| /linux/fs/smb/client/ |
| H A D | cifs_spnego.c | 104 if (sesInfo->user_name) in cifs_get_spnego_key() 105 desc_len += USER_KEY_LEN + strlen(sesInfo->user_name); in cifs_get_spnego_key() 149 if (sesInfo->user_name) in cifs_get_spnego_key() 150 dp += sprintf(dp, ";user=%s", sesInfo->user_name); in cifs_get_spnego_key()
|
| H A D | smb1session.c | 177 if (ses->user_name == NULL) { in unicode_ssetup_strings() 182 bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->user_name, in unicode_ssetup_strings() 203 if (ses->user_name != NULL) { in ascii_ssetup_strings() 204 len = strscpy(bcc_ptr, ses->user_name, CIFS_MAX_USERNAME_LEN); in ascii_ssetup_strings() 444 if (ses->user_name != NULL) { in sess_auth_ntlmv2()
|
| H A D | sess.c | 528 ctx->username = ses->user_name; in cifs_ses_add_channel() 731 if (ses->user_name) in size_of_ntlmssp_blob() 732 sz += sizeof(__le16) * strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN); in size_of_ntlmssp_blob() 959 if (ses->user_name != NULL) { in build_ntlmssp_auth_blob() 983 ses->user_name, in build_ntlmssp_auth_blob()
|
| H A D | cifsencrypt.c | 274 len = ses->user_name ? strlen(ses->user_name) : 0; in calc_ntlmv2_hash() 280 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash()
|
| H A D | cifs_swn.c | 50 if (tcon->ses->user_name != NULL) { in cifs_swn_auth_info_ntlm() 51 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); in cifs_swn_auth_info_ntlm()
|
| H A D | cifsfs.c | 540 if (ses->user_name == NULL) in cifs_show_security() 658 else if (tcon->ses->user_name) in cifs_show_options() 659 seq_show_option(s, "username", tcon->ses->user_name); in cifs_show_options()
|
| H A D | connect.c | 1963 if (ses->user_name == NULL) { in match_session() 1970 if (strncmp(ses->user_name, in match_session() 2410 ses->user_name = kstrdup(ctx->username, GFP_KERNEL); in cifs_get_smb_ses() 2411 if (!ses->user_name) in cifs_get_smb_ses()
|
| H A D | misc.c | 108 kfree(buf_to_free->user_name); in sesInfoFree()
|
| H A D | cifsglob.h | 1078 char *user_name; /* must not be null except during init of sess member
|
| H A D | smb2pdu.c | 1353 if (tcon->ses->user_name == NULL) { in smb3_validate_negotiate() 1640 sess_data->ses->user_name, in SMB2_sess_sendreceive() 2157 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
| H A D | trace.h | 1708 __string(user, ses->user_name)
|
| /linux/drivers/dma-buf/ |
| H A D | sync_file.c | 134 if (sync_file->user_name[0]) { in sync_file_get_name() 135 strscpy(buf, sync_file->user_name, len); in sync_file_get_name() 181 strscpy(sync_file->user_name, name, sizeof(sync_file->user_name)); in sync_file_merge()
|
| /linux/include/linux/ |
| H A D | sync_file.h | 44 char user_name[32]; member
|
| /linux/drivers/net/wireless/ath/ath11k/ |
| H A D | pcic.h | 29 int ath11k_pcic_get_user_msi_assignment(struct ath11k_base *ab, char *user_name,
|
| H A D | pcic.c | 276 int ath11k_pcic_get_user_msi_assignment(struct ath11k_base *ab, char *user_name, in ath11k_pcic_get_user_msi_assignment() argument 284 if (strcmp(user_name, msi_config->users[idx].name) == 0) { in ath11k_pcic_get_user_msi_assignment() 291 user_name, *num_vectors, *user_base_data, in ath11k_pcic_get_user_msi_assignment() 298 ath11k_err(ab, "Failed to find MSI assignment for %s!\n", user_name); in ath11k_pcic_get_user_msi_assignment()
|
| /linux/fs/smb/server/ |
| H A D | transport_ipc.c | 678 if (strlen(user_name(sess->user)) >= KSMBD_REQ_MAX_ACCOUNT_NAME_SZ) in ksmbd_ipc_tree_connect_request() 695 strscpy(req->account, user_name(sess->user), KSMBD_REQ_MAX_ACCOUNT_NAME_SZ); in ksmbd_ipc_tree_connect_request()
|
| H A D | auth.c | 87 len = strlen(user_name(sess->user)); in calc_ntlmv2_hash() 94 conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len, in calc_ntlmv2_hash()
|