/kernel/linux/linux-5.10/fs/cifs/ |
H A D | cifsencrypt.c | 275 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 276 if (!ses->auth_key.response) in setup_ntlm_response() 279 ses->auth_key.len = temp_len; in setup_ntlm_response() 282 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 296 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 374 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 375 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 376 if (!ses->auth_key.response) { in build_avpair_blob() 377 ses->auth_key in build_avpair_blob() [all...] |
H A D | sess.c | 604 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 606 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 610 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 655 int sz = sizeof(AUTHENTICATE_MESSAGE) + ses->auth_key.len in size_of_ntlmssp_blob() 720 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 721 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 722 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob() 725 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 727 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 917 kmemdup(ses->auth_key in sess_establish_session() [all...] |
H A D | cifs_ioctl.h | 63 __u8 auth_key[16]; /* SMB2_NTLMV2_SESSKEY_SIZE */ member
|
H A D | ioctl.c | 292 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
H A D | smb2transport.c | 250 rc = crypto_shash_setkey(hash, ses->auth_key.response, in smb2_calc_signature() 318 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 456 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
H A D | misc.c | 109 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
|
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | cifsencrypt.c | 409 kfree_sensitive(ses->auth_key.response); in build_avpair_blob() 410 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob() 411 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 412 if (!ses->auth_key.response) { in build_avpair_blob() 413 ses->auth_key.len = 0; in build_avpair_blob() 417 blobptr = ses->auth_key.response; in build_avpair_blob() 452 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 455 blobptr = ses->auth_key in find_domain_name() [all...] |
H A D | sess.c | 992 kfree_sensitive(ses->auth_key.response); in decode_ntlmssp_challenge() 993 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 995 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 999 ses->auth_key.len = tilen; in decode_ntlmssp_challenge() 1007 int sz = base_size + ses->auth_key.len in size_of_ntlmssp_blob() 1238 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 1239 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 1240 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob() 1243 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob() 1245 cpu_to_le16(ses->auth_key in build_ntlmssp_auth_blob() [all...] |
H A D | ioctl.c | 304 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key() 481 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
H A D | cifs_ioctl.h | 64 __u8 auth_key[16]; /* SMB2_NTLMV2_SESSKEY_SIZE */ member
|
H A D | smb2transport.c | 261 rc = crypto_shash_setkey(shash->tfm, ses->auth_key.response, in smb2_calc_signature() 331 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 481 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
H A D | smb2pdu.c | 1619 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1620 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1622 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1628 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos() 1650 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos() 1651 ses->auth_key.response = NULL; in SMB2_auth_kerberos() 1652 ses->auth_key.len = 0; in SMB2_auth_kerberos() 1828 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate() 1830 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
|
H A D | connect.c | 3925 if (ses->auth_key.response) { in cifs_setup_session() 3926 cifs_dbg(FYI, "Free previous auth_key.response = %p\n", in cifs_setup_session() 3927 ses->auth_key.response); in cifs_setup_session() 3928 kfree_sensitive(ses->auth_key.response); in cifs_setup_session() 3929 ses->auth_key.response = NULL; in cifs_setup_session() 3930 ses->auth_key.len = 0; in cifs_setup_session()
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | auth.c | 819 struct sctp_authkey *auth_key) in sctp_auth_set_key() 840 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() 846 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key() 851 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key() 857 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key() 868 if (asoc && asoc->active_key_id == auth_key->sca_keynumber && in sctp_auth_set_key() 817 sctp_auth_set_key(struct sctp_endpoint *ep, struct sctp_association *asoc, struct sctp_authkey *auth_key) sctp_auth_set_key() argument
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | auth.c | 819 struct sctp_authkey *auth_key) in sctp_auth_set_key() 840 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key() 846 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key() 851 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key() 857 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key() 868 if (asoc && asoc->active_key_id == auth_key->sca_keynumber && in sctp_auth_set_key() 817 sctp_auth_set_key(struct sctp_endpoint *ep, struct sctp_association *asoc, struct sctp_authkey *auth_key) sctp_auth_set_key() argument
|
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 91 u32 auth_key[16]; /* Authentication Key */ member 369 if (key_len > sizeof(cfg->auth_key)) { in nfp_net_xfrm_add_state() 373 for (i = 0; i < key_len / sizeof(cfg->auth_key[0]) ; i++) in nfp_net_xfrm_add_state() 374 cfg->auth_key[i] = get_unaligned_be32(x->aalg->alg_key + in nfp_net_xfrm_add_state() 375 sizeof(cfg->auth_key[0]) * i); in nfp_net_xfrm_add_state()
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | aead.h | 17 u8 auth_key[QCE_MAX_KEY_SIZE]; member
|
H A D | aead.c | 585 memcpy(ctx->auth_key, key, keylen); in qce_aead_ccm_setkey() 645 memset(ctx->auth_key, 0, sizeof(ctx->auth_key)); in qce_aead_setkey() 646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
|
H A D | common.c | 470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
|
/kernel/linux/linux-5.10/include/net/sctp/ |
H A D | auth.h | 103 struct sctp_authkey *auth_key);
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | key-type.h | 40 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | key-type.h | 41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
|
/kernel/linux/linux-6.6/include/net/sctp/ |
H A D | auth.h | 103 struct sctp_authkey *auth_key);
|
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 99 const u8 *auth_key, in qat_alg_do_precomputes() 114 int ret = crypto_shash_digest(shash, auth_key, in qat_alg_do_precomputes() 121 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes() 122 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes() 97 qat_alg_do_precomputes(struct icp_qat_hw_auth_algo_blk *hash, struct qat_alg_aead_ctx *ctx, const u8 *auth_key, unsigned int auth_keylen) qat_alg_do_precomputes() argument
|
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 113 const u8 *auth_key, in qat_alg_do_precomputes() 128 int ret = crypto_shash_digest(shash, auth_key, in qat_alg_do_precomputes() 135 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes() 136 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes() 111 qat_alg_do_precomputes(struct icp_qat_hw_auth_algo_blk *hash, struct qat_alg_aead_ctx *ctx, const u8 *auth_key, unsigned int auth_keylen) qat_alg_do_precomputes() argument
|