/linux-4.1.27/fs/cifs/ |
H A D | cifsencrypt.c | 274 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); setup_ntlm_response() 275 if (!ses->auth_key.response) setup_ntlm_response() 278 ses->auth_key.len = temp_len; setup_ntlm_response() 281 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); setup_ntlm_response() 295 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); setup_ntlm_response() 369 ses->auth_key.len = size + 2 * dlen; build_avpair_blob() 370 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); build_avpair_blob() 371 if (!ses->auth_key.response) { build_avpair_blob() 372 ses->auth_key.len = 0; build_avpair_blob() 376 blobptr = ses->auth_key.response; build_avpair_blob() 411 if (!ses->auth_key.len || !ses->auth_key.response) find_domain_name() 414 blobptr = ses->auth_key.response; find_domain_name() 415 blobend = blobptr + ses->auth_key.len; find_domain_name() 463 if (!ses->auth_key.len || !ses->auth_key.response) find_timestamp() 466 blobptr = ses->auth_key.response; find_timestamp() 467 blobend = blobptr + ses->auth_key.len; find_timestamp() 598 (ses->auth_key.response + CIFS_SESS_KEY_SIZE); CalcNTLMv2_response() 602 hash_len = ses->auth_key.len - (CIFS_SESS_KEY_SIZE + CalcNTLMv2_response() 712 tilen = ses->auth_key.len; setup_ntlmv2_rsp() 713 tiblob = ses->auth_key.response; setup_ntlmv2_rsp() 715 ses->auth_key.response = kmalloc(baselen + tilen, GFP_KERNEL); setup_ntlmv2_rsp() 716 if (!ses->auth_key.response) { setup_ntlmv2_rsp() 718 ses->auth_key.len = 0; setup_ntlmv2_rsp() 721 ses->auth_key.len += baselen; setup_ntlmv2_rsp() 724 (ses->auth_key.response + CIFS_SESS_KEY_SIZE); setup_ntlmv2_rsp() 732 memcpy(ses->auth_key.response + baselen, tiblob, tilen); setup_ntlmv2_rsp() 778 ses->auth_key.response); setup_ntlmv2_rsp() 808 rc = crypto_blkcipher_setkey(tfm_arc4, ses->auth_key.response, calc_seckey() 827 memcpy(ses->auth_key.response, sec_key, CIFS_SESS_KEY_SIZE); calc_seckey() 829 ses->auth_key.len = CIFS_SESS_KEY_SIZE; calc_seckey()
|
H A D | sess.c | 318 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, decode_ntlmssp_challenge() 320 if (!ses->auth_key.response) { decode_ntlmssp_challenge() 324 ses->auth_key.len = tilen; decode_ntlmssp_challenge() 409 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, build_ntlmssp_auth_blob() 410 ses->auth_key.len - CIFS_SESS_KEY_SIZE); build_ntlmssp_auth_blob() 411 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; build_ntlmssp_auth_blob() 414 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); build_ntlmssp_auth_blob() 416 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); build_ntlmssp_auth_blob() 606 kmemdup(ses->auth_key.response, sess_establish_session() 607 ses->auth_key.len, GFP_KERNEL); sess_establish_session() 613 ses->auth_key.len; sess_establish_session() 799 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, sess_auth_ntlm() 802 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, sess_auth_ntlm() 868 kfree(ses->auth_key.response); sess_auth_ntlm() 869 ses->auth_key.response = NULL; sess_auth_ntlm() 906 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, sess_auth_ntlmv2() 907 ses->auth_key.len - CIFS_SESS_KEY_SIZE); sess_auth_ntlmv2() 908 bcc_ptr += ses->auth_key.len - CIFS_SESS_KEY_SIZE; sess_auth_ntlmv2() 914 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); sess_auth_ntlmv2() 976 kfree(ses->auth_key.response); sess_auth_ntlmv2() 977 ses->auth_key.response = NULL; sess_auth_ntlmv2() 1025 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, sess_auth_kerberos() 1027 if (!ses->auth_key.response) { sess_auth_kerberos() 1033 ses->auth_key.len = msg->sesskey_len; sess_auth_kerberos() 1115 kfree(ses->auth_key.response); sess_auth_kerberos() 1116 ses->auth_key.response = NULL; sess_auth_kerberos() 1251 kfree(ses->auth_key.response); sess_auth_rawntlmssp_negotiate() 1252 ses->auth_key.response = NULL; sess_auth_rawntlmssp_negotiate() 1370 kfree(ses->auth_key.response); sess_auth_rawntlmssp_authenticate() 1371 ses->auth_key.response = NULL; sess_auth_rawntlmssp_authenticate()
|
H A D | smb2transport.c | 162 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); smb2_calc_signature() 245 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); generate_smb3signingkey()
|
H A D | smb2pdu.c | 549 kfree(ses->auth_key.response); SMB2_sess_setup() 550 ses->auth_key.response = NULL; SMB2_sess_setup() 616 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, SMB2_sess_setup() 618 if (!ses->auth_key.response) { SMB2_sess_setup() 625 ses->auth_key.len = msg->sesskey_len; SMB2_sess_setup() 755 kfree(ses->auth_key.response); SMB2_sess_setup() 756 ses->auth_key.response = NULL; SMB2_sess_setup() 779 kfree(ses->auth_key.response); SMB2_sess_setup() 780 ses->auth_key.response = NULL; SMB2_sess_setup()
|
H A D | misc.c | 108 kfree(buf_to_free->auth_key.response); sesInfoFree()
|
H A D | cifsglob.h | 793 struct session_key auth_key; member in struct:cifs_ses
|
/linux-4.1.27/include/net/sctp/ |
H A D | auth.h | 112 struct sctp_authkey *auth_key);
|
/linux-4.1.27/net/sctp/ |
H A D | auth.c | 825 struct sctp_authkey *auth_key) sctp_auth_set_key() 841 if (cur_key->key_id == auth_key->sca_keynumber) { key_for_each() 851 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, 858 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); 862 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); 823 sctp_auth_set_key(struct sctp_endpoint *ep, struct sctp_association *asoc, struct sctp_authkey *auth_key) sctp_auth_set_key() argument
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 155 const uint8_t *auth_key, qat_alg_do_precomputes() 176 int ret = crypto_shash_digest(shash, auth_key, qat_alg_do_precomputes() 183 memcpy(ipad, auth_key, auth_keylen); qat_alg_do_precomputes() 184 memcpy(opad, auth_key, auth_keylen); qat_alg_do_precomputes() 153 qat_alg_do_precomputes(struct icp_qat_hw_auth_algo_blk *hash, struct qat_alg_aead_ctx *ctx, const uint8_t *auth_key, unsigned int auth_keylen) qat_alg_do_precomputes() argument
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
H A D | ipw2200.h | 883 u8 auth_type:4, auth_key:4; member in struct:ipw_associate 885 u8 auth_key:4, auth_type:4; member in struct:ipw_associate
|
H A D | ipw2200.c | 7315 priv->assoc_request.auth_key = 0; ipw_associate_network() 7320 priv->assoc_request.auth_key = priv->ieee->sec.active_key; ipw_associate_network()
|
/linux-4.1.27/drivers/crypto/ |
H A D | n2_core.c | 509 unsigned long auth_key, unsigned int auth_key_len) n2_do_async_digest() 556 ent->auth_key_addr = auth_key; n2_do_async_digest() 506 n2_do_async_digest(struct ahash_request *req, unsigned int auth_type, unsigned int digest_size, unsigned int result_size, void *hash_loc, unsigned long auth_key, unsigned int auth_key_len) n2_do_async_digest() argument
|