Home
last modified time | relevance | path

Searched refs:user_name (Results 1 – 12 of 12) sorted by relevance

/fs/cifs/
Dcifs_spnego.c108 if (sesInfo->user_name) in cifs_get_spnego_key()
109 desc_len += USER_KEY_LEN + strlen(sesInfo->user_name); in cifs_get_spnego_key()
151 if (sesInfo->user_name) { in cifs_get_spnego_key()
153 sprintf(dp, ";user=%s", sesInfo->user_name); in cifs_get_spnego_key()
Dsess.c226 ctx.username = ses->user_name; in cifs_ses_add_channel()
433 if (ses->user_name == NULL) { in unicode_ssetup_strings()
438 bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->user_name, in unicode_ssetup_strings()
459 if (ses->user_name != NULL) { in ascii_ssetup_strings()
460 len = strscpy(bcc_ptr, ses->user_name, CIFS_MAX_USERNAME_LEN); in ascii_ssetup_strings()
677 if (ses->user_name) in size_of_ntlmssp_blob()
678 sz += 2 * strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN); in size_of_ntlmssp_blob()
733 if (ses->user_name != NULL) { in build_ntlmssp_auth_blob()
766 if (ses->user_name == NULL) { in build_ntlmssp_auth_blob()
773 len = cifs_strtoUTF16((__le16 *)tmp, ses->user_name, in build_ntlmssp_auth_blob()
[all …]
Dcifsencrypt.c434 len = ses->user_name ? strlen(ses->user_name) : 0; in calc_ntlmv2_hash()
442 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash()
Dcifs_swn.c50 if (tcon->ses->user_name != NULL) { in cifs_swn_auth_info_ntlm()
51 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); in cifs_swn_auth_info_ntlm()
Dcifsfs.c441 if (ses->user_name == NULL) in cifs_show_security()
530 else if (tcon->ses->user_name) in cifs_show_options()
531 seq_show_option(s, "username", tcon->ses->user_name); in cifs_show_options()
Dconnect.c1607 if (ses->user_name == NULL) { in match_session()
1614 if (strncmp(ses->user_name, in match_session()
2019 ses->user_name = kstrdup(ctx->username, GFP_KERNEL); in cifs_get_smb_ses()
2020 if (!ses->user_name) in cifs_get_smb_ses()
Dmisc.c96 kfree(buf_to_free->user_name); in sesInfoFree()
Dcifsglob.h924 char *user_name; /* must not be null except during init of sess member
Dsmb2pdu.c1096 if (tcon->ses->user_name == NULL) { in smb3_validate_negotiate()
1843 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
/fs/ksmbd/mgmt/
Duser_config.h47 static inline char *user_name(struct ksmbd_user *user) in user_name() function
/fs/ksmbd/
Dtransport_ipc.c559 if (strlen(user_name(sess->user)) >= KSMBD_REQ_MAX_ACCOUNT_NAME_SZ) in ksmbd_ipc_tree_connect_request()
576 strscpy(req->account, user_name(sess->user), KSMBD_REQ_MAX_ACCOUNT_NAME_SZ); in ksmbd_ipc_tree_connect_request()
Dauth.c153 len = strlen(user_name(sess->user)); in calc_ntlmv2_hash()
160 conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len, in calc_ntlmv2_hash()