Home
last modified time | relevance | path

Searched refs:ntlmssp (Results 1 – 7 of 7) sorted by relevance

/openbmc/linux/fs/smb/client/
H A Dsess.c16 #include "ntlmssp.h"
944 ses->ntlmssp->client_flags, server_flags); in decode_ntlmssp_challenge()
946 if ((ses->ntlmssp->client_flags & (NTLMSSP_NEGOTIATE_SEAL | NTLMSSP_NEGOTIATE_SIGN)) && in decode_ntlmssp_challenge()
961 if ((ses->ntlmssp->client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) && in decode_ntlmssp_challenge()
966 ses->ntlmssp->server_flags = server_flags; in decode_ntlmssp_challenge()
968 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge()
1055 /* BB Move to ntlmssp.c eventually */
1089 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
1093 ses->ntlmssp->client_flags = flags; in build_ntlmssp_negotiate_blob()
1115 * Build ntlmssp blo
[all...]
H A Dcifsencrypt.c669 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
830 cifs_arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
H A Dsmb2pdu.c32 #include "ntlmssp.h"
1713 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate()
1721 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate()
1722 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate()
1726 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate()
1791 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate()
1792 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate()
1806 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate()
1869 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate()
1870 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate()
[all...]
H A Dcifsglob.h196 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */
198 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */
1086 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
1929 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */
1943 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
1084 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ global() member
/openbmc/linux/fs/smb/server/
H A Dauth.c347 domain_name, conn->ntlmssp.cryptkey); in ksmbd_decode_ntlmssp_auth_blob()
351 if (conn->ntlmssp.client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) { in ksmbd_decode_ntlmssp_auth_blob()
401 conn->ntlmssp.client_flags = le32_to_cpu(negblob->NegotiateFlags); in ksmbd_decode_ntlmssp_neg_blob()
421 int cflags = conn->ntlmssp.client_flags; in ksmbd_build_ntlmssp_challenge_blob()
475 get_random_bytes(conn->ntlmssp.cryptkey, sizeof(__u64)); in ksmbd_build_ntlmssp_challenge_blob()
476 memcpy(chgblob->Challenge, conn->ntlmssp.cryptkey, in ksmbd_build_ntlmssp_challenge_blob()
H A Dconnection.h73 struct ntlmssp_auth ntlmssp; member
/openbmc/linux/
H A Dopengrok0.0.log[all...]