Home
last modified time | relevance | path

Searched refs:ntlmssp (Results 1 – 4 of 4) sorted by relevance

/Linux-v5.10/fs/cifs/
Dsess.c582 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge()
587 ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); in decode_ntlmssp_challenge()
630 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
698 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_auth_blob()
765 if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || in build_ntlmssp_auth_blob()
766 (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) in build_ntlmssp_auth_blob()
768 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
1484 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in sess_auth_rawntlmssp_negotiate()
1485 if (!ses->ntlmssp) { in sess_auth_rawntlmssp_negotiate()
1489 ses->ntlmssp->sesskey_per_smbsess = false; in sess_auth_rawntlmssp_negotiate()
[all …]
Dcifsencrypt.c633 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
Dsmb2pdu.c1393 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate()
1394 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate()
1398 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate()
1464 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate()
1465 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate()
1535 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate()
1536 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_authenticate()
Dcifsglob.h997 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member