Lines Matching refs:ntlmssp
16 #include "ntlmssp.h"
955 ses->ntlmssp->client_flags, server_flags);
957 if ((ses->ntlmssp->client_flags & (NTLMSSP_NEGOTIATE_SEAL | NTLMSSP_NEGOTIATE_SIGN)) &&
972 if ((ses->ntlmssp->client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) &&
977 ses->ntlmssp->server_flags = server_flags;
979 memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE);
1063 /* BB Move to ntlmssp.c eventually */
1097 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1101 ses->ntlmssp->client_flags = flags;
1123 * Build ntlmssp blob with additional fields, such as version,
1159 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1168 ses->ntlmssp->client_flags = flags;
1223 flags = ses->ntlmssp->server_flags | NTLMSSP_REQUEST_TARGET |
1225 /* we only send version information in ntlmssp negotiate, so do not set this flag */
1272 if ((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) &&
1273 (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) &&
1275 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE);
1765 ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL);
1766 if (!ses->ntlmssp) {
1770 ses->ntlmssp->sesskey_per_smbsess = false;
1845 kfree_sensitive(ses->ntlmssp);
1846 ses->ntlmssp = NULL;
1954 kfree_sensitive(ses->ntlmssp);
1955 ses->ntlmssp = NULL;