/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/ecryptfs/ |
H A D | debug.c | 43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
/dports/multimedia/libv4l/linux-5.13-rc2/fs/ecryptfs/ |
H A D | debug.c | 43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/fs/ecryptfs/ |
H A D | debug.c | 43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/auth/ntlmssp/ |
H A D | ntlmssp_server.c | 468 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length); in ntlmssp_server_postauth() 482 session_key.data); in ntlmssp_server_postauth() 484 dump_data_pw("LM session key:\n", session_key.data, session_key.length); in ntlmssp_server_postauth() 491 session_key.data); in ntlmssp_server_postauth() 493 dump_data_pw("LM session key:\n", session_key.data, session_key.length); in ntlmssp_server_postauth() 506 dump_data_pw("unmodified session key:\n", session_key.data, session_key.length); in ntlmssp_server_postauth() 515 dump_data_pw("unmodified session key:\n", session_key.data, session_key.length); in ntlmssp_server_postauth() 537 } else if (!session_key.data || session_key.length != 16) { in ntlmssp_server_postauth() 540 gensec_ntlmssp_state->session_key = session_key; in ntlmssp_server_postauth() 546 session_key.data, in ntlmssp_server_postauth() [all …]
|
/dports/net/samba412/samba-4.12.15/libcli/auth/tests/ |
H A D | test_rc4_passwd_buffer.c | 176 DATA_BLOB session_key = data_blob_const("SystemLibraryDTC", 16); 187 status = decode_rc4_passwd_buffer(&session_key, &out_pwd_buf); 204 DATA_BLOB session_key = data_blob_const("SystemLibraryDTC", 16); 212 &session_key, 216 status = decode_rc4_passwd_buffer(&session_key, &out_pwd_buf); 234 DATA_BLOB session_key = data_blob_const("SystemLibraryDTC", 16); 242 &session_key, 246 status = decode_rc4_passwd_buffer(&session_key, &out_pwd_buf); 279 &session_key, 301 &session_key, [all …]
|
/dports/multimedia/tautulli/Tautulli-2.8.0/plexpy/ |
H A D | activity_processor.py | 547 if str(session_key).isdigit(): 567 if str(session_key).isdigit(): 584 if str(session_key).isdigit(): 590 if str(session_key).isdigit(): 613 if str(session_key).isdigit(): 619 if str(session_key).isdigit(): 630 if str(session_key).isdigit(): 636 if str(session_key).isdigit(): 651 if str(session_key).isdigit(): 652 session = self.get_session_by_key(session_key=session_key) [all …]
|
H A D | activity_handler.py | 114 ap.set_session_state(session_key=self.get_session_key(), 165 db_session = ap.get_session_by_key(session_key=self.get_session_key()) 372 ap.set_watched(session_key=self.get_session_key()) 600 def force_stop_stream(session_key, title, user): argument 602 session = ap.get_session_by_key(session_key=session_key) 611 delete_metadata_cache(session_key) 620 ap.increment_write_attempts(session_key=session_key) 632 ap.delete_session(session_key=session_key) 633 delete_metadata_cache(session_key) 707 def delete_metadata_cache(session_key): argument [all …]
|
/dports/net/ss5/ss5-3.8.9/modules/mod_authen/ |
H A D | SS5Supa.c | 289 if (!session_key){ in ss5_secure_dh_compute_key() 300 bzero(session_key, DH_size (ss)); in ss5_secure_dh_compute_key() 312 return session_key; in ss5_secure_dh_compute_key() 362 bcopy (session_key, &sk1, 8); in ss5_secure_dh_decrypt_key() 363 bcopy (&session_key[8], &sk2, 8); in ss5_secure_dh_decrypt_key() 474 bzero(session_key, sizeof(session_key)); in ss5_secure_auth() 475 free(session_key); in ss5_secure_auth() 481 bzero(session_key, sizeof(session_key)); in ss5_secure_auth() 482 free(session_key); in ss5_secure_auth() 487 bzero(session_key, sizeof(session_key)); in ss5_secure_auth() [all …]
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/auth/credentials/ |
H A D | credentials_ntlm.c | 52 DATA_BLOB lm_session_key, session_key; in cli_credentials_get_ntlm_response() local 81 session_key = data_blob_talloc(mem_ctx, zeros, 16); in cli_credentials_get_ntlm_response() 106 NULL, &session_key)) { in cli_credentials_get_ntlm_response() 139 session_key = data_blob_talloc(mem_ctx, NULL, 16); in cli_credentials_get_ntlm_response() 142 hmac_md5(user_session_key, session_nonce, sizeof(session_nonce), session_key.data); in cli_credentials_get_ntlm_response() 143 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length); in cli_credentials_get_ntlm_response() 153 session_key = data_blob_talloc(mem_ctx, NULL, 16); in cli_credentials_get_ntlm_response() 154 SMBsesskeygen_ntv1(nt_hash->hash, session_key.data); in cli_credentials_get_ntlm_response() 155 dump_data_pw("NT session key:\n", session_key.data, session_key.length); in cli_credentials_get_ntlm_response() 184 session_key = lm_session_key; in cli_credentials_get_ntlm_response() [all …]
