Home
last modified time | relevance | path

Searched refs:auth_key (Results 1 – 9 of 9) sorted by relevance

/linux-4.19.296/fs/cifs/
Dcifsencrypt.c274 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response()
275 if (!ses->auth_key.response) in setup_ntlm_response()
278 ses->auth_key.len = temp_len; in setup_ntlm_response()
281 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response()
295 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response()
368 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob()
369 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
370 if (!ses->auth_key.response) { in build_avpair_blob()
371 ses->auth_key.len = 0; in build_avpair_blob()
375 blobptr = ses->auth_key.response; in build_avpair_blob()
[all …]
Dsess.c318 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge()
320 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
324 ses->auth_key.len = tilen; in decode_ntlmssp_challenge()
368 int sz = sizeof(AUTHENTICATE_MESSAGE) + ses->auth_key.len in size_of_ntlmssp_blob()
433 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob()
434 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
435 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob()
438 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
440 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
630 kmemdup(ses->auth_key.response, in sess_establish_session()
[all …]
Dsmb2transport.c193 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in smb2_calc_signature()
253 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key()
358 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
Dconnect.c4558 if (ses->auth_key.response) { in cifs_setup_session()
4560 ses->auth_key.response); in cifs_setup_session()
4561 kfree(ses->auth_key.response); in cifs_setup_session()
4562 ses->auth_key.response = NULL; in cifs_setup_session()
4563 ses->auth_key.len = 0; in cifs_setup_session()
Dmisc.c105 kzfree(buf_to_free->auth_key.response); in sesInfoFree()
Dcifsglob.h897 struct session_key auth_key; member
Dsmb2pdu.c1167 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos()
1169 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
1176 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
/linux-4.19.296/include/linux/
Dkey-type.h41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
/linux-4.19.296/include/net/sctp/
Dauth.h118 struct sctp_authkey *auth_key);