Searched refs:ntlmssp (Results 1 - 10 of 10) sorted by relevance
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | sess.c | 16 #include "ntlmssp.h" 955 ses->ntlmssp->client_flags, server_flags); in decode_ntlmssp_challenge() 957 if ((ses->ntlmssp->client_flags & (NTLMSSP_NEGOTIATE_SEAL | NTLMSSP_NEGOTIATE_SIGN)) && in decode_ntlmssp_challenge() 972 if ((ses->ntlmssp->client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) && in decode_ntlmssp_challenge() 977 ses->ntlmssp->server_flags = server_flags; in decode_ntlmssp_challenge() 979 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge() 1063 /* BB Move to ntlmssp.c eventually */ 1097 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob() 1101 ses->ntlmssp->client_flags = flags; in build_ntlmssp_negotiate_blob() 1123 * Build ntlmssp blo [all...] |
H A D | cifsencrypt.c | 19 #include "ntlmssp.h" 669 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 830 cifs_arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
H A D | smb2pdu.c | 32 #include "ntlmssp.h" 1680 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate() 1688 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate() 1689 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate() 1693 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate() 1758 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate() 1759 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate() 1773 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate() 1836 kfree_sensitive(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate() 1837 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate() [all...] |
H A D | cifsglob.h | 172 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */ 174 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */ 1051 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member 1886 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */ 1900 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
|
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | sess.c | 29 #include "ntlmssp.h" 590 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); in decode_ntlmssp_challenge() 595 ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); in decode_ntlmssp_challenge() 616 /* BB Move to ntlmssp.c eventually */ 638 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob() 706 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_auth_blob() 773 if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || in build_ntlmssp_auth_blob() 774 (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) in build_ntlmssp_auth_blob() 776 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob() 1492 ses->ntlmssp in sess_auth_rawntlmssp_negotiate() [all...] |
H A D | cifsencrypt.c | 32 #include "ntlmssp.h" 633 ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
H A D | smb2pdu.c | 46 #include "ntlmssp.h" 1409 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_negotiate() 1416 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); in SMB2_sess_auth_rawntlmssp_negotiate() 1417 if (!ses->ntlmssp) { in SMB2_sess_auth_rawntlmssp_negotiate() 1421 ses->ntlmssp->sesskey_per_smbsess = true; in SMB2_sess_auth_rawntlmssp_negotiate() 1487 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_negotiate() 1488 ses->ntlmssp = NULL; in SMB2_sess_auth_rawntlmssp_negotiate() 1501 bool use_spnego = false; /* else use raw ntlmssp */ in SMB2_sess_auth_rawntlmssp_authenticate() 1558 kfree(ses->ntlmssp); in SMB2_sess_auth_rawntlmssp_authenticate() 1559 ses->ntlmssp in SMB2_sess_auth_rawntlmssp_authenticate() [all...] |
H A D | cifsglob.h | 163 __u32 server_flags; /* sent by server in type 2 ntlmssp exchange */ 165 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */ 1000 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ member 1814 #define CIFSSEC_MAY_NTLMSSP 0x00080 /* raw ntlmssp with ntlmv2 */ 1841 #define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
|
/kernel/linux/linux-6.6/fs/smb/server/ |
H A D | auth.c | 344 domain_name, conn->ntlmssp.cryptkey); in ksmbd_decode_ntlmssp_auth_blob() 348 if (conn->ntlmssp.client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) { in ksmbd_decode_ntlmssp_auth_blob() 398 conn->ntlmssp.client_flags = le32_to_cpu(negblob->NegotiateFlags); in ksmbd_decode_ntlmssp_neg_blob() 419 int cflags = conn->ntlmssp.client_flags; in ksmbd_build_ntlmssp_challenge_blob() 473 get_random_bytes(conn->ntlmssp.cryptkey, sizeof(__u64)); in ksmbd_build_ntlmssp_challenge_blob() 474 memcpy(chgblob->Challenge, conn->ntlmssp.cryptkey, in ksmbd_build_ntlmssp_challenge_blob()
|
H A D | connection.h | 73 struct ntlmssp_auth ntlmssp; member
|
Completed in 27 milliseconds