Lines Matching +full:0 +full:x65
41 0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
42 0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
43 0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
44 0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
45 0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
46 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
47 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
48 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
49 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
50 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
51 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
52 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
54 0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
55 0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
56 0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
57 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
58 0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
59 0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
60 0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
61 0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
62 0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
63 0x72, 0x65
162 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
186 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
216 * Return: 0 on success, error number on error
284 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0) in ksmbd_auth_ntlmv2()
300 * Return: 0 on success, error number on error
399 return 0; in ksmbd_decode_ntlmssp_neg_blob()
417 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob()
458 if (conv_len < 0 || conv_len > len) { in ksmbd_build_ntlmssp_challenge_blob()
484 chgblob->TargetInfoArray.Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
496 tinfo->Type = 0; in ksmbd_build_ntlmssp_challenge_blob()
497 tinfo->Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
553 retval = 0; in ksmbd_krb5_authenticate()
599 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb2_pdu()
650 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb3_pdu()
678 unsigned char zero = 0x0; in generate_key()
679 __u8 i[4] = {0, 0, 0, 1}; in generate_key()
680 __u8 L128[4] = {0, 0, 0, 128}; in generate_key()
681 __u8 L256[4] = {0, 0, 1, 0}; in generate_key()
687 memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE); in generate_key()
688 memset(key, 0x0, key_size); in generate_key()
771 return 0; in generate_smb3signingkey()
792 return 0; in generate_smb3signingkey()
872 return 0; in generate_smb3encryptionkey()
1015 return 0; in ksmbd_get_encryption_key()
1035 int i, *nr_entries, total_entries = 0, sg_idx = 0; in ksmbd_init_sg()
1044 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1067 smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len); in ksmbd_init_sg()
1068 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1075 for (j = 0; j < nr_entries[i]; j++) { in ksmbd_init_sg()
1090 offset = 0; in ksmbd_init_sg()
1106 struct smb2_transform_hdr *tr_hdr = smb2_get_msg(iov[0].iov_base); in ksmbd_crypt_message()
1189 iv[0] = 3; in ksmbd_crypt_message()