Searched refs:user_name (Results 1 – 12 of 12) sorted by relevance
| /fs/smb/client/ |
| A D | cifs_spnego.c | 111 if (sesInfo->user_name) in cifs_get_spnego_key() 112 desc_len += USER_KEY_LEN + strlen(sesInfo->user_name); in cifs_get_spnego_key() 156 if (sesInfo->user_name) in cifs_get_spnego_key() 157 dp += sprintf(dp, ";user=%s", sesInfo->user_name); in cifs_get_spnego_key()
|
| A D | sess.c | 512 ctx->username = ses->user_name; in cifs_ses_add_channel() 764 if (ses->user_name == NULL) { in unicode_ssetup_strings() 769 bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->user_name, in unicode_ssetup_strings() 790 if (ses->user_name != NULL) { in ascii_ssetup_strings() 791 len = strscpy(bcc_ptr, ses->user_name, CIFS_MAX_USERNAME_LEN); in ascii_ssetup_strings() 988 if (ses->user_name) in size_of_ntlmssp_blob() 989 sz += sizeof(__le16) * strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN); in size_of_ntlmssp_blob() 1216 if (ses->user_name != NULL) { in build_ntlmssp_auth_blob() 1240 ses->user_name, in build_ntlmssp_auth_blob() 1461 if (ses->user_name != NULL) { in sess_auth_ntlmv2()
|
| A D | cifsencrypt.c | 433 len = ses->user_name ? strlen(ses->user_name) : 0; in calc_ntlmv2_hash() 439 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash()
|
| A D | cifs_swn.c | 50 if (tcon->ses->user_name != NULL) { in cifs_swn_auth_info_ntlm() 51 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); in cifs_swn_auth_info_ntlm()
|
| A D | cifsfs.c | 481 if (ses->user_name == NULL) in cifs_show_security() 595 else if (tcon->ses->user_name) in cifs_show_options() 596 seq_show_option(s, "username", tcon->ses->user_name); in cifs_show_options()
|
| A D | connect.c | 1966 if (ses->user_name == NULL) { in match_session() 1973 if (strncmp(ses->user_name, in match_session() 2423 ses->user_name = kstrdup(ctx->username, GFP_KERNEL); in cifs_get_smb_ses() 2424 if (!ses->user_name) in cifs_get_smb_ses()
|
| A D | misc.c | 102 kfree(buf_to_free->user_name); in sesInfoFree()
|
| A D | cifsglob.h | 1118 char *user_name; /* must not be null except during init of sess member
|
| A D | smb2pdu.c | 1301 if (tcon->ses->user_name == NULL) { in smb3_validate_negotiate() 1574 sess_data->ses->user_name, in SMB2_sess_sendreceive() 2096 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
| /fs/smb/server/mgmt/ |
| A D | user_config.h | 49 static inline char *user_name(struct ksmbd_user *user) in user_name() function
|
| /fs/smb/server/ |
| A D | transport_ipc.c | 666 if (strlen(user_name(sess->user)) >= KSMBD_REQ_MAX_ACCOUNT_NAME_SZ) in ksmbd_ipc_tree_connect_request() 683 strscpy(req->account, user_name(sess->user), KSMBD_REQ_MAX_ACCOUNT_NAME_SZ); in ksmbd_ipc_tree_connect_request()
|
| A D | auth.c | 153 len = strlen(user_name(sess->user)); in calc_ntlmv2_hash() 160 conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len, in calc_ntlmv2_hash()
|
Completed in 51 milliseconds