Searched refs:NTLMv2 (Results 1 – 10 of 10) sorted by relevance
/openbmc/linux/fs/smb/server/ |
H A D | Kconfig | 44 establishment via Kerberos or NTLMv2.
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 681 Use NTLMv2 password hashing 683 Use NTLMv2 password hashing with packet signing 725 flags (e.g. for NTLMv2) may be combined with 732 (NTLMv2 and packet signing allowed). Some SecurityFlags 737 may use NTLMv2 0x00004 738 must use NTLMv2 0x04004 821 project(https://www.samba.org). NTLM and NTLMv2 and LANMAN support do not 822 require this helper. Note that NTLMv2 security (which does not require the
|
/openbmc/linux/fs/smb/client/ |
H A D | sess.c | 953 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge() 1313 case NTLMv2: in cifs_select_sectype() 1317 return NTLMv2; in cifs_select_sectype() 1484 cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", rc); in sess_auth_ntlmv2() 1974 case NTLMv2: in select_sec()
|
H A D | cifs_swn.c | 150 case NTLMv2: in cifs_swn_send_register_message()
|
H A D | Kconfig | 44 establishment via Kerberos or NTLMv2, RDMA (smbdirect), advanced
|
H A D | cifsglob.h | 151 NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */ enumerator 152 RawNTLMSSP, /* NTLMSSP without SPNEGO, NTLMv2 hash */ 182 struct shash_desc *hmacmd5; /* hmacmd5 hash function, for NTLMv2/CR1 hashes */ 2159 case NTLMv2: in get_security_type_str() 2160 return "NTLMv2"; in get_security_type_str()
|
H A D | fs_context.c | 235 ctx->sectype = NTLMv2; in cifs_parse_security_flavors()
|
H A D | cifsfs.c | 484 case NTLMv2: in cifs_show_security()
|
H A D | smb2pdu.c | 1425 case NTLMv2: in smb2_select_sectype()
|
/openbmc/linux/Documentation/filesystems/smb/ |
H A D | ksmbd.rst | 78 NTLM/NTLMv2 Supported.
|