ninfo 592 source4/torture/rpc/netlogon.c struct netr_NetworkInfo ninfo;
ninfo 605 source4/torture/rpc/netlogon.c &ninfo.identity_info.account_name.string,
ninfo 606 source4/torture/rpc/netlogon.c &ninfo.identity_info.domain_name.string);
ninfo 608 source4/torture/rpc/netlogon.c generate_random_buffer(ninfo.challenge,
ninfo 609 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge));
ninfo 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge,
ninfo 611 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge));
ninfo 624 source4/torture/rpc/netlogon.c ninfo.lm.data = lm_resp.data;
ninfo 625 source4/torture/rpc/netlogon.c ninfo.lm.length = lm_resp.length;
ninfo 627 source4/torture/rpc/netlogon.c ninfo.nt.data = nt_resp.data;
ninfo 628 source4/torture/rpc/netlogon.c ninfo.nt.length = nt_resp.length;
ninfo 630 source4/torture/rpc/netlogon.c ninfo.identity_info.parameter_control = 0;
ninfo 631 source4/torture/rpc/netlogon.c ninfo.identity_info.logon_id_low = 0;
ninfo 632 source4/torture/rpc/netlogon.c ninfo.identity_info.logon_id_high = 0;
ninfo 633 source4/torture/rpc/netlogon.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(credentials);
ninfo 635 source4/torture/rpc/netlogon.c logon.network = &ninfo;
ninfo 646 source4/torture/rpc/netlogon.c d_printf("Testing LogonSamLogon with name %s\n", ninfo.identity_info.account_name.string);
ninfo 1059 source4/torture/rpc/samba3rpc.c struct netr_NetworkInfo ninfo;
ninfo 1093 source4/torture/rpc/samba3rpc.c ninfo.identity_info.account_name.string =
ninfo 1095 source4/torture/rpc/samba3rpc.c ninfo.identity_info.domain_name.string =
ninfo 1097 source4/torture/rpc/samba3rpc.c ninfo.identity_info.parameter_control = 0;
ninfo 1098 source4/torture/rpc/samba3rpc.c ninfo.identity_info.logon_id_low = 0;
ninfo 1099 source4/torture/rpc/samba3rpc.c ninfo.identity_info.logon_id_high = 0;
ninfo 1100 source4/torture/rpc/samba3rpc.c ninfo.identity_info.workstation.string =
ninfo 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge));
ninfo 1103 source4/torture/rpc/samba3rpc.c ninfo.nt.length = nt_resp.length;
ninfo 1104 source4/torture/rpc/samba3rpc.c ninfo.nt.data = nt_resp.data;
ninfo 1105 source4/torture/rpc/samba3rpc.c ninfo.lm.length = lm_resp.length;
ninfo 1106 source4/torture/rpc/samba3rpc.c ninfo.lm.data = lm_resp.data;
ninfo 1108 source4/torture/rpc/samba3rpc.c logon.network = &ninfo;
ninfo 1140 source4/torture/rpc/samba3rpc.c pinfo.identity_info = ninfo.identity_info;
ninfo 91 source4/torture/rpc/samlogon.c struct netr_NetworkInfo ninfo;
ninfo 95 source4/torture/rpc/samlogon.c samlogon_state->r.in.logon->network = &ninfo;
ninfo 96 source4/torture/rpc/samlogon.c samlogon_state->r_ex.in.logon->network = &ninfo;
ninfo 97 source4/torture/rpc/samlogon.c samlogon_state->r_flags.in.logon->network = &ninfo;
ninfo 99 source4/torture/rpc/samlogon.c ninfo.identity_info.domain_name.string = samlogon_state->account_domain;
ninfo 100 source4/torture/rpc/samlogon.c ninfo.identity_info.parameter_control = parameter_control;
ninfo 101 source4/torture/rpc/samlogon.c ninfo.identity_info.logon_id_low = 0;
ninfo 102 source4/torture/rpc/samlogon.c ninfo.identity_info.logon_id_high = 0;
ninfo 103 source4/torture/rpc/samlogon.c ninfo.identity_info.account_name.string = samlogon_state->account_name;
ninfo 104 source4/torture/rpc/samlogon.c ninfo.identity_info.workstation.string = TEST_MACHINE_NAME;
ninfo 106 source4/torture/rpc/samlogon.c memcpy(ninfo.challenge, chall->data, 8);
ninfo 138 source4/torture/rpc/samlogon.c ninfo.nt.data = nt_response->data;
ninfo 139 source4/torture/rpc/samlogon.c ninfo.nt.length = nt_response->length;
ninfo 141 source4/torture/rpc/samlogon.c ninfo.nt.data = NULL;
ninfo 142 source4/torture/rpc/samlogon.c ninfo.nt.length = 0;
ninfo 146 source4/torture/rpc/samlogon.c ninfo.lm.data = lm_response->data;
ninfo 147 source4/torture/rpc/samlogon.c ninfo.lm.length = lm_response->length;
ninfo 149 source4/torture/rpc/samlogon.c ninfo.lm.data = NULL;
ninfo 150 source4/torture/rpc/samlogon.c ninfo.lm.length = 0;
ninfo 2688 source4/torture/rpc/samr.c struct netr_NetworkInfo ninfo;
ninfo 2701 source4/torture/rpc/samr.c &ninfo.identity_info.account_name.string,
