Searched refs:auth_key (Results 1 – 9 of 9) sorted by relevance
| /fs/smb/client/ |
| A D | cifsencrypt.c | 296 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 297 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 298 if (!ses->auth_key.response) { in build_avpair_blob() 299 ses->auth_key.len = 0; in build_avpair_blob() 303 blobptr = ses->auth_key.response; in build_avpair_blob() 331 end = (u8 *)ses->auth_key.response + ses->auth_key.len; in find_next_av() 333 if (unlikely(!ses->auth_key.response || !ses->auth_key.len)) in find_next_av() 580 ses->auth_key.len = len; in set_auth_key_response() 582 ses->auth_key.response = rsp; in set_auth_key_response() 645 tiblob = ses->auth_key.response; in setup_ntlmv2_rsp() [all …]
|
| A D | sess.c | 968 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 972 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 1394 kmemdup(ses->auth_key.response, in sess_establish_session() 1395 ses->auth_key.len, GFP_KERNEL); in sess_establish_session() 1401 ses->auth_key.len; in sess_establish_session() 1540 ses->auth_key.response = NULL; in sess_auth_ntlmv2() 1591 if (!ses->auth_key.response) { in sess_auth_kerberos() 1597 ses->auth_key.len = msg->sesskey_len; in sess_auth_kerberos() 1679 ses->auth_key.response = NULL; in sess_auth_kerberos() 1824 ses->auth_key.response = NULL; in sess_auth_rawntlmssp_negotiate() [all …]
|
| A D | ioctl.c | 326 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key() 508 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
| A D | smb2transport.c | 190 if (likely(ses->auth_key.response)) { in smb2_get_sign_key() 191 memcpy(key, ses->auth_key.response, in smb2_get_sign_key() 357 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 507 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
| A D | cifs_ioctl.h | 64 __u8 auth_key[SMB2_NTLMV2_SESSKEY_SIZE]; member
|
| A D | smb2pdu.c | 1655 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1656 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1658 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1664 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos() 1686 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1687 ses->auth_key.response = NULL; in SMB2_auth_kerberos() 1688 ses->auth_key.len = 0; in SMB2_auth_kerberos() 1864 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate() 1866 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
|
| A D | connect.c | 4315 if (ses->auth_key.response) { in cifs_setup_session() 4317 ses->auth_key.response); in cifs_setup_session() 4318 kfree_sensitive(ses->auth_key.response); in cifs_setup_session() 4319 ses->auth_key.response = NULL; in cifs_setup_session() 4320 ses->auth_key.len = 0; in cifs_setup_session()
|
| A D | misc.c | 105 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
|
| A D | cifsglob.h | 1124 struct session_key auth_key; member
|
Completed in 38 milliseconds