CIFS_SESS_KEY_SIZE
(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
hash_len = ses->auth_key.len - (CIFS_SESS_KEY_SIZE +
size_t baselen = CIFS_SESS_KEY_SIZE + sizeof(struct ntlmv2_resp);
(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
unsigned char sec_key[CIFS_SESS_KEY_SIZE]; /* a nonce */
get_random_bytes(sec_key, CIFS_SESS_KEY_SIZE);
arc4_setkey(ctx_arc4, ses->auth_key.response, CIFS_SESS_KEY_SIZE);
memcpy(ses->auth_key.response, sec_key, CIFS_SESS_KEY_SIZE);
ses->auth_key.len = CIFS_SESS_KEY_SIZE;
memzero_explicit(sec_key, CIFS_SESS_KEY_SIZE);
out.session_key_length = CIFS_SESS_KEY_SIZE;
out.session_key_length = CIFS_SESS_KEY_SIZE;
- CIFS_SESS_KEY_SIZE + CIFS_CPHTXT_SIZE + 2;
memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
ses->auth_key.len - CIFS_SESS_KEY_SIZE);
tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
ses->auth_key.len - CIFS_SESS_KEY_SIZE);
bcc_ptr += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);