|
/dports/www/p5-Mojolicious-Plugin-Authentication/Mojolicious-Plugin-Authentication-1.37/lib/Mojolicious/Plugin/ |
H A D | Authentication.pm | 35 my $session_key = $args->{session_key} || 'auth_data'; 47 $our_stash_key, $session_key, $load_user_cb, 50 $our_stash_key, $session_key, $load_user_cb_p, 115 return !!$c->session($session_key); 135 delete $c->session->{$session_key}; 142 my ($our_stash_key, $session_key, $load_user_cb) = @_; 145 my $uid = $c->session($session_key); 158 my ($our_stash_key, $session_key, $load_user_cb_p) = @_; 161 my $uid = $c->session($session_key); 227 $c->session($session_key => $uid); [all …]
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/libcli/auth/ |
H A D | credentials.c | 49 ZERO_STRUCT(creds->session_key); in creds_init_64bit() 51 des_crypt128(creds->session_key, sum2, machine_password->hash); in creds_init_64bit() 73 ZERO_STRUCT(creds->session_key); in creds_init_128bit() 84 hmac_md5_final(creds->session_key, &ctx); in creds_init_128bit() 138 des_crypt56(tmp.key, key->key, creds->session_key, 1); in creds_des_encrypt_LMKey() 148 des_crypt56(tmp.key, key->key, creds->session_key, 0); in creds_des_decrypt_LMKey() 158 des_crypt112_16(tmp.hash, pass->hash, creds->session_key, 1); in creds_des_encrypt() 177 DATA_BLOB session_key = data_blob(creds->session_key, 16); in creds_arcfour_crypt() local 179 arcfour_crypt_blob(data, len, &session_key); in creds_arcfour_crypt() 181 data_blob_free(&session_key); in creds_arcfour_crypt() [all …]
|
H A D | session.c | 33 void sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key, in sess_crypt_blob() argument 46 if (k + 7 > session_key->length) { in sess_crypt_blob() 47 k = (session_key->length - k); in sess_crypt_blob() 49 memcpy(key, &session_key->data[k], 7); in sess_crypt_blob() 66 DATA_BLOB sess_encrypt_string(const char *str, const DATA_BLOB *session_key) in sess_encrypt_string() argument 88 sess_crypt_blob(&ret, &src, session_key, True); in sess_encrypt_string() 101 DATA_BLOB *blob, const DATA_BLOB *session_key) in sess_decrypt_string() argument 116 sess_crypt_blob(&out, blob, session_key, False); in sess_decrypt_string() 149 DATA_BLOB sess_encrypt_blob(TALLOC_CTX *mem_ctx, DATA_BLOB *blob_in, const DATA_BLOB *session_key) in sess_encrypt_blob() argument 170 sess_crypt_blob(&ret, &src, session_key, True); in sess_encrypt_blob() [all …]
|
/dports/security/olm/olm-3.2.6/python/tests/ |
H A D | group_session_test.py | 36 InboundGroupSession(outbound.session_key) 40 inbound = InboundGroupSession(outbound.session_key) 47 inbound = InboundGroupSession(outbound.session_key) 53 inbound = InboundGroupSession(outbound.session_key) 61 inbound = InboundGroupSession(outbound.session_key) 68 inbound = InboundGroupSession(outbound.session_key) 74 inbound = InboundGroupSession(outbound.session_key) 79 inbound = InboundGroupSession(outbound.session_key) 87 inbound = InboundGroupSession(outbound.session_key) 94 inbound = InboundGroupSession(outbound.session_key) [all …]
|
/dports/net-mgmt/py-pynetbox/pynetbox-6.6.1/pynetbox/core/ |
H A D | endpoint.py | 49 self.session_key = api.session_key 103 session_key=self.session_key, 165 session_key=self.session_key, 254 session_key=self.session_key, 316 session_key=self.session_key, 377 session_key=self.session_key, 442 session_key=self.session_key, 542 session_key=self.session_key, 563 session_key=parent_obj.api.session_key,
|
/dports/net/samba412/samba-4.12.15/source4/libcli/smb2/ |
