Searched refs:ntlmv2 (Results 1 - 3 of 3) sorted by relevance

/linux-master/fs/smb/server/
H A Dauth.h43 struct ntlmv2_resp *ntlmv2, int blen, char *domain_name,
H A Dauth.c134 ksmbd_debug(AUTH, "can't generate ntlmv2 hash\n");
213 * @ntlmv2: NTLMv2 challenge response
221 struct ntlmv2_resp *ntlmv2, int blen, char *domain_name,
264 memcpy(construct + CIFS_CRYPTO_KEY_SIZE, &ntlmv2->blob_signature, blen);
286 if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0)
220 ksmbd_auth_ntlmv2(struct ksmbd_conn *conn, struct ksmbd_session *sess, struct ntlmv2_resp *ntlmv2, int blen, char *domain_name, char *cryptkey) argument
/linux-master/fs/smb/client/
H A Dcifsencrypt.c435 * as part of ntlmv2 authentication (in Target String), if not already
491 * as part of ntlmv2 authentication (or local current time as
543 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__);
640 struct ntlmv2_resp *ntlmv2 = (struct ntlmv2_resp *) local
649 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__);
668 memcpy(ntlmv2->challenge.key,
671 memcpy(ntlmv2->challenge.key,
674 ntlmv2->challenge.key, hash_len);
682 ntlmv2->ntlmv2_hash);
695 struct ntlmv2_resp *ntlmv2; local
[all...]

Completed in 130 milliseconds