Searched refs:NTLM (Results 1 - 8 of 8) sorted by relevance
/linux-4.1.27/fs/cifs/ |
H A D | ntlmssp.h | 39 #define NTLMSSP_NEGOTIATE_NTLM 0x0200 /* NTLM authentication */
|
H A D | sess.c | 54 (and NTLM case) */ cifs_ssetup_hdr() 504 case NTLM: select_sectype() 511 return NTLM; select_sectype() 773 /* old style NTLM sessionsetup */ sess_auth_ntlm() 793 cifs_dbg(VFS, "Error %d during NTLM authentication\n", sess_auth_ntlm() 883 /* old style NTLM sessionsetup */ sess_auth_ntlmv2() 1404 case NTLM: select_sec()
|
H A D | cifsencrypt.c | 4 * Encryption and hashing operations relating to NTLM, NTLMv2. See MS-NLMP 283 cifs_dbg(FYI, "%s Can't generate NTLM response, error: %d\n", setup_ntlm_response() 297 cifs_dbg(FYI, "%s Can't generate NTLM session key, error: %d\n", setup_ntlm_response() 380 * As defined in MS-NTLM 3.3.2, just this av pair field build_avpair_blob()
|
H A D | cifspdu.h | 612 } __attribute__((packed)) req; /* NTLM request format (with 635 } __attribute__((packed)) req_no_secext; /* NTLM request format (without 638 struct { /* default (NTLM) response format */ 650 } __attribute__((packed)) resp; /* NTLM response 670 } __attribute__((packed)) old_req; /* pre-NTLM (LANMAN2.1) req format */ 672 struct { /* default (NTLM) response format */ 682 } __attribute__((packed)) old_resp; /* pre-NTLM (LANMAN2.1) response */ 718 /* Capabilities bits (for NTLM SessSetup request) */ 2644 From existing Lanman and NTLM dialects:
|
H A D | cifsglob.h | 98 NTLM, /* Legacy NTLM012 auth with NTLM hash */ enumerator in enum:securityEnum 99 NTLMv2, /* Legacy NTLM auth with NTLMv2 hash */
|
H A D | cifsfs.c | 340 case NTLM: cifs_show_security()
|
H A D | connect.c | 1060 vol->sectype = NTLM; cifs_parse_security_flavors() 3682 the vfs in the future) as only NTLM or the much CIFSTCon() 3698 cifs_dbg(FYI, "%s Can't generate NTLM rsp. Error: %d\n", CIFSTCon()
|
H A D | cifssmb.c | 605 /* else wct == 17, NTLM or better */ CIFSSMBNegotiate()
|
Completed in 276 milliseconds