Lines Matching full:signature

87 			  char *signature, struct cifs_calc_sig_ctx *ctx)  in __cifs_calc_signature()  argument
125 rc = cifs_sig_final(ctx, signature); in __cifs_calc_signature()
133 * Calculate and return the CIFS signature based on the mac key and SMB PDU.
134 * The 16 byte signature must be allocated by the caller. Note we only use the
135 * 1st eight bytes and that the smb header signature field on input contains
140 struct TCP_Server_Info *server, char *signature) in cifs_calc_signature() argument
144 if (!rqst->rq_iov || !signature || !server) in cifs_calc_signature()
148 "MD5 signature support is disabled due to FIPS\n"); in cifs_calc_signature()
156 rqst, server, signature, in cifs_calc_signature()
184 memcpy(cifs_pdu->Signature.SecuritySignature, "BSRSPYL", 8); in cifs_sign_rqst()
188 cifs_pdu->Signature.Sequence.SequenceNumber = in cifs_sign_rqst()
190 cifs_pdu->Signature.Sequence.Reserved = 0; in cifs_sign_rqst()
197 memset(cifs_pdu->Signature.SecuritySignature, 0, 8); in cifs_sign_rqst()
199 memcpy(cifs_pdu->Signature.SecuritySignature, smb_signature, 8); in cifs_sign_rqst()
257 /* Do not need to verify session setups with signature "BSRSPYL " */ in cifs_verify_signature()
258 if (memcmp(cifs_pdu->Signature.SecuritySignature, "BSRSPYL ", 8) == 0) in cifs_verify_signature()
259 cifs_dbg(FYI, "dummy signature received for smb command 0x%x\n", in cifs_verify_signature()
262 /* save off the original signature so we can modify the smb and check in cifs_verify_signature()
263 its signature against what the server sent */ in cifs_verify_signature()
264 memcpy(server_response_sig, cifs_pdu->Signature.SecuritySignature, 8); in cifs_verify_signature()
266 cifs_pdu->Signature.Sequence.SequenceNumber = in cifs_verify_signature()
268 cifs_pdu->Signature.Sequence.Reserved = 0; in cifs_verify_signature()