Lines Matching refs:rc

83 	int rc;
91 rc = crypto_shash_setkey(CRYPTO_HMACMD5_TFM(ctx),
94 if (rc) {
95 ksmbd_debug(AUTH, "hmacmd5 set key fail error %d\n", rc);
99 rc = crypto_shash_init(CRYPTO_HMACMD5(ctx));
100 if (rc) {
101 ksmbd_debug(AUTH, "could not init hmacmd5 error %d\n", rc);
105 rc = crypto_shash_update(CRYPTO_HMACMD5(ctx),
108 if (rc) {
109 ksmbd_debug(AUTH, "Could not update with response error %d\n", rc);
113 rc = crypto_shash_final(CRYPTO_HMACMD5(ctx), sess->sess_key);
114 if (rc) {
115 ksmbd_debug(AUTH, "Could not generate hmacmd5 hash error %d\n", rc);
121 return rc;
228 int rc, len;
230 rc = calc_ntlmv2_hash(conn, sess, ntlmv2_hash, domain_name);
231 if (rc) {
232 ksmbd_debug(AUTH, "could not get v2 hash rc %d\n", rc);
242 rc = crypto_shash_setkey(CRYPTO_HMACMD5_TFM(ctx),
245 if (rc) {
250 rc = crypto_shash_init(CRYPTO_HMACMD5(ctx));
251 if (rc) {
259 rc = -ENOMEM;
266 rc = crypto_shash_update(CRYPTO_HMACMD5(ctx), construct, len);
267 if (rc) {
272 rc = crypto_shash_final(CRYPTO_HMACMD5(ctx), ntlmv2_rsp);
273 if (rc) {
280 rc = ksmbd_gen_sess_key(sess, ntlmv2_hash, ntlmv2_rsp);
281 if (rc) {
287 rc = -EINVAL;
292 return rc;
581 int rc, i;
589 rc = crypto_shash_setkey(CRYPTO_HMACSHA256_TFM(ctx),
592 if (rc)
595 rc = crypto_shash_init(CRYPTO_HMACSHA256(ctx));
596 if (rc) {
597 ksmbd_debug(AUTH, "hmacsha256 init error %d\n", rc);
602 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
605 if (rc) {
606 ksmbd_debug(AUTH, "hmacsha256 update error %d\n", rc);
611 rc = crypto_shash_final(CRYPTO_HMACSHA256(ctx), sig);
612 if (rc)
613 ksmbd_debug(AUTH, "hmacsha256 generation error %d\n", rc);
616 return rc;
632 int rc, i;
640 rc = crypto_shash_setkey(CRYPTO_CMACAES_TFM(ctx),
643 if (rc)
646 rc = crypto_shash_init(CRYPTO_CMACAES(ctx));
647 if (rc) {
648 ksmbd_debug(AUTH, "cmaces init error %d\n", rc);
653 rc = crypto_shash_update(CRYPTO_CMACAES(ctx),
656 if (rc) {
657 ksmbd_debug(AUTH, "cmaces update error %d\n", rc);
662 rc = crypto_shash_final(CRYPTO_CMACAES(ctx), sig);
663 if (rc)
664 ksmbd_debug(AUTH, "cmaces generation error %d\n", rc);
667 return rc;
684 int rc;
698 rc = crypto_shash_setkey(CRYPTO_HMACSHA256_TFM(ctx),
701 if (rc)
704 rc = crypto_shash_init(CRYPTO_HMACSHA256(ctx));
705 if (rc) {
706 ksmbd_debug(AUTH, "hmacsha256 init error %d\n", rc);
710 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), i, 4);
711 if (rc) {
716 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
719 if (rc) {
724 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), &zero, 1);
725 if (rc) {
730 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
733 if (rc) {
741 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), L256, 4);
743 rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), L128, 4);
744 if (rc) {
749 rc = crypto_shash_final(CRYPTO_HMACSHA256(ctx), hashptr);
750 if (rc) {
752 rc);
760 return rc;
767 int rc;
780 rc = generate_key(conn, sess, signing->label, signing->context, key,
782 if (rc)
783 return rc;
843 int rc;
845 rc = generate_key(conn, sess, ptwin->encryption.label,
848 if (rc)
849 return rc;
851 rc = generate_key(conn, sess, ptwin->decryption.label,
854 if (rc)
855 return rc;
922 int rc;
938 rc = crypto_shash_init(CRYPTO_SHA512(ctx));
939 if (rc) {
944 rc = crypto_shash_update(CRYPTO_SHA512(ctx), pi_hash, 64);
945 if (rc) {
950 rc = crypto_shash_update(CRYPTO_SHA512(ctx), all_bytes_msg, msg_size);
951 if (rc) {
956 rc = crypto_shash_final(CRYPTO_SHA512(ctx), pi_hash);
957 if (rc) {
958 ksmbd_debug(AUTH, "Could not generate hash err : %d\n", rc);
963 return rc;
969 int rc;
978 rc = crypto_shash_init(CRYPTO_SHA256(ctx));
979 if (rc) {
984 rc = crypto_shash_update(CRYPTO_SHA256(ctx), sd_buf, len);
985 if (rc) {
990 rc = crypto_shash_final(CRYPTO_SHA256(ctx), pi_hash);
991 if (rc) {
992 ksmbd_debug(AUTH, "Could not generate hash err : %d\n", rc);
997 return rc;
1110 int rc;
1121 rc = ksmbd_get_encryption_key(work,
1125 if (rc) {
1127 return rc;
1148 rc = crypto_aead_setkey(tfm, key, SMB3_GCM256_CRYPTKEY_SIZE);
1150 rc = crypto_aead_setkey(tfm, key, SMB3_GCM128_CRYPTKEY_SIZE);
1151 if (rc) {
1152 pr_err("Failed to set aead key %d\n", rc);
1156 rc = crypto_aead_setauthsize(tfm, SMB2_SIGNATURE_SIZE);
1157 if (rc) {
1158 pr_err("Failed to set authsize %d\n", rc);
1164 rc = -ENOMEM;
1176 rc = -ENOMEM;
1183 rc = -ENOMEM;
1200 rc = crypto_aead_encrypt(req);
1202 rc = crypto_aead_decrypt(req);
1203 if (rc)
1217 return rc;