Searched refs:ntlmssp (Results 1 – 4 of 4) sorted by relevance
/Linux-v5.10/fs/cifs/ |
D | sess.c | 582 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge() 587 ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); in decode_ntlmssp_challenge() 630 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob() 698 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_auth_blob() 765 if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || in build_ntlmssp_auth_blob() 766 (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) in build_ntlmssp_auth_blob() 768 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob() 1484 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in sess_auth_rawntlmssp_negotiate() 1485 if (!ses->ntlmssp) { in sess_auth_rawntlmssp_negotiate() 1489 ses->ntlmssp->sesskey_per_smbsess = false; in sess_auth_rawntlmssp_negotiate() [all …]
|
D | cifsencrypt.c | 633 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
D | smb2pdu.c | 1393 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate() 1394 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate() 1398 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate() 1464 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate() 1465 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate() 1535 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate() 1536 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_authenticate()
|
D | cifsglob.h | 997 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member
|