Home
last modified time | relevance | path

Searched refs:auth_key (Results 1 – 9 of 9) sorted by relevance

/fs/smb/client/
A Dcifsencrypt.c296 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob()
297 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
298 if (!ses->auth_key.response) { in build_avpair_blob()
299 ses->auth_key.len = 0; in build_avpair_blob()
303 blobptr = ses->auth_key.response; in build_avpair_blob()
331 end = (u8 *)ses->auth_key.response + ses->auth_key.len; in find_next_av()
333 if (unlikely(!ses->auth_key.response || !ses->auth_key.len)) in find_next_av()
580 ses->auth_key.len = len; in set_auth_key_response()
582 ses->auth_key.response = rsp; in set_auth_key_response()
645 tiblob = ses->auth_key.response; in setup_ntlmv2_rsp()
[all …]
A Dsess.c968 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
972 ses->auth_key.len = tilen; in decode_ntlmssp_challenge()
1394 kmemdup(ses->auth_key.response, in sess_establish_session()
1395 ses->auth_key.len, GFP_KERNEL); in sess_establish_session()
1401 ses->auth_key.len; in sess_establish_session()
1540 ses->auth_key.response = NULL; in sess_auth_ntlmv2()
1591 if (!ses->auth_key.response) { in sess_auth_kerberos()
1597 ses->auth_key.len = msg->sesskey_len; in sess_auth_kerberos()
1679 ses->auth_key.response = NULL; in sess_auth_kerberos()
1824 ses->auth_key.response = NULL; in sess_auth_rawntlmssp_negotiate()
[all …]
A Dioctl.c326 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key()
508 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
A Dsmb2transport.c190 if (likely(ses->auth_key.response)) { in smb2_get_sign_key()
191 memcpy(key, ses->auth_key.response, in smb2_get_sign_key()
357 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key()
507 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
A Dcifs_ioctl.h64 __u8 auth_key[SMB2_NTLMV2_SESSKEY_SIZE]; member
A Dsmb2pdu.c1655 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1656 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos()
1658 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
1664 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
1686 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1687 ses->auth_key.response = NULL; in SMB2_auth_kerberos()
1688 ses->auth_key.len = 0; in SMB2_auth_kerberos()
1864 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
1866 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
A Dconnect.c4315 if (ses->auth_key.response) { in cifs_setup_session()
4317 ses->auth_key.response); in cifs_setup_session()
4318 kfree_sensitive(ses->auth_key.response); in cifs_setup_session()
4319 ses->auth_key.response = NULL; in cifs_setup_session()
4320 ses->auth_key.len = 0; in cifs_setup_session()
A Dmisc.c105 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
A Dcifsglob.h1124 struct session_key auth_key; member

Completed in 38 milliseconds