| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| kdc.c | 53 krb5_data sessionkey; member in struct:ntlmkrb5 223 krb5_data_free(&c->sessionkey); 350 struct ntlm_buf *sessionkey) 355 sessionkey->data = NULL; 356 sessionkey->length = 0; 374 if (type3->sessionkey.length) { 376 type3->sessionkey.data, 377 type3->sessionkey.length); 396 if (type3->sessionkey.length) { 399 &c->sessionkey); [all...] |
| inquire_sec_context_by_oid.c | 57 value.length = ctx->sessionkey.length; 58 value.value = ctx->sessionkey.data;
|
| accept_sec_context.c | 224 ret = krb5_data_copy(&ctx->sessionkey, 241 ctx->sessionkey.data, 242 ctx->sessionkey.length); 245 ctx->sessionkey.data, 246 ctx->sessionkey.length); 249 ctx->sessionkey.length, 250 ctx->sessionkey.data); 252 ctx->sessionkey.length, 253 ctx->sessionkey.data);
|
| init_sec_context.c | 375 struct ntlm_buf sessionkey; local 407 &sessionkey, 408 &type3.sessionkey); 419 ret = krb5_data_copy(&ctx->sessionkey, 420 sessionkey.data, sessionkey.length); 421 free(sessionkey.data); 434 struct ntlm_buf sessionkey; local 471 &sessionkey, 472 &type3.sessionkey); [all...] |
| ntlm.h | 122 krb5_data sessionkey; member in struct:__anon817
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ |
| test_ntlm.c | 127 struct ntlm_buf sessionkey; local 129 &sessionkey, 130 &type3.sessionkey); 131 free(sessionkey.data); 257 struct ntlm_buf sessionkey; local 259 &sessionkey, 260 &type3.sessionkey); 261 free(sessionkey.data);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| fast.c | 86 krb5_keyblock *sessionkey, 93 sessionkey,
|
| ticket.c | 192 krb5_keyblock *sessionkey, 239 sessionkey, &child, level + 1); 275 ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf, 289 ret = find_type_in_ad(context, type, data, found, failp, sessionkey, 330 krb5_keyblock *sessionkey, 345 ret = find_type_in_ad(context, type, data, &found, TRUE, sessionkey, ad, 0);
|
| digest.c | 1077 void *sessionkey, size_t length) 1079 ntlm->request.sessionkey = calloc(1, sizeof(*ntlm->request.sessionkey)); 1080 if (ntlm->request.sessionkey == NULL) 1082 ntlm->request.sessionkey->data = malloc(length); 1083 if (ntlm->request.sessionkey->data == NULL && length != 0) 1085 memcpy(ntlm->request.sessionkey->data, sessionkey, length); 1086 ntlm->request.sessionkey->length = length; 1102 if (ntlm->response.sessionkey == NULL) [all...] |
| /src/crypto/external/bsd/heimdal/dist/kcm/ |
| protocol.c | 1448 struct ntlm_buf ndata, sessionkey; local 1455 sessionkey.data = NULL; 1456 sessionkey.length = 0; 1532 &type3.sessionkey); 1552 struct ntlm_buf sessionkey; 1589 &sessionkey, 1590 &type3.sessionkey); 1605 ret = krb5_data_copy(&ctx->sessionkey, 1606 sessionkey.data, sessionkey.length) [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| digest-service.c | 62 unsigned char sessionkey[16]; local 82 ntp.sessionkey = NULL; 148 sessionkey); 196 EVP_DigestFinal_ex(ctxp, sessionkey, NULL);
|
| digest.c | 1148 unsigned char sessionkey[16]; local 1157 r.u.ntlmResponse.sessionkey = NULL; 1256 sessionkey); 1335 EVP_DigestFinal_ex(ctx, sessionkey, NULL); 1341 if (ireq.u.ntlmRequest.sessionkey) { 1354 len = ireq.u.ntlmRequest.sessionkey->length; 1371 if (!EVP_CipherInit_ex(rc4, EVP_rc4(), NULL, sessionkey, NULL, 1)) 1375 masterkey, ireq.u.ntlmRequest.sessionkey->data, 1382 r.u.ntlmResponse.sessionkey = 1383 malloc(sizeof(*r.u.ntlmResponse.sessionkey)); [all...] |
| krb5tgs.c | 770 const krb5_keyblock *sessionkey, 976 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); 1580 krb5_keyblock sessionkey; local 1604 memset(&sessionkey, 0, sizeof(sessionkey)); 1865 ret = krb5_generate_random_keyblock(context, etype, &sessionkey); 2400 ret = krb5_crypto_init(context, &sessionkey, 0, &crypto); 2435 &sessionkey, 2462 krb5_free_keyblock_contents(context, &sessionkey);
|
| pkinit.c | 1151 krb5_keyblock *sessionkey, 1228 sessionkey); 1312 &p1, &p2, sessionetype, sessionkey); 1445 sessionkey);
|
| /src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| heimntlm-protos.h | 190 const unsigned char sessionkey[16],
|
| heimntlm.h | 156 struct ntlm_buf sessionkey; /**< */ member in struct:ntlm_type3
|
| ntlm.c | 975 heim_ntlm_free_buf(&data->sessionkey); 992 struct sec_buffer lm, ntlm, target, username, sessionkey, ws; local 996 memset(&sessionkey, 0, sizeof(sessionkey)); 1024 CHECK(ret_sec_buffer(in, &sessionkey), 0); 1025 min_offset = min(min_offset, sessionkey.offset); 1042 if (sessionkey.offset) 1043 CHECK(ret_buf(in, &sessionkey, &type3->sessionkey), 0); 1071 struct sec_buffer lm, ntlm, target, username, sessionkey, ws local [all...] |
| test_ntlm.c | 343 unsigned char sessionkey[16]; local 380 sessionkey);
|
| /src/crypto/external/bsd/heimdal/include/ |
| heimntlm-protos.h | 188 const unsigned char sessionkey[16],
|
| /src/external/mpl/bind/dist/bin/named/include/named/ |
| server.h | 98 dst_key_t *sessionkey; member in struct:named_server
|
| /src/external/mpl/bind/dist/bin/nsupdate/ |
| nsupdate.c | 567 cfg_obj_t *sessionkey = NULL; local 587 &sessionkey); 592 result = cfg_map_get(sessionkey, "key", &key); 614 if (sessionkey != NULL) { 615 cfg_obj_destroy(pctx, &sessionkey);
|
| /src/external/mpl/bind/dist/bin/named/ |
| server.c | 5201 if (named_g_server->sessionkey != NULL) { 5206 named_g_server->sessionkey, false, false, NULL, 0, 0, 7684 if (server->sessionkey != NULL) { 7685 dst_key_free(&server->sessionkey); 7843 INSIST(server->sessionkey != NULL); 7849 INSIST(server->sessionkey == NULL); 7866 &server->sessionkey));
|