10); in get_sam_edata()
2099 if (session_key.contents) in get_sam_edata()
2100 krb5_free_keyblock_contents(kdc_context, &session_key); in get_sam_edata()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/
H A Drsh.c62 static krb5_keyblock *session_key; variable
615 session_key = &cred->keyblock; in main()
621 &session_key); in main()
627 if (session_key == NULL) { in main()
634 eblock.crypto_entry = session_key->enctype; in main()
635 eblock.key = (krb5_keyblock *)session_key; in main()
H A Drcp.c140 static krb5_keyblock *session_key; /* static key for session */ variable
658 session_key = &cred->keyblock; in toremote()
661 status = krb5_auth_con_getlocalsubkey(bsd_context, auth_context, &session_key); in toremote()
669 if (!session_key) { in toremote()
678 session_key->enctype; in toremote()
680 (krb5_keyblock *)session_key; in toremote()
879 session_key = &cred->keyblock; in tolocal()
883 &session_key); in tolocal()
890 if (!session_key) { in tolocal()
897 eblock.crypto_entry = session_key->enctype; in tolocal()
[all …]
H A Drlogin.c95 static krb5_keyblock *session_key; variable
696 session_key = &cred->keyblock; in main()
702 &session_key); in main()
708 if (session_key == NULL) { in main()
716 eblock.crypto_entry = session_key->enctype; in main()
717 eblock.key = (krb5_keyblock *)session_key; in main()
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/rdist/
H A Ddocmd.c396 session_key = &cred->keyblock;
401 &session_key);
407 if (!session_key) {
414 eblock.crypto_entry = session_key->enctype;
415 eblock.key = (krb5_keyblock *)session_key;
H A Dkrb5defs.h63 static krb5_keyblock *session_key; variable
/titanic_41/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c966 u_char session_key[SSH_SESSION_KEY_LENGTH]; in ssh_kex() local
1035 session_key[i] = rand & 0xff; in ssh_kex()
1050 BN_add_word(key, session_key[i] ^ session_id[i]); in ssh_kex()
1052 BN_add_word(key, session_key[i]); in ssh_kex()
1127 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, options.cipher); in ssh_kex()
1130 memset(session_key, 0, sizeof(session_key)); in ssh_kex()
/titanic_41/usr/src/uts/common/smbsrv/
H A Dnetrauth.h101 netr_session_key_t session_key; member
/titanic_41/usr/src/cmd/ssh/doc/
H A DChangeLog2469 allow session_key_int != sizeof(session_key)