Searched refs:auth_key (Results 1 – 9 of 9) sorted by relevance
/fs/cifs/ |
D | cifsencrypt.c | 275 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 276 if (!ses->auth_key.response) in setup_ntlm_response() 279 ses->auth_key.len = temp_len; in setup_ntlm_response() 282 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 296 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 374 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 375 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 376 if (!ses->auth_key.response) { in build_avpair_blob() 377 ses->auth_key.len = 0; in build_avpair_blob() 381 blobptr = ses->auth_key.response; in build_avpair_blob() [all …]
|
D | sess.c | 326 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 328 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 332 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 376 int sz = sizeof(AUTHENTICATE_MESSAGE) + ses->auth_key.len in size_of_ntlmssp_blob() 441 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 442 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 443 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob() 446 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 448 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 638 kmemdup(ses->auth_key.response, in sess_establish_session() [all …]
|
D | ioctl.c | 290 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
D | cifs_ioctl.h | 63 __u8 auth_key[16]; /* SMB2_NTLMV2_SESSKEY_SIZE */ member
|
D | smb2transport.c | 193 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in smb2_calc_signature() 254 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 359 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
D | connect.c | 5240 if (ses->auth_key.response) { in cifs_setup_session() 5242 ses->auth_key.response); in cifs_setup_session() 5243 kfree(ses->auth_key.response); in cifs_setup_session() 5244 ses->auth_key.response = NULL; in cifs_setup_session() 5245 ses->auth_key.len = 0; in cifs_setup_session()
|
D | misc.c | 105 kzfree(buf_to_free->auth_key.response); in sesInfoFree()
|
D | cifsglob.h | 986 struct session_key auth_key; member
|
D | smb2pdu.c | 1358 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1360 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1367 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
|