Home
last modified time | relevance | path

Searched refs:auth_key (Results 1 – 18 of 18) sorted by relevance

/linux/fs/smb/client/
H A Dcifsencrypt.c146 kfree_sensitive(ses->auth_key.response); in build_avpair_blob()
147 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob()
148 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
149 if (!ses->auth_key.response) { in build_avpair_blob()
150 ses->auth_key.len = 0; in build_avpair_blob()
154 blobptr = ses->auth_key.response; in build_avpair_blob()
182 end = (u8 *)ses->auth_key.response + ses->auth_key.len; in find_next_av()
184 if (unlikely(!ses->auth_key.response || !ses->auth_key.len)) in find_next_av()
186 av = (void *)ses->auth_key.response; in find_next_av()
321 (ses->auth_key.response + CIFS_SESS_KEY_SIZE); in CalcNTLMv2_response()
[all …]
H A Dsmb1session.c377 kmemdup(ses->auth_key.response, in sess_establish_session()
378 ses->auth_key.len, GFP_KERNEL); in sess_establish_session()
384 ses->auth_key.len; in sess_establish_session()
452 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlmv2()
453 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in sess_auth_ntlmv2()
454 bcc_ptr += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in sess_auth_ntlmv2()
460 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in sess_auth_ntlmv2()
522 kfree_sensitive(ses->auth_key.response); in sess_auth_ntlmv2()
523 ses->auth_key.response = NULL; in sess_auth_ntlmv2()
571 kfree_sensitive(ses->auth_key.response); in sess_auth_kerberos()
[all …]
H A Dsess.c708 kfree_sensitive(ses->auth_key.response); in decode_ntlmssp_challenge()
709 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge()
711 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
715 ses->auth_key.len = tilen; in decode_ntlmssp_challenge()
723 int sz = base_size + ses->auth_key.len in size_of_ntlmssp_blob()
960 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob()
961 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
962 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob()
965 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
967 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
H A Dsmb2transport.c152 if (likely(ses->auth_key.response)) { in smb2_get_sign_key()
153 memcpy(key, ses->auth_key.response, in smb2_get_sign_key()
281 hmac_sha256_init_usingrawkey(&hmac_ctx, ses->auth_key.response, in generate_key()
391 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
H A Dioctl.c325 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key()
507 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
H A Dcifs_ioctl.h64 __u8 auth_key[SMB2_NTLMV2_SESSKEY_SIZE]; member
H A Dsmb2pdu.c1719 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1720 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos()
1722 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
1728 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
1750 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1751 ses->auth_key.response = NULL; in SMB2_auth_kerberos()
1752 ses->auth_key.len = 0; in SMB2_auth_kerberos()
1928 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
1930 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
H A Dconnect.c4129 if (ses->auth_key.response) { in cifs_setup_session()
4131 ses->auth_key.response); in cifs_setup_session()
4132 kfree_sensitive(ses->auth_key.response); in cifs_setup_session()
4133 ses->auth_key.response = NULL; in cifs_setup_session()
4134 ses->auth_key.len = 0; in cifs_setup_session()
H A Dmisc.c106 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
/linux/net/sctp/
H A Dauth.c722 struct sctp_authkey *auth_key) in sctp_auth_set_key() argument
743 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key()
749 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key()
754 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key()
760 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key()
771 if (asoc && asoc->active_key_id == auth_key->sca_keynumber && in sctp_auth_set_key()
/linux/drivers/crypto/qce/
H A Daead.h17 u8 auth_key[QCE_MAX_KEY_SIZE]; member
H A Daead.c585 memcpy(ctx->auth_key, key, keylen); in qce_aead_ccm_setkey()
645 memset(ctx->auth_key, 0, sizeof(ctx->auth_key)); in qce_aead_setkey()
646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
H A Dcommon.c470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
/linux/include/linux/
H A Dkey-type.h41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
/linux/Documentation/translations/zh_CN/filesystems/
H A Dubifs.rst84 auth_key= 指定用于文件系统身份验证的密钥。
/linux/Documentation/filesystems/
H A Dubifs.rst101 auth_key= specify the key used for authenticating the filesystem.
/linux/drivers/crypto/
H A Dsa2ul.c718 const u8 *auth_key, u16 auth_key_sz, in sa_init_sc() argument
766 sa_set_sc_auth(ad, auth_key, auth_key_sz, in sa_init_sc()
/linux/drivers/net/wireless/intel/ipw2x00/
H A Dipw2200.c7247 priv->assoc_request.auth_key = 0; in ipw_associate_network()
7252 priv->assoc_request.auth_key = priv->ieee->sec.active_key; in ipw_associate_network()