Searched refs:auth_key (Results 1 – 13 of 13) sorted by relevance
/Linux-v4.19/fs/cifs/ |
D | cifsencrypt.c | 274 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 275 if (!ses->auth_key.response) in setup_ntlm_response() 278 ses->auth_key.len = temp_len; in setup_ntlm_response() 281 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 295 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 368 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 369 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 370 if (!ses->auth_key.response) { in build_avpair_blob() 371 ses->auth_key.len = 0; in build_avpair_blob() 375 blobptr = ses->auth_key.response; in build_avpair_blob() [all …]
|
D | sess.c | 318 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 320 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 324 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 368 int sz = sizeof(AUTHENTICATE_MESSAGE) + ses->auth_key.len in size_of_ntlmssp_blob() 433 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 434 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 435 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob() 438 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 440 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 630 kmemdup(ses->auth_key.response, in sess_establish_session() [all …]
|
D | smb2transport.c | 193 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in smb2_calc_signature() 253 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 358 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
D | connect.c | 4415 if (ses->auth_key.response) { in cifs_setup_session() 4417 ses->auth_key.response); in cifs_setup_session() 4418 kfree(ses->auth_key.response); in cifs_setup_session() 4419 ses->auth_key.response = NULL; in cifs_setup_session() 4420 ses->auth_key.len = 0; in cifs_setup_session()
|
D | misc.c | 105 kzfree(buf_to_free->auth_key.response); in sesInfoFree()
|
D | cifsglob.h | 877 struct session_key auth_key; member
|
D | smb2pdu.c | 1116 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1118 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1125 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
|
/Linux-v4.19/net/sctp/ |
D | auth.c | 846 struct sctp_authkey *auth_key) in sctp_auth_set_key() argument 862 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() 868 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key() 873 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key() 879 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key()
|
/Linux-v4.19/include/net/sctp/ |
D | auth.h | 118 struct sctp_authkey *auth_key);
|
/Linux-v4.19/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 147 const uint8_t *auth_key, in qat_alg_do_precomputes() argument 168 int ret = crypto_shash_digest(shash, auth_key, in qat_alg_do_precomputes() 175 memcpy(ipad, auth_key, auth_keylen); in qat_alg_do_precomputes() 176 memcpy(opad, auth_key, auth_keylen); in qat_alg_do_precomputes()
|
/Linux-v4.19/drivers/net/wireless/intel/ipw2x00/ |
D | ipw2200.h | 883 u8 auth_type:4, auth_key:4; member 885 u8 auth_key:4, auth_type:4; member
|
D | ipw2200.c | 7304 priv->assoc_request.auth_key = 0; in ipw_associate_network() 7309 priv->assoc_request.auth_key = priv->ieee->sec.active_key; in ipw_associate_network()
|
/Linux-v4.19/drivers/crypto/ |
D | n2_core.c | 524 unsigned long auth_key, unsigned int auth_key_len) in n2_do_async_digest() argument 571 ent->auth_key_addr = auth_key; in n2_do_async_digest()
|