Lines Matching +full:0 +full:x6e
41 0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
42 0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
43 0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
44 0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
45 0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
46 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
47 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
48 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
49 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
50 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
51 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
52 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
54 0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
55 0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
56 0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
57 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
58 0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
59 0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
60 0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
61 0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
62 0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
63 0x72, 0x65
162 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
186 if (conv_len < 0 || conv_len > len) { in calc_ntlmv2_hash()
218 * Return: 0 on success, error number on error
286 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0) in ksmbd_auth_ntlmv2()
303 * Return: 0 on success, error number on error
402 return 0; in ksmbd_decode_ntlmssp_neg_blob()
419 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob()
460 if (conv_len < 0 || conv_len > len) { in ksmbd_build_ntlmssp_challenge_blob()
486 chgblob->TargetInfoArray.Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
498 tinfo->Type = 0; in ksmbd_build_ntlmssp_challenge_blob()
499 tinfo->Length = 0; in ksmbd_build_ntlmssp_challenge_blob()
559 retval = 0; in ksmbd_krb5_authenticate()
605 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb2_pdu()
656 for (i = 0; i < n_vec; i++) { in ksmbd_sign_smb3_pdu()
684 unsigned char zero = 0x0; in generate_key()
685 __u8 i[4] = {0, 0, 0, 1}; in generate_key()
686 __u8 L128[4] = {0, 0, 0, 128}; in generate_key()
687 __u8 L256[4] = {0, 0, 1, 0}; in generate_key()
693 memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE); in generate_key()
694 memset(key, 0x0, key_size); in generate_key()
777 return 0; in generate_smb3signingkey()
798 return 0; in generate_smb3signingkey()
878 return 0; in generate_smb3encryptionkey()
1021 return 0; in ksmbd_get_encryption_key()
1041 int i, *nr_entries, total_entries = 0, sg_idx = 0; in ksmbd_init_sg()
1050 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1073 smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len); in ksmbd_init_sg()
1074 for (i = 0; i < nvec - 1; i++) { in ksmbd_init_sg()
1081 for (j = 0; j < nr_entries[i]; j++) { in ksmbd_init_sg()
1096 offset = 0; in ksmbd_init_sg()
1112 struct smb2_transform_hdr *tr_hdr = smb2_get_msg(iov[0].iov_base); in ksmbd_crypt_message()
1195 iv[0] = 3; in ksmbd_crypt_message()