Lines Matching refs:key

55 /* The DES algorithm uses a 56-bit encryption key. */
528 if (netr_gen_credentials(netr_info->session_key.key,
534 if (netr_gen_credentials(netr_info->session_key.key,
562 * Generate a 128-bit session key from the client and server challenges.
624 netr_info->session_key.key);
636 * Generate a 64-bit session key from the client and server challenges.
640 * the combination of the client and server challenges, the key is
646 * key: passwd lower 7 bytes
650 * the key is the last 7 bytes of the password.
653 * key: passwd upper 7 bytes
656 * The final output should be the session key.
658 * FYI: smb_auth_DES(output, key, input)
704 rc = smb_auth_DES(netr_info->session_key.key,
714 * Generate a set of credentials from a challenge and a session key.
720 * key: session_key
724 * a strange partial key is used:
727 * key: funny partial key
732 * FYI: smb_auth_DES(output, key, input)
768 * Generate a new pasword from the old password and the session key.
769 * The algorithm is a two stage hash. The session key is used in the
770 * first hash but only part of the session key is used in the second
796 * generated from the session key, the current client credential and
817 if (netr_gen_credentials(netr_info->session_key.key,
866 if (netr_gen_credentials(netr_info->session_key.key,
1012 * key in NetrSamLogon reply. The NTLM2 Session Response User Session Key is
1017 * server recovers the user session key in NetrSamLogon reply in clear form and
1018 * use that to calculate the MAC key. Otherwise, Solaris SMB server takes the
1020 * derived by domain controller as the MAC key. For more info, please see
1143 * using the session key obtained in the NETLOGON credential
1144 * chain. An 8 byte session key is zero extended to 16 bytes.
1145 * This 16 byte key is the key to the RC4 algorithm. The RC4
1150 bcopy(netr_info->session_key.key, rc4key,
1185 * key.
1191 BYTE key[NETR_OWF_PASSWORD_SZ];
1199 (void) memset(key, 0, NETR_OWF_PASSWORD_SZ);
1200 (void) memcpy(key, netr_info->session_key.key,
1204 NETR_OWF_PASSWORD_SZ, key, NETR_OWF_PASSWORD_SZ);
1207 NETR_OWF_PASSWORD_SZ, key, NETR_OWF_PASSWORD_SZ);
1215 * is the key that the client will have used to encrypt the NT and LM
1331 * Derive the NTLM2 session response user session key.
1410 if (netr_gen_password(netr_info->session_key.key,