the user to control these for torture testing */
uint16_t flags2;
- DATA_BLOB user_session_key;
-
/* the spnego context if we use extented security */
struct gensec_security *gensec;
* have been given a uid in the NTLMSSP_CHALLENGE reply. This
* would lead to an invalid uid in the anonymous fallback */
state->session->vuid = 0;
- data_blob_free(&state->session->user_session_key);
talloc_free(state->session->gensec);
state->session->gensec = NULL;
struct smb_composite_sesssetup *io,
struct smbcli_request **req);
-/*
- store the user session key for a transport
-*/
-static void set_user_session_key(struct smbcli_session *session,
- const DATA_BLOB *session_key)
-{
- session->user_session_key = data_blob_talloc(session,
- session_key->data,
- session_key->length);
-}
-
/*
handler for completion of a smbcli_request sub-request
*/
session_key,
null_data_blob);
}
- set_user_session_key(session, &session_key);
c->status = smb1cli_session_set_session_key(session->smbXcli,
session_key);
smb1cli_conn_activate_signing(session->transport->conn,
session_key,
state->setup.nt1.in.password2);
- set_user_session_key(session, &session_key);
nt_status = smb1cli_session_set_session_key(session->smbXcli,
session_key);
NULL,
NULL, &session_key);
NT_STATUS_NOT_OK_RETURN(nt_status);
- set_user_session_key(session, &session_key);
nt_status = smb1cli_session_set_session_key(session->smbXcli,
session_key);