Searched refs:ntlmssp (Results 1 – 7 of 7) sorted by relevance
/openbmc/linux/fs/smb/client/ |
H A D | sess.c | 16 #include "ntlmssp.h" 944 ses->ntlmssp->client_flags, server_flags); in decode_ntlmssp_challenge() 946 if ((ses->ntlmssp->client_flags & (NTLMSSP_NEGOTIATE_SEAL | NTLMSSP_NEGOTIATE_SIGN)) && in decode_ntlmssp_challenge() 961 if ((ses->ntlmssp->client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) && in decode_ntlmssp_challenge() 966 ses->ntlmssp->server_flags = server_flags; in decode_ntlmssp_challenge() 968 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge() 1055 /* BB Move to ntlmssp.c eventually */ 1089 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob() 1093 ses->ntlmssp->client_flags = flags; in build_ntlmssp_negotiate_blob() 1115 * Build ntlmssp blo [all...] |
H A D | cifsencrypt.c | 669 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 830 cifs_arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
H A D | smb2pdu.c | 32 #include "ntlmssp.h" 1713 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate() 1721 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate() 1722 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate() 1726 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate() 1791 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate() 1792 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate() 1806 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate() 1869 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate() 1870 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate() [all...] |
H A D | cifsglob.h | 196 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */ 198 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */ 1086 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ 1929 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */ 1943 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */ 1084 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ global() member
|
/openbmc/linux/fs/smb/server/ |
H A D | auth.c | 347 domain_name, conn->ntlmssp.cryptkey); in ksmbd_decode_ntlmssp_auth_blob() 351 if (conn->ntlmssp.client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) { in ksmbd_decode_ntlmssp_auth_blob() 401 conn->ntlmssp.client_flags = le32_to_cpu(negblob->NegotiateFlags); in ksmbd_decode_ntlmssp_neg_blob() 421 int cflags = conn->ntlmssp.client_flags; in ksmbd_build_ntlmssp_challenge_blob() 475 get_random_bytes(conn->ntlmssp.cryptkey, sizeof(__u64)); in ksmbd_build_ntlmssp_challenge_blob() 476 memcpy(chgblob->Challenge, conn->ntlmssp.cryptkey, in ksmbd_build_ntlmssp_challenge_blob()
|
H A D | connection.h | 73 struct ntlmssp_auth ntlmssp; member
|
/openbmc/linux/ |
H A D | opengrok0.0.log | [all...] |