Searched refs:auth_key (Results 1 – 14 of 14) sorted by relevance
| /linux/fs/smb/client/ |
| H A D | cifsencrypt.c | 270 kfree_sensitive(ses->auth_key.response); in build_avpair_blob() 271 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 272 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 273 if (!ses->auth_key.response) { in build_avpair_blob() 274 ses->auth_key.len = 0; in build_avpair_blob() 278 blobptr = ses->auth_key.response; in build_avpair_blob() 306 end = (u8 *)ses->auth_key.response + ses->auth_key.len; in find_next_av() 308 if (unlikely(!ses->auth_key.response || !ses->auth_key.len)) in find_next_av() 310 av = (void *)ses->auth_key.response; in find_next_av() 445 (ses->auth_key.response + CIFS_SESS_KEY_SIZE); in CalcNTLMv2_response() [all …]
|
| H A D | sess.c | 982 kfree_sensitive(ses->auth_key.response); in decode_ntlmssp_challenge() 983 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 985 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 989 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 997 int sz = base_size + ses->auth_key.len in size_of_ntlmssp_blob() 1234 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 1235 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 1236 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob() 1239 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 1241 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() [all …]
|
| H A D | smb2transport.c | 152 if (likely(ses->auth_key.response)) { in smb2_get_sign_key() 153 memcpy(key, ses->auth_key.response, in smb2_get_sign_key() 281 hmac_sha256_init_usingrawkey(&hmac_ctx, ses->auth_key.response, in generate_key() 391 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
| H A D | ioctl.c | 326 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key() 508 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
| H A D | cifs_ioctl.h | 64 __u8 auth_key[SMB2_NTLMV2_SESSKEY_SIZE]; member
|
| H A D | smb2pdu.c | 1720 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1721 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1723 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1729 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos() 1751 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1752 ses->auth_key.response = NULL; in SMB2_auth_kerberos() 1753 ses->auth_key.len = 0; in SMB2_auth_kerberos() 1929 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate() 1931 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
|
| H A D | connect.c | 4310 if (ses->auth_key.response) { in cifs_setup_session() 4312 ses->auth_key.response); in cifs_setup_session() 4313 kfree_sensitive(ses->auth_key.response); in cifs_setup_session() 4314 ses->auth_key.response = NULL; in cifs_setup_session() 4315 ses->auth_key.len = 0; in cifs_setup_session()
|
| H A D | misc.c | 106 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
|
| H A D | cifsglob.h | 1094 struct session_key auth_key; member
|
| /linux/drivers/crypto/qce/ |
| H A D | aead.h | 17 u8 auth_key[QCE_MAX_KEY_SIZE]; member
|
| H A D | common.c | 470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
|
| /linux/include/linux/ |
| H A D | key-type.h | 41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
|
| /linux/Documentation/translations/zh_CN/filesystems/ |
| H A D | ubifs.rst | 84 auth_key= 指定用于文件系统身份验证的密钥。
|
| /linux/Documentation/filesystems/ |
| H A D | ubifs.rst | 101 auth_key= specify the key used for authenticating the filesystem.
|