return NT_STATUS_OK;
}
- return common_gensec_encrypt_buffer(es->s.gensec_security, es->enc_ctx_num, buffer, buf_out);
+ return common_gensec_encrypt_buffer(es->gensec_security, es->enc_ctx_num, buffer, buf_out);
}
/******************************************************************************
return NT_STATUS_OK;
}
- return common_gensec_decrypt_buffer(es->s.gensec_security, buf);
+ return common_gensec_decrypt_buffer(es->gensec_security, buf);
}
/******************************************************************************
return;
}
- if (es->s.gensec_security) {
- TALLOC_FREE(es->s.gensec_security);
+ if (es->gensec_security) {
+ TALLOC_FREE(es->gensec_security);
}
SAFE_FREE(es);
*pp_es = NULL;
/* We only need the gensec_security part from here.
* es is a malloc()ed pointer, so we cannot make
* gensec_security a talloc child */
- es->s.gensec_security = talloc_move(NULL,
- &auth_generic_state->gensec_security);
+ es->gensec_security = talloc_move(NULL,
+ &auth_generic_state->gensec_security);
smb1cli_conn_set_encryption(cli->conn, es);
es = NULL;
}
/* We only need the gensec_security part from here.
* es is a malloc()ed pointer, so we cannot make
* gensec_security a talloc child */
- es->s.gensec_security = talloc_move(NULL,
- &auth_generic_state->gensec_security);
+ es->gensec_security = talloc_move(NULL,
+ &auth_generic_state->gensec_security);
smb1cli_conn_set_encryption(cli->conn, es);
es = NULL;
}
return nt_status_squash(status);
}
- es->s.gensec_security = gensec_security;
+ es->gensec_security = gensec_security;
return status;
}
become_root();
- status = gensec_update(partial_srv_trans_enc_ctx->s.gensec_security,
+ status = gensec_update(partial_srv_trans_enc_ctx->gensec_security,
talloc_tos(), NULL,
secblob, &unwrapped_response);
return status;
}
- status = gensec_update(partial_srv_trans_enc_ctx->s.gensec_security,
+ status = gensec_update(partial_srv_trans_enc_ctx->gensec_security,
talloc_tos(), NULL,
secblob, &chal);
/* We must have a partial context here. */
- if (!es || es->s.gensec_security == NULL || es->smb_enc_type != SMB_TRANS_ENC_NTLM) {
+ if (!es || es->gensec_security == NULL || es->smb_enc_type != SMB_TRANS_ENC_NTLM) {
srv_free_encryption_context(&partial_srv_trans_enc_ctx);
return NT_STATUS_INVALID_PARAMETER;
}
return NT_STATUS_INVALID_PARAMETER;
}
- status = gensec_update(es->s.gensec_security, talloc_tos(), NULL, auth, &auth_reply);
+ status = gensec_update(es->gensec_security, talloc_tos(), NULL, auth, &auth_reply);
data_blob_free(&auth);
/* From RFC4178.
}
es = partial_srv_trans_enc_ctx;
- if (!es || es->s.gensec_security == NULL || es->smb_enc_type != SMB_TRANS_ENC_NTLM) {
+ if (!es || es->gensec_security == NULL || es->smb_enc_type != SMB_TRANS_ENC_NTLM) {
srv_free_encryption_context(&partial_srv_trans_enc_ctx);
return NT_STATUS_INVALID_PARAMETER;
}
/* Second step. */
- status = gensec_update(partial_srv_trans_enc_ctx->s.gensec_security,
+ status = gensec_update(partial_srv_trans_enc_ctx->gensec_security,
talloc_tos(), NULL,
blob, &response);
}
if (es->smb_enc_type == SMB_TRANS_ENC_NTLM) {
- if (!gensec_have_feature(es->s.gensec_security, GENSEC_FEATURE_SIGN)) {
+ if (!gensec_have_feature(es->gensec_security, GENSEC_FEATURE_SIGN)) {
return NT_STATUS_INVALID_PARAMETER;
}
- if (!gensec_have_feature(es->s.gensec_security, GENSEC_FEATURE_SEAL)) {
+ if (!gensec_have_feature(es->gensec_security, GENSEC_FEATURE_SEAL)) {
return NT_STATUS_INVALID_PARAMETER;
}
}