ntlmssp           633 fs/cifs/cifsencrypt.c 		       ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);
ntlmssp           791 fs/cifs/cifsencrypt.c 	arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key,
ntlmssp           981 fs/cifs/cifsglob.h 	struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
ntlmssp           312 fs/cifs/sess.c 	memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE);
ntlmssp           317 fs/cifs/sess.c 	ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags);
ntlmssp           359 fs/cifs/sess.c 	if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
ntlmssp           427 fs/cifs/sess.c 	if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
ntlmssp           494 fs/cifs/sess.c 	if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) ||
ntlmssp           495 fs/cifs/sess.c 		(ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC))
ntlmssp           497 fs/cifs/sess.c 		memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE);
ntlmssp          1215 fs/cifs/sess.c 	ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL);
ntlmssp          1216 fs/cifs/sess.c 	if (!ses->ntlmssp) {
ntlmssp          1220 fs/cifs/sess.c 	ses->ntlmssp->sesskey_per_smbsess = false;
ntlmssp          1287 fs/cifs/sess.c 	kfree(ses->ntlmssp);
ntlmssp          1288 fs/cifs/sess.c 	ses->ntlmssp = NULL;
ntlmssp          1394 fs/cifs/sess.c 	kfree(ses->ntlmssp);
ntlmssp          1395 fs/cifs/sess.c 	ses->ntlmssp = NULL;
ntlmssp          1402 fs/cifs/smb2pdu.c 	ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL);
ntlmssp          1403 fs/cifs/smb2pdu.c 	if (!ses->ntlmssp) {
ntlmssp          1407 fs/cifs/smb2pdu.c 	ses->ntlmssp->sesskey_per_smbsess = true;
ntlmssp          1471 fs/cifs/smb2pdu.c 	kfree(ses->ntlmssp);
ntlmssp          1472 fs/cifs/smb2pdu.c 	ses->ntlmssp = NULL;
ntlmssp          1524 fs/cifs/smb2pdu.c 	kfree(ses->ntlmssp);
ntlmssp          1525 fs/cifs/smb2pdu.c 	ses->ntlmssp = NULL;