H A D | signing.c | 34 NTSTATUS smb2_sign_message(struct smb2_request_buffer *buf, DATA_BLOB session_key) in smb2_sign_message() argument 55 if (session_key.length == 0) { in smb2_sign_message() 57 (unsigned)session_key.length)); in smb2_sign_message() 66 session_key.data, in smb2_sign_message() 67 MIN(session_key.length, 16), in smb2_sign_message() 85 NTSTATUS smb2_check_signature(struct smb2_request_buffer *buf, DATA_BLOB session_key) in smb2_check_signature() argument 107 if (session_key.length == 0) { in smb2_check_signature() 117 session_key.data, in smb2_check_signature() 118 MIN(session_key.length, 16), in smb2_check_signature()
|
/dports/security/openvas/openvas-scanner-21.4.3/nasl/ |
H A D | ntlmssp.c | 36 uint8_t *session_key, unsigned char *ntlmv2_hash) in ntlmssp_genauth_ntlmv2() argument 40 nt_response, session_key); in ntlmssp_genauth_ntlmv2() 45 uint8_t *nt_response, uint8_t *session_key, in ntlmssp_genauth_ntlm2() argument 71 session_key); in ntlmssp_genauth_ntlm2() 76 uint8_t *nt_response, uint8_t *session_key, in ntlmssp_genauth_ntlm() argument 90 SMBsesskeygen_lm_sess_key_ntlmssp (lm_hash, lm_response, session_key); in ntlmssp_genauth_ntlm() 94 SMBsesskeygen_ntv1_ntlmssp (nt_hash, NULL, session_key); in ntlmssp_genauth_ntlm() 99 ntlmssp_genauth_keyexchg (uint8_t *session_key, char *challenge_data, in ntlmssp_genauth_keyexchg() argument 115 SamOEMhash (encrypted_session_key, session_key, length); in ntlmssp_genauth_keyexchg()
|
/dports/graphics/ImageMagick6/ImageMagick-6.9.12-34/magick/ |
H A D | distribute-cache.c | 202 *session_key=0; in ConnectPixelCacheServer() 255 if (*session_key == 0) in ConnectPixelCacheServer() 338 session_key; in AcquireDistributeCacheInfo() local 350 session_key=0; in AcquireDistributeCacheInfo() 357 server_info->session_key=session_key; in AcquireDistributeCacheInfo() 768 session_key; in DistributePixelCacheClient() local 1127 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in OpenDistributePixelCache() 1204 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCacheIndexes() 1277 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCachePixels() 1339 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in RelinquishDistributePixelCache() [all …]
|
/dports/graphics/ImageMagick6-nox11/ImageMagick-6.9.12-34/magick/ |
H A D | distribute-cache.c | 202 *session_key=0; in ConnectPixelCacheServer() 255 if (*session_key == 0) in ConnectPixelCacheServer() 338 session_key; in AcquireDistributeCacheInfo() local 350 session_key=0; in AcquireDistributeCacheInfo() 357 server_info->session_key=session_key; in AcquireDistributeCacheInfo() 768 session_key; in DistributePixelCacheClient() local 1127 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in OpenDistributePixelCache() 1204 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCacheIndexes() 1277 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCachePixels() 1339 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in RelinquishDistributePixelCache() [all …]
|
/dports/net/samba412/samba-4.12.15/libcli/auth/ |
H A D | session.c | 32 int sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key, in sess_crypt_blob() argument 48 if (k + 7 > session_key->length) { in sess_crypt_blob() 49 k = (session_key->length - k); in sess_crypt_blob() 51 memcpy(key, &session_key->data[k], 7); in sess_crypt_blob() 72 DATA_BLOB sess_encrypt_string(const char *str, const DATA_BLOB *session_key) in sess_encrypt_string() argument 95 rc = sess_crypt_blob(&ret, &src, session_key, SAMBA_GNUTLS_ENCRYPT); in sess_encrypt_string() 112 DATA_BLOB *blob, const DATA_BLOB *session_key) in sess_decrypt_string() argument 127 rc = sess_crypt_blob(&out, blob, session_key, SAMBA_GNUTLS_DECRYPT); in sess_decrypt_string() 164 DATA_BLOB sess_encrypt_blob(TALLOC_CTX *mem_ctx, DATA_BLOB *blob_in, const DATA_BLOB *session_key) in sess_encrypt_blob() argument 186 rc = sess_crypt_blob(&ret, &src, session_key, SAMBA_GNUTLS_ENCRYPT); in sess_encrypt_blob() [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/ |
H A D | s2n_tls13_record_aead_test.c | 132 struct s2n_session_key session_key = { 0 }; in main() local 133 EXPECT_SUCCESS(s2n_session_key_alloc(&session_key)); in main() 140 EXPECT_SUCCESS(cipher_suite->record_alg->cipher->init(&session_key)); in main() 159 &session_key)); in main() 183 iv.data, NULL, conn->secure.client_sequence_number, &session_key)); in main() 211 EXPECT_SUCCESS(s2n_session_key_free(&session_key)); in main() 222 struct s2n_session_key *session_key = &conn->server->server_key; in main() local 227 EXPECT_SUCCESS(cipher_suite->record_alg->cipher->init(session_key)); in main() 279 struct s2n_session_key *session_key = &conn->server->server_key; in main() local 284 EXPECT_SUCCESS(cipher_suite->record_alg->cipher->init(session_key)); in main() [all …]
