/linux/fs/cifs/ |
A D | cifsencrypt.c | 281 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 282 if (!ses->auth_key.response) { in build_avpair_blob() 283 ses->auth_key.len = 0; in build_avpair_blob() 287 blobptr = ses->auth_key.response; in build_avpair_blob() 322 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 375 if (!ses->auth_key.len || !ses->auth_key.response) in find_timestamp() 603 tilen = ses->auth_key.len; in setup_ntlmv2_rsp() 607 if (!ses->auth_key.response) { in setup_ntlmv2_rsp() 609 ses->auth_key.len = 0; in setup_ntlmv2_rsp() 612 ses->auth_key.len += baselen; in setup_ntlmv2_rsp() [all …]
|
A D | sess.c | 653 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 657 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 993 ses->auth_key.len; in sess_establish_session() 1135 kfree(ses->auth_key.response); in sess_auth_ntlmv2() 1136 ses->auth_key.response = NULL; in sess_auth_ntlmv2() 1185 if (!ses->auth_key.response) { in sess_auth_kerberos() 1273 kfree(ses->auth_key.response); in sess_auth_kerberos() 1274 ses->auth_key.response = NULL; in sess_auth_kerberos() 1413 kfree(ses->auth_key.response); in sess_auth_rawntlmssp_negotiate() 1414 ses->auth_key.response = NULL; in sess_auth_rawntlmssp_negotiate() [all …]
|
A D | ioctl.c | 290 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key() 445 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
A D | cifs_ioctl.h | 59 __u8 auth_key[16]; /* SMB2_NTLMV2_SESSKEY_SIZE */ member
|
A D | smb2transport.c | 244 rc = crypto_shash_setkey(hash, ses->auth_key.response, in smb2_calc_signature() 314 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 453 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
A D | connect.c | 3839 if (ses->auth_key.response) { in cifs_setup_session() 3841 ses->auth_key.response); in cifs_setup_session() 3842 kfree(ses->auth_key.response); in cifs_setup_session() 3843 ses->auth_key.response = NULL; in cifs_setup_session() 3844 ses->auth_key.len = 0; in cifs_setup_session()
|
A D | smb2pdu.c | 1410 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1412 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1418 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos() 1600 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate() 1602 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
|
A D | misc.c | 99 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
|
A D | cifsglob.h | 938 struct session_key auth_key; member
|
/linux/net/sctp/ |
A D | auth.c | 819 struct sctp_authkey *auth_key) in sctp_auth_set_key() argument 840 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() 846 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key() 851 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key() 857 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key() 869 if (asoc && asoc->active_key_id == auth_key->sca_keynumber) in sctp_auth_set_key()
|
/linux/drivers/crypto/qce/ |
A D | aead.h | 17 u8 auth_key[QCE_MAX_KEY_SIZE]; member
|
A D | aead.c | 585 memcpy(ctx->auth_key, key, keylen); in qce_aead_ccm_setkey() 645 memset(ctx->auth_key, 0, sizeof(ctx->auth_key)); in qce_aead_setkey() 646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
|
A D | common.c | 469 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
|
/linux/include/linux/ |
A D | key-type.h | 41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
|
/linux/include/net/sctp/ |
A D | auth.h | 103 struct sctp_authkey *auth_key);
|
/linux/drivers/crypto/qat/qat_common/ |
A D | qat_algs.c | 126 const u8 *auth_key, in qat_alg_do_precomputes() argument 141 int ret = crypto_shash_digest(shash, auth_key, in qat_alg_do_precomputes() 148 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes() 149 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes()
|
/linux/Documentation/filesystems/ |
A D | ubifs.rst | 101 auth_key= specify the key used for authenticating the filesystem.
|
/linux/drivers/net/wireless/intel/ipw2x00/ |
A D | ipw2200.h | 869 u8 auth_type:4, auth_key:4; member 871 u8 auth_key:4, auth_type:4; member
|
A D | ipw2200.c | 7286 priv->assoc_request.auth_key = 0; in ipw_associate_network() 7291 priv->assoc_request.auth_key = priv->ieee->sec.active_key; in ipw_associate_network()
|
/linux/drivers/crypto/ |
A D | n2_core.c | 522 unsigned long auth_key, unsigned int auth_key_len) in n2_do_async_digest() argument 569 ent->auth_key_addr = auth_key; in n2_do_async_digest()
|
A D | sa2ul.c | 717 const u8 *auth_key, u16 auth_key_sz, in sa_init_sc() argument 765 sa_set_sc_auth(ad, auth_key, auth_key_sz, in sa_init_sc()
|