Lines Matching defs:be

103 	ntlmssp_backend_t *be;
105 be = malloc(sizeof (*be));
106 if (be == 0)
108 bzero(be, sizeof (*be));
109 be->expect_type = NTLMSSP_MSGTYPE_NEGOTIATE;
110 ctx->ctx_backend = be;
128 ntlmssp_backend_t *be = ctx->ctx_backend;
138 if (mtype != be->expect_type)
174 ntlmssp_backend_t *be = ctx->ctx_backend;
186 be->clnt_flags = letohl(ihdr->h_flags);
195 (void) memcpy(be->srv_challenge, constant_chal,
196 sizeof (be->srv_challenge));
198 randomize(be->srv_challenge, sizeof (be->srv_challenge));
204 be->srv_flags =
208 be->srv_flags |= be->clnt_flags & (
215 be->srv_flags |= be->clnt_flags & (
221 if (be->clnt_flags & NTLMSSP_NEGOTIATE_UNICODE)
222 be->srv_flags |= NTLMSSP_NEGOTIATE_UNICODE;
223 else if (be->clnt_flags & NTLMSSP_NEGOTIATE_OEM)
224 be->srv_flags |= NTLMSSP_NEGOTIATE_OEM;
227 if ((be->srv_flags & NTLMSSP_NEGOTIATE_NTLM2) == 0 &&
228 (be->clnt_flags & NTLMSSP_NEGOTIATE_LM_KEY) != 0)
229 be->srv_flags |= NTLMSSP_NEGOTIATE_LM_KEY;
233 be->srv_flags |= NTLMSSP_TARGET_TYPE_DOMAIN;
236 be->srv_flags |= NTLMSSP_TARGET_TYPE_SERVER;
246 if (be->srv_flags & NTLMSSP_NEGOTIATE_UNICODE)
258 be->srv_flags, /* 20: flags (l) */
259 be->srv_challenge, /* 24: (8c) */
296 * the AD domain of which we're a member, which may be
300 * all "domain" fields should be set to the same values as
366 be->expect_type = NTLMSSP_MSGTYPE_AUTHENTICATE;
397 ntlmssp_backend_t *be = ctx->ctx_backend;
418 if (be->srv_flags & NTLMSSP_NEGOTIATE_UNICODE)
437 if (smb_msgbuf_decode(&mb, "l", &be->clnt_flags) < 0)
440 if (be->clnt_flags & NTLMSSP_NEGOTIATE_KEY_EXCH) {
448 user_info.lg_ntlm_flags = be->clnt_flags;
458 user_info.lg_challenge_key.val = (uint8_t *)be->srv_challenge;
477 (be->clnt_flags & NTLMSSP_NEGOTIATE_NTLM2) != 0) {
479 be->srv_challenge, lm_resp);
507 be->srv_challenge, lm_resp,
519 if (be->clnt_flags & NTLMSSP_NEGOTIATE_KEY_EXCH) {