Home
last modified time | relevance | path

Searched refs:ntlmssp (Results 1 - 10 of 10) sorted by relevance

/kernel/linux/linux-6.6/fs/smb/client/
H A Dsess.c16 #include "ntlmssp.h"
955 ses->ntlmssp->client_flags, server_flags); in decode_ntlmssp_challenge()
957 if ((ses->ntlmssp->client_flags & (NTLMSSP_NEGOTIATE_SEAL | NTLMSSP_NEGOTIATE_SIGN)) && in decode_ntlmssp_challenge()
972 if ((ses->ntlmssp->client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) && in decode_ntlmssp_challenge()
977 ses->ntlmssp->server_flags = server_flags; in decode_ntlmssp_challenge()
979 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge()
1063 /* BB Move to ntlmssp.c eventually */
1097 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
1101 ses->ntlmssp->client_flags = flags; in build_ntlmssp_negotiate_blob()
1123 * Build ntlmssp blo
[all...]
H A Dcifsencrypt.c19 #include "ntlmssp.h"
669 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
830 cifs_arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
H A Dsmb2pdu.c32 #include "ntlmssp.h"
1680 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate()
1688 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate()
1689 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate()
1693 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate()
1758 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate()
1759 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate()
1773 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate()
1836 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate()
1837 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate()
[all...]
H A Dcifsglob.h172 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */
174 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */
1051 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member
1886 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */
1900 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
/kernel/linux/linux-5.10/fs/cifs/
H A Dsess.c29 #include "ntlmssp.h"
590 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge()
595 ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); in decode_ntlmssp_challenge()
616 /* BB Move to ntlmssp.c eventually */
638 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
706 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_auth_blob()
773 if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || in build_ntlmssp_auth_blob()
774 (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) in build_ntlmssp_auth_blob()
776 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
1492 ses->ntlmssp in sess_auth_rawntlmssp_negotiate()
[all...]
H A Dcifsencrypt.c32 #include "ntlmssp.h"
633 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
H A Dsmb2pdu.c46 #include "ntlmssp.h"
1409 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate()
1416 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate()
1417 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate()
1421 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate()
1487 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate()
1488 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate()
1501 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate()
1558 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate()
1559 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate()
[all...]
H A Dcifsglob.h163 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */
165 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */
1000 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member
1814 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */
1841 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
/kernel/linux/linux-6.6/fs/smb/server/
H A Dauth.c344 domain_name, conn->ntlmssp.cryptkey); in ksmbd_decode_ntlmssp_auth_blob()
348 if (conn->ntlmssp.client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) { in ksmbd_decode_ntlmssp_auth_blob()
398 conn->ntlmssp.client_flags = le32_to_cpu(negblob->NegotiateFlags); in ksmbd_decode_ntlmssp_neg_blob()
419 int cflags = conn->ntlmssp.client_flags; in ksmbd_build_ntlmssp_challenge_blob()
473 get_random_bytes(conn->ntlmssp.cryptkey, sizeof(__u64)); in ksmbd_build_ntlmssp_challenge_blob()
474 memcpy(chgblob->Challenge, conn->ntlmssp.cryptkey, in ksmbd_build_ntlmssp_challenge_blob()
H A Dconnection.h73 struct ntlmssp_auth ntlmssp; member

Completed in 27 milliseconds