|
/dports/graphics/ImageMagick7/ImageMagick-7.1.0-19/MagickCore/ |
H A D | distribute-cache.c | 202 *session_key=0; in ConnectPixelCacheServer() 255 if (*session_key == 0) in ConnectPixelCacheServer() 334 session_key; in AcquireDistributeCacheInfo() local 345 session_key=0; in AcquireDistributeCacheInfo() 352 server_info->session_key=session_key; in AcquireDistributeCacheInfo() 777 session_key; in DistributePixelCacheClient() local 1132 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in OpenDistributePixelCache() 1218 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCacheMetacontent() 1291 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCachePixels() 1353 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in RelinquishDistributePixelCache() [all …]
|
/dports/graphics/ImageMagick7-nox11/ImageMagick-7.1.0-19/MagickCore/ |
H A D | distribute-cache.c | 202 *session_key=0; in ConnectPixelCacheServer() 255 if (*session_key == 0) in ConnectPixelCacheServer() 334 session_key; in AcquireDistributeCacheInfo() local 345 session_key=0; in AcquireDistributeCacheInfo() 352 server_info->session_key=session_key; in AcquireDistributeCacheInfo() 777 session_key; in DistributePixelCacheClient() local 1132 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in OpenDistributePixelCache() 1218 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCacheMetacontent() 1291 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in ReadDistributePixelCachePixels() 1353 (void) memcpy(p,&server_info->session_key,sizeof(server_info->session_key)); in RelinquishDistributePixelCache() [all …]
|
/dports/multimedia/audacious-plugins/audacious-plugins-4.1/src/scrobbler2/ |
H A D | scrobbler_communication.cc | 171 session_key = String(); in update_session_key() 178 aud_set_str("scrobbler", "session_key", session_key ? session_key : ""); in update_session_key() 207 if (!session_key || !session_key[0]) { in scrobbler_test_connection() 237 session_key = String(); in scrobbler_test_connection() 561 session_key = String(); in send_now_playing() 572 if (!session_key || !session_key[0]) { in treat_permission_check_request() 583 } else if (!session_key || !session_key[0]) { in treat_permission_check_request() 592 if (session_key && session_key[0]) { in treat_permission_check_request() 596 if (!session_key || !session_key[0]) { in treat_permission_check_request() 652 return (session_key && session_key[0]); in treat_migrate_config() [all …]
|
/dports/net/samba412/samba-4.12.15/auth/credentials/ |
H A D | credentials_ntlm.c | 52 DATA_BLOB session_key = data_blob_null; 116 if (session_key.data == NULL) { 146 NULL, &session_key)) { 202 if (session_key.data == NULL) { 214 session_key.data); 221 dump_data_pw("NTLM2 session key:\n", session_key.data, session_key.length); 243 if (session_key.data == NULL) { 248 dump_data_pw("NT session key:\n", session_key.data, session_key.length); 319 talloc_steal(mem_ctx, session_key.data); 320 *_session_key = session_key; [all …]
|
/dports/security/asignify/asignify-1.0/libasignify/ |
H A D | encrypt.c | 134 session_key[ENCRYPTED_PAYLOAD_LEN], *p, in asignify_encrypt_crypt_file() local 190 p = session_key; in asignify_encrypt_crypt_file() 205 session_key, /* session nonce */ in asignify_encrypt_crypt_file() 223 blake2b_update(&sh, session_key, sizeof(session_key)); in asignify_encrypt_crypt_file() 289 session_key[ENCRYPTED_PAYLOAD_LEN], *p, in asignify_encrypt_decrypt_file() local 403 memcpy(session_key, enc->data, sizeof(session_key)); in asignify_encrypt_decrypt_file() 405 if (crypto_box_open(session_key + crypto_box_NONCEBYTES, in asignify_encrypt_decrypt_file() 406 session_key + crypto_box_NONCEBYTES, in asignify_encrypt_decrypt_file() 408 session_key, in asignify_encrypt_decrypt_file() 419 explicit_memzero(session_key, sizeof(session_key)); in asignify_encrypt_decrypt_file() [all …]
|