Lines Matching +full:0 +full:x6e
41 0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
42 0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
43 0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
44 0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
45 0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
46 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
47 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
48 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
49 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
50 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
51 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
52 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
54 0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
55 0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
56 0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
57 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
58 0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
59 0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
60 0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
61 0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
62 0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
63 0x72, 0x65
162 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
186 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
218 * Return: 0 on success, error number on error
286 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0) in ksmbd_auth_ntlmv2()
303 * Return: 0 on success, error number on error
402 return 0; in ksmbd_decode_ntlmssp_neg_blob()
419 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob()
460 if (conv_len < 0 || conv_len > len) { in ksmbd_build_ntlmssp_challenge_blob()
486 chgblob->TargetInfoArray.Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
498 tinfo->Type = 0; in ksmbd_build_ntlmssp_challenge_blob()
499 tinfo->Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
559 retval = 0; in ksmbd_krb5_authenticate()
605 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb2_pdu()
656 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb3_pdu()
684 unsigned char zero = 0x0; in generate_key()
685 __u8 i[4] = {0, 0, 0, 1}; in generate_key()
686 __u8 L128[4] = {0, 0, 0, 128}; in generate_key()
687 __u8 L256[4] = {0, 0, 1, 0}; in generate_key()
693 memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE); in generate_key()
694 memset(key, 0x0, key_size); in generate_key()
777 return 0; in generate_smb3signingkey()
798 return 0; in generate_smb3signingkey()
878 return 0; in generate_smb3encryptionkey()
1023 return 0; in ksmbd_get_encryption_key()
1043 int i, *nr_entries, total_entries = 0, sg_idx = 0; in ksmbd_init_sg()
1052 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1076 smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len); in ksmbd_init_sg()
1077 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1084 for (j = 0; j < nr_entries[i]; j++) { in ksmbd_init_sg()
1099 offset = 0; in ksmbd_init_sg()
1115 struct smb2_transform_hdr *tr_hdr = smb2_get_msg(iov[0].iov_base); in ksmbd_crypt_message()
1198 iv[0] = 3; in ksmbd_crypt_message()