Searched refs:user_name (Results 1 – 12 of 12) sorted by relevance
/fs/cifs/ |
D | cifs_spnego.c | 108 if (sesInfo->user_name) in cifs_get_spnego_key() 109 desc_len += USER_KEY_LEN + strlen(sesInfo->user_name); in cifs_get_spnego_key() 151 if (sesInfo->user_name) { in cifs_get_spnego_key() 153 sprintf(dp, ";user=%s", sesInfo->user_name); in cifs_get_spnego_key()
|
D | sess.c | 226 ctx.username = ses->user_name; in cifs_ses_add_channel() 433 if (ses->user_name == NULL) { in unicode_ssetup_strings() 438 bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->user_name, in unicode_ssetup_strings() 459 if (ses->user_name != NULL) { in ascii_ssetup_strings() 460 len = strscpy(bcc_ptr, ses->user_name, CIFS_MAX_USERNAME_LEN); in ascii_ssetup_strings() 677 if (ses->user_name) in size_of_ntlmssp_blob() 678 sz += 2 * strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN); in size_of_ntlmssp_blob() 733 if (ses->user_name != NULL) { in build_ntlmssp_auth_blob() 766 if (ses->user_name == NULL) { in build_ntlmssp_auth_blob() 773 len = cifs_strtoUTF16((__le16 *)tmp, ses->user_name, in build_ntlmssp_auth_blob() [all …]
|
D | cifsencrypt.c | 434 len = ses->user_name ? strlen(ses->user_name) : 0; in calc_ntlmv2_hash() 442 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash()
|
D | cifs_swn.c | 50 if (tcon->ses->user_name != NULL) { in cifs_swn_auth_info_ntlm() 51 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); in cifs_swn_auth_info_ntlm()
|
D | cifsfs.c | 441 if (ses->user_name == NULL) in cifs_show_security() 530 else if (tcon->ses->user_name) in cifs_show_options() 531 seq_show_option(s, "username", tcon->ses->user_name); in cifs_show_options()
|
D | connect.c | 1607 if (ses->user_name == NULL) { in match_session() 1614 if (strncmp(ses->user_name, in match_session() 2019 ses->user_name = kstrdup(ctx->username, GFP_KERNEL); in cifs_get_smb_ses() 2020 if (!ses->user_name) in cifs_get_smb_ses()
|
D | misc.c | 96 kfree(buf_to_free->user_name); in sesInfoFree()
|
D | cifsglob.h | 924 char *user_name; /* must not be null except during init of sess member
|
D | smb2pdu.c | 1096 if (tcon->ses->user_name == NULL) { in smb3_validate_negotiate() 1843 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
/fs/ksmbd/mgmt/ |
D | user_config.h | 47 static inline char *user_name(struct ksmbd_user *user) in user_name() function
|
/fs/ksmbd/ |
D | transport_ipc.c | 559 if (strlen(user_name(sess->user)) >= KSMBD_REQ_MAX_ACCOUNT_NAME_SZ) in ksmbd_ipc_tree_connect_request() 576 strscpy(req->account, user_name(sess->user), KSMBD_REQ_MAX_ACCOUNT_NAME_SZ); in ksmbd_ipc_tree_connect_request()
|
D | auth.c | 153 len = strlen(user_name(sess->user)); in calc_ntlmv2_hash() 160 conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len, in calc_ntlmv2_hash()
|