ntlmssp 633 fs/cifs/cifsencrypt.c ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); ntlmssp 791 fs/cifs/cifsencrypt.c arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, ntlmssp 981 fs/cifs/cifsglob.h struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ ntlmssp 312 fs/cifs/sess.c memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); ntlmssp 317 fs/cifs/sess.c ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags); ntlmssp 359 fs/cifs/sess.c if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) ntlmssp 427 fs/cifs/sess.c if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) ntlmssp 494 fs/cifs/sess.c if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) || ntlmssp 495 fs/cifs/sess.c (ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC)) ntlmssp 497 fs/cifs/sess.c memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); ntlmssp 1215 fs/cifs/sess.c ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); ntlmssp 1216 fs/cifs/sess.c if (!ses->ntlmssp) { ntlmssp 1220 fs/cifs/sess.c ses->ntlmssp->sesskey_per_smbsess = false; ntlmssp 1287 fs/cifs/sess.c kfree(ses->ntlmssp); ntlmssp 1288 fs/cifs/sess.c ses->ntlmssp = NULL; ntlmssp 1394 fs/cifs/sess.c kfree(ses->ntlmssp); ntlmssp 1395 fs/cifs/sess.c ses->ntlmssp = NULL; ntlmssp 1402 fs/cifs/smb2pdu.c ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL); ntlmssp 1403 fs/cifs/smb2pdu.c if (!ses->ntlmssp) { ntlmssp 1407 fs/cifs/smb2pdu.c ses->ntlmssp->sesskey_per_smbsess = true; ntlmssp 1471 fs/cifs/smb2pdu.c kfree(ses->ntlmssp); ntlmssp 1472 fs/cifs/smb2pdu.c ses->ntlmssp = NULL; ntlmssp 1524 fs/cifs/smb2pdu.c kfree(ses->ntlmssp); ntlmssp 1525 fs/cifs/smb2pdu.c ses->ntlmssp = NULL;