Home
last modified time | relevance | path

Searched refs:NTLMv2 (Results 1 – 10 of 10) sorted by relevance

/openbmc/linux/fs/smb/server/
H A DKconfig44 establishment via Kerberos or NTLMv2.
/openbmc/linux/Documentation/admin-guide/cifs/
H A Dusage.rst681 Use NTLMv2 password hashing
683 Use NTLMv2 password hashing with packet signing
725 flags (e.g. for NTLMv2) may be combined with
732 (NTLMv2 and packet signing allowed). Some SecurityFlags
737 may use NTLMv2 0x00004
738 must use NTLMv2 0x04004
821 project(https://www.samba.org). NTLM and NTLMv2 and LANMAN support do not
822 require this helper. Note that NTLMv2 security (which does not require the
/openbmc/linux/fs/smb/client/
H A Dsess.c953 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge()
1313 case NTLMv2: in cifs_select_sectype()
1317 return NTLMv2; in cifs_select_sectype()
1484 cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", rc); in sess_auth_ntlmv2()
1974 case NTLMv2: in select_sec()
H A Dcifs_swn.c150 case NTLMv2: in cifs_swn_send_register_message()
H A DKconfig44 establishment via Kerberos or NTLMv2, RDMA (smbdirect), advanced
H A Dcifsglob.h151 NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */ enumerator
152 RawNTLMSSP, /* NTLMSSP without SPNEGO, NTLMv2 hash */
182 struct shash_desc *hmacmd5; /* hmacmd5 hash function, for NTLMv2/CR1 hashes */
2159 case NTLMv2: in get_security_type_str()
2160 return "NTLMv2"; in get_security_type_str()
H A Dfs_context.c235 ctx->sectype = NTLMv2; in cifs_parse_security_flavors()
H A Dcifsfs.c484 case NTLMv2: in cifs_show_security()
H A Dsmb2pdu.c1425 case NTLMv2: in smb2_select_sectype()
/openbmc/linux/Documentation/filesystems/smb/
H A Dksmbd.rst78 NTLM/NTLMv2 Supported.