Lines Matching refs:hash
94 * make a 16-byte hash.
113 * Create a LM response from the given LM hash and challenge.
119 smb_auth_lm_response(unsigned char *hash,
131 bcopy(hash, S21, SMBAUTH_HASH_SZ);
142 * The result will contain a 16-byte NTLM hash.
145 smb_auth_ntlm_hash(const char *password, unsigned char *hash)
151 if (password == NULL || hash == NULL)
162 rc = smb_auth_md4(hash, (unsigned char *)unicode_password, length);
175 smb_auth_ntlm_response(unsigned char *hash,
181 bcopy(hash, S21, SMBAUTH_HASH_SZ);
193 * hash = MD5(data);
194 * NTLM2 session hash = head(hash, 8);
323 * The NTLM v2 hash will be created from the given NTLM hash, username,
326 * The NTLMv2 hash will be returned via the ntlmv2_hash parameter which
376 * (LM/NTLM)v2 response is the hmac-md5 hash of the specified data
378 * using the NTLMv2 hash as the key.
385 unsigned char *hash,
399 if (SMBAUTH_HMACT64(hmac_data, slen + clen, (unsigned char *)hash,
415 * NTLM challenge/response authentication which requires the NTLM hash and
420 * NTLM hash, NTLMv2 hash, NTLMv2 response and LMv2 response.
444 if (smb_auth_ntlm_hash(password, auth->hash) !=
448 (void) memcpy(auth->hash, ntlm_hash, SMBAUTH_HASH_SZ);
451 auth->cs_len = smb_auth_ntlm_response(auth->hash,
455 if (smb_auth_ntlm_hash(password, auth->hash) !=
459 (void) memcpy(auth->hash, ntlm_hash, SMBAUTH_HASH_SZ);
470 if (smb_auth_ntlmv2_hash(auth->hash, username,
525 rc = smb_auth_md4(session_key, auth->hash, SMBAUTH_HASH_SZ);
625 * - NTLM hash
752 * - NTLM hash