Symbol: CIFS_SESS_KEY_SIZE
fs/smb/client/cifsencrypt.c
321
(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
fs/smb/client/cifsencrypt.c
325
hash_len = ses->auth_key.len - (CIFS_SESS_KEY_SIZE +
fs/smb/client/cifsencrypt.c
345
size_t baselen = CIFS_SESS_KEY_SIZE + sizeof(struct ntlmv2_resp);
fs/smb/client/cifsencrypt.c
456
(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
fs/smb/client/cifsencrypt.c
495
unsigned char sec_key[CIFS_SESS_KEY_SIZE]; /* a nonce */
fs/smb/client/cifsencrypt.c
501
get_random_bytes(sec_key, CIFS_SESS_KEY_SIZE);
fs/smb/client/cifsencrypt.c
509
arc4_setkey(ctx_arc4, ses->auth_key.response, CIFS_SESS_KEY_SIZE);
fs/smb/client/cifsencrypt.c
514
memcpy(ses->auth_key.response, sec_key, CIFS_SESS_KEY_SIZE);
fs/smb/client/cifsencrypt.c
516
ses->auth_key.len = CIFS_SESS_KEY_SIZE;
fs/smb/client/cifsencrypt.c
518
memzero_explicit(sec_key, CIFS_SESS_KEY_SIZE);
fs/smb/client/ioctl.c
294
out.session_key_length = CIFS_SESS_KEY_SIZE;
fs/smb/client/ioctl.c
299
out.session_key_length = CIFS_SESS_KEY_SIZE;
fs/smb/client/sess.c
724
- CIFS_SESS_KEY_SIZE + CIFS_CPHTXT_SIZE + 2;
fs/smb/client/sess.c
960
memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
fs/smb/client/sess.c
961
ses->auth_key.len - CIFS_SESS_KEY_SIZE);
fs/smb/client/sess.c
962
tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
fs/smb/client/sess.c
965
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
fs/smb/client/sess.c
967
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
fs/smb/client/smb1session.c
452
memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
fs/smb/client/smb1session.c
453
ses->auth_key.len - CIFS_SESS_KEY_SIZE);
fs/smb/client/smb1session.c
454
bcc_ptr += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
fs/smb/client/smb1session.c
460
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);