Lines Matching +full:0 +full:x6e
40 0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
41 0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
42 0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
43 0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
44 0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
45 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
46 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
47 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
48 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
49 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
50 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
51 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
53 0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
54 0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
55 0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
56 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
57 0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
58 0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
59 0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
60 0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
61 0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
62 0x72, 0x65
161 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
185 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
215 * Return: 0 on success, error number on error
280 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0) in ksmbd_auth_ntlmv2()
295 * Return: 0 on success, error number on error
365 return 0; in ksmbd_decode_ntlmssp_neg_blob()
383 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob()
418 if (conv_len < 0 || conv_len > len) { in ksmbd_build_ntlmssp_challenge_blob()
444 chgblob->TargetInfoArray.Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
456 tinfo->Type = 0; in ksmbd_build_ntlmssp_challenge_blob()
457 tinfo->Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
513 retval = 0; in ksmbd_krb5_authenticate()
559 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb2_pdu()
610 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb3_pdu()
637 unsigned char zero = 0x0; in generate_key()
638 __u8 i[4] = {0, 0, 0, 1}; in generate_key()
639 __u8 L128[4] = {0, 0, 0, 128}; in generate_key()
640 __u8 L256[4] = {0, 0, 1, 0}; in generate_key()
646 memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE); in generate_key()
647 memset(key, 0x0, key_size); in generate_key()
729 return 0; in generate_smb3signingkey()
750 return 0; in generate_smb3signingkey()
829 return 0; in generate_smb3encryptionkey()
967 return 0; in ksmbd_get_encryption_key()
987 int i, nr_entries[3] = {0}, total_entries = 0, sg_idx = 0; in ksmbd_init_sg()
992 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1013 smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len); in ksmbd_init_sg()
1014 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1021 for (j = 0; j < nr_entries[i]; j++) { in ksmbd_init_sg()
1036 offset = 0; in ksmbd_init_sg()
1051 (struct smb2_transform_hdr *)iov[0].iov_base; in ksmbd_crypt_message()
1134 iv[0] = 3; in ksmbd_crypt_message()