Lines Matching +full:0 +full:x6e
41 0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
42 0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
43 0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
44 0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
45 0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
46 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
47 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
48 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
49 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
50 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
51 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
52 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
54 0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
55 0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
56 0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
57 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
58 0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
59 0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
60 0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
61 0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
62 0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
63 0x72, 0x65
162 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
186 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
216 * Return: 0 on success, error number on error
282 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0) in ksmbd_auth_ntlmv2()
297 * Return: 0 on success, error number on error
392 return 0; in ksmbd_decode_ntlmssp_neg_blob()
410 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob()
451 if (conv_len < 0 || conv_len > len) { in ksmbd_build_ntlmssp_challenge_blob()
477 chgblob->TargetInfoArray.Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
489 tinfo->Type = 0; in ksmbd_build_ntlmssp_challenge_blob()
490 tinfo->Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
546 retval = 0; in ksmbd_krb5_authenticate()
592 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb2_pdu()
643 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb3_pdu()
671 unsigned char zero = 0x0; in generate_key()
672 __u8 i[4] = {0, 0, 0, 1}; in generate_key()
673 __u8 L128[4] = {0, 0, 0, 128}; in generate_key()
674 __u8 L256[4] = {0, 0, 1, 0}; in generate_key()
680 memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE); in generate_key()
681 memset(key, 0x0, key_size); in generate_key()
763 return 0; in generate_smb3signingkey()
784 return 0; in generate_smb3signingkey()
864 return 0; in generate_smb3encryptionkey()
1007 return 0; in ksmbd_get_encryption_key()
1027 int i, nr_entries[3] = {0}, total_entries = 0, sg_idx = 0; in ksmbd_init_sg()
1032 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1053 smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len); in ksmbd_init_sg()
1054 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1061 for (j = 0; j < nr_entries[i]; j++) { in ksmbd_init_sg()
1076 offset = 0; in ksmbd_init_sg()
1091 struct smb2_transform_hdr *tr_hdr = smb2_get_msg(iov[0].iov_base); in ksmbd_crypt_message()
1174 iv[0] = 3; in ksmbd_crypt_message()