Searched refs:ntlmssp (Results 1 – 4 of 4) sorted by relevance
/kernel/linux/linux-5.10/fs/cifs/ |
D | sess.c | 589 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge() 594 ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); in decode_ntlmssp_challenge() 637 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob() 705 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_auth_blob() 772 if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || in build_ntlmssp_auth_blob() 773 (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) in build_ntlmssp_auth_blob() 775 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob() 1491 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in sess_auth_rawntlmssp_negotiate() 1492 if (!ses->ntlmssp) { in sess_auth_rawntlmssp_negotiate() 1496 ses->ntlmssp->sesskey_per_smbsess = false; in sess_auth_rawntlmssp_negotiate() [all …]
|
D | cifsencrypt.c | 633 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
D | smb2pdu.c | 1408 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate() 1409 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate() 1413 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate() 1479 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate() 1480 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate() 1550 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate() 1551 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_authenticate()
|
D | cifsglob.h | 997 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member
|