Searched refs:ntlmv2 (Results 1 – 3 of 3) sorted by relevance
597 struct ntlmv2_resp *ntlmv2 = (struct ntlmv2_resp *) in CalcNTLMv2_response() local625 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()628 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()631 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()639 ntlmv2->ntlmv2_hash); in CalcNTLMv2_response()683 struct ntlmv2_resp *ntlmv2; in setup_ntlmv2_rsp() local723 ntlmv2 = (struct ntlmv2_resp *) in setup_ntlmv2_rsp()725 ntlmv2->blob_signature = cpu_to_le32(0x00000101); in setup_ntlmv2_rsp()726 ntlmv2->reserved = 0; in setup_ntlmv2_rsp()727 ntlmv2->time = rsp_timestamp; in setup_ntlmv2_rsp()[all …]
581 ntlmv2 Use NTLMv2 password hashing 626 plaintext, ntlm, ntlmv2, signing allowed). Some
23 ntlmv2. Fix 2nd mount to same server but with different port to236 work to Windows servers (mount with option "sec=ntlmv2").