Home
last modified time | relevance | path

Searched refs:auth_key (Results 1 – 25 of 26) sorted by relevance

12

/openbmc/linux/fs/smb/client/
H A Dcifsencrypt.c409 kfree_sensitive(ses->auth_key.response); in build_avpair_blob()
410 ses->auth_key.len = size + 2 * dlen; in build_avpair_blob()
411 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
412 if (!ses->auth_key.response) { in build_avpair_blob()
413 ses->auth_key.len = 0; in build_avpair_blob()
417 blobptr = ses->auth_key.response; in build_avpair_blob()
452 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name()
455 blobptr = ses->auth_key.response; in find_domain_name()
456 blobend = blobptr + ses->auth_key.len; in find_domain_name()
505 if (!ses->auth_key.len || !ses->auth_key.response) in find_timestamp()
[all …]
H A Dsess.c984 kfree_sensitive(ses->auth_key.response); in decode_ntlmssp_challenge()
985 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge()
987 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
991 ses->auth_key.len = tilen; in decode_ntlmssp_challenge()
999 int sz = base_size + ses->auth_key.len in size_of_ntlmssp_blob()
1236 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob()
1237 ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
1238 tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE; in build_ntlmssp_auth_blob()
1241 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
1243 cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE); in build_ntlmssp_auth_blob()
[all …]
H A Dioctl.c309 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key()
491 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
H A Dcifs_ioctl.h64 __u8 auth_key[16]; /* SMB2_NTLMV2_SESSKEY_SIZE */ member
H A Dsmb2transport.c190 if (likely(ses->auth_key.response)) { in smb2_get_sign_key()
191 memcpy(key, ses->auth_key.response, in smb2_get_sign_key()
357 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key()
507 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
H A Dsmb2pdu.c1652 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1653 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos()
1655 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
1661 ses->auth_key.len = msg->sesskey_len; in SMB2_auth_kerberos()
1683 kfree_sensitive(ses->auth_key.response); in SMB2_auth_kerberos()
1684 ses->auth_key.response = NULL; in SMB2_auth_kerberos()
1685 ses->auth_key.len = 0; in SMB2_auth_kerberos()
1861 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
1863 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
H A Dconnect.c4053 if (ses->auth_key.response) { in cifs_setup_session()
4055 ses->auth_key.response); in cifs_setup_session()
4056 kfree_sensitive(ses->auth_key.response); in cifs_setup_session()
4057 ses->auth_key.response = NULL; in cifs_setup_session()
4058 ses->auth_key.len = 0; in cifs_setup_session()
H A Dmisc.c104 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
H A Dcifsglob.h1083 struct session_key auth_key; member
/openbmc/linux/drivers/net/ethernet/netronome/nfp/crypto/
H A Dipsec.c91 u32 auth_key[16]; /* Authentication Key */ member
369 if (key_len > sizeof(cfg->auth_key)) { in nfp_net_xfrm_add_state()
373 for (i = 0; i < key_len / sizeof(cfg->auth_key[0]) ; i++) in nfp_net_xfrm_add_state()
374 cfg->auth_key[i] = get_unaligned_be32(x->aalg->alg_key + in nfp_net_xfrm_add_state()
375 sizeof(cfg->auth_key[0]) * i); in nfp_net_xfrm_add_state()
/openbmc/linux/net/sctp/
H A Dauth.c819 struct sctp_authkey *auth_key) in sctp_auth_set_key() argument
840 if (shkey->key_id == auth_key->sca_keynumber) { in sctp_auth_set_key()
846 cur_key = sctp_auth_shkey_create(auth_key->sca_keynumber, GFP_KERNEL); in sctp_auth_set_key()
851 key = sctp_auth_create_key(auth_key->sca_keylength, GFP_KERNEL); in sctp_auth_set_key()
857 memcpy(key->data, &auth_key->sca_key[0], auth_key->sca_keylength); in sctp_auth_set_key()
868 if (asoc && asoc->active_key_id == auth_key->sca_keynumber && in sctp_auth_set_key()
/openbmc/bmcweb/scripts/
H A Dgenerate_auth_certificates.py99 auth_key = x509.AuthorityKeyIdentifier.from_issuer_public_key(public_key)
101 builder = builder.add_extension(auth_key, critical=False)
161 auth_key = x509.AuthorityKeyIdentifier.from_issuer_public_key(public_key)
162 builder = builder.add_extension(auth_key, critical=False)
/openbmc/linux/drivers/crypto/qce/
H A Daead.h17 u8 auth_key[QCE_MAX_KEY_SIZE]; member
H A Daead.c585 memcpy(ctx->auth_key, key, keylen); in qce_aead_ccm_setkey()
645 memset(ctx->auth_key, 0, sizeof(ctx->auth_key)); in qce_aead_setkey()
646 memcpy(ctx->auth_key, authenc_keys.authkey, authenc_keys.authkeylen); in qce_aead_setkey()
H A Dcommon.c470 authkey_words = qce_be32_to_cpu_array(authkey, ctx->auth_key, auth_keylen); in qce_setup_regs_aead()
/openbmc/linux/include/linux/
H A Dkey-type.h41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux);
/openbmc/linux/include/net/sctp/
H A Dauth.h103 struct sctp_authkey *auth_key);
/openbmc/qemu/include/sysemu/
H A Dcryptodev.h84 uint8_t *auth_key; member
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_algs.c113 const u8 *auth_key, in qat_alg_do_precomputes() argument
128 int ret = crypto_shash_digest(shash, auth_key, in qat_alg_do_precomputes()
135 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes()
136 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes()
/openbmc/qemu/hw/virtio/
H A Dvirtio-crypto.c42 g_free(sreq->info.u.sym_sess_info.auth_key); in virtio_crypto_free_create_session_req()
165 sym_info->auth_key = g_malloc(sym_info->auth_key_len); in virtio_crypto_create_sym_session()
166 s = iov_to_buf(iov, out_num, 0, sym_info->auth_key, in virtio_crypto_create_sym_session()
H A Dvhost-user.c161 uint8_t auth_key[VHOST_CRYPTO_SYM_HMAC_MAX_KEY_LEN]; member
2583 keylen = sizeof(msg.payload.session.u.sym.auth_key); in vhost_user_crypto_create_session()
2589 memcpy(&msg.payload.session.u.sym.auth_key, sess->auth_key, in vhost_user_crypto_create_session()
/openbmc/linux/Documentation/filesystems/
H A Dubifs.rst101 auth_key= specify the key used for authenticating the filesystem.
/openbmc/linux/drivers/net/wireless/intel/ipw2x00/
H A Dipw2200.h869 u8 auth_type:4, auth_key:4; member
871 u8 auth_key:4, auth_type:4; member
/openbmc/linux/drivers/crypto/
H A Dn2_core.c523 unsigned long auth_key, unsigned int auth_key_len) in n2_do_async_digest() argument
570 ent->auth_key_addr = auth_key; in n2_do_async_digest()
H A Dsa2ul.c718 const u8 *auth_key, u16 auth_key_sz, in sa_init_sc() argument
766 sa_set_sc_auth(ad, auth_key, auth_key_sz, in sa_init_sc()

12