ninfo 2702 source4/torture/rpc/samr.c &ninfo.identity_info.domain_name.string);
ninfo 2704 source4/torture/rpc/samr.c generate_random_buffer(ninfo.challenge,
ninfo 2705 source4/torture/rpc/samr.c sizeof(ninfo.challenge));
ninfo 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge,
ninfo 2707 source4/torture/rpc/samr.c sizeof(ninfo.challenge));
ninfo 2720 source4/torture/rpc/samr.c ninfo.lm.data = lm_resp.data;
ninfo 2721 source4/torture/rpc/samr.c ninfo.lm.length = lm_resp.length;
ninfo 2723 source4/torture/rpc/samr.c ninfo.nt.data = nt_resp.data;
ninfo 2724 source4/torture/rpc/samr.c ninfo.nt.length = nt_resp.length;
ninfo 2726 source4/torture/rpc/samr.c ninfo.identity_info.parameter_control =
ninfo 2729 source4/torture/rpc/samr.c ninfo.identity_info.logon_id_low = 0;
ninfo 2730 source4/torture/rpc/samr.c ninfo.identity_info.logon_id_high = 0;
ninfo 2731 source4/torture/rpc/samr.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(machine_credentials);
ninfo 2733 source4/torture/rpc/samr.c logon.network = &ninfo;
ninfo 2744 source4/torture/rpc/samr.c d_printf("Testing LogonSamLogon with name %s\n", ninfo.identity_info.account_name.string);
ninfo 60 source4/torture/rpc/samsync.c struct netr_NetworkInfo ninfo;
ninfo 65 source4/torture/rpc/samsync.c ninfo.identity_info.domain_name.string = domain;
ninfo 66 source4/torture/rpc/samsync.c ninfo.identity_info.parameter_control = 0;
ninfo 67 source4/torture/rpc/samsync.c ninfo.identity_info.logon_id_low = 0;
ninfo 68 source4/torture/rpc/samsync.c ninfo.identity_info.logon_id_high = 0;
ninfo 69 source4/torture/rpc/samsync.c ninfo.identity_info.account_name.string = account_name;
ninfo 70 source4/torture/rpc/samsync.c ninfo.identity_info.workstation.string = workstation;
ninfo 71 source4/torture/rpc/samsync.c generate_random_buffer(ninfo.challenge,
ninfo 72 source4/torture/rpc/samsync.c sizeof(ninfo.challenge));
ninfo 74 source4/torture/rpc/samsync.c ninfo.nt.length = 24;
ninfo 75 source4/torture/rpc/samsync.c ninfo.nt.data = talloc_array(mem_ctx, uint8_t, 24);
ninfo 76 source4/torture/rpc/samsync.c SMBOWFencrypt(nt_hash->hash, ninfo.challenge, ninfo.nt.data);
ninfo 78 source4/torture/rpc/samsync.c ninfo.nt.length = 0;
ninfo 79 source4/torture/rpc/samsync.c ninfo.nt.data = NULL;
ninfo 83 source4/torture/rpc/samsync.c ninfo.lm.length = 24;
ninfo 84 source4/torture/rpc/samsync.c ninfo.lm.data = talloc_array(mem_ctx, uint8_t, 24);
ninfo 85 source4/torture/rpc/samsync.c SMBOWFencrypt(lm_hash->hash, ninfo.challenge, ninfo.lm.data);
ninfo 87 source4/torture/rpc/samsync.c ninfo.lm.length = 0;
ninfo 88 source4/torture/rpc/samsync.c ninfo.lm.data = NULL;
ninfo 91 source4/torture/rpc/samsync.c logon.network = &ninfo;
ninfo 50 source4/torture/rpc/schannel.c struct netr_NetworkInfo ninfo;
ninfo 67 source4/torture/rpc/schannel.c &ninfo.identity_info.account_name.string,
ninfo 68 source4/torture/rpc/schannel.c &ninfo.identity_info.domain_name.string);
ninfo 70 source4/torture/rpc/schannel.c generate_random_buffer(ninfo.challenge,
ninfo 71 source4/torture/rpc/schannel.c sizeof(ninfo.challenge));
ninfo 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge,
ninfo 73 source4/torture/rpc/schannel.c sizeof(ninfo.challenge));
ninfo 87 source4/torture/rpc/schannel.c ninfo.lm.data = lm_resp.data;
ninfo 88 source4/torture/rpc/schannel.c ninfo.lm.length = lm_resp.length;
ninfo 90 source4/torture/rpc/schannel.c ninfo.nt.data = nt_resp.data;
ninfo 91 source4/torture/rpc/schannel.c ninfo.nt.length = nt_resp.length;
ninfo 93 source4/torture/rpc/schannel.c ninfo.identity_info.parameter_control = 0;
ninfo 94 source4/torture/rpc/schannel.c ninfo.identity_info.logon_id_low = 0;
ninfo 95 source4/torture/rpc/schannel.c ninfo.identity_info.logon_id_high = 0;
ninfo 96 source4/torture/rpc/schannel.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(credentials);
ninfo 98 source4/torture/rpc/schannel.c logon.network = &ninfo;
ninfo 111 source4/torture/rpc/schannel.c ninfo.identity_info.account_name.string);
ninfo 517 source4/torture/rpc/schannel.c struct netr_NetworkInfo ninfo;
ninfo 584 source4/torture/rpc/schannel.c ZERO_STRUCT(conn->ninfo);
ninfo 588 source4/torture/rpc/schannel.c &conn->ninfo.identity_info.account_name.string,
ninfo 589 source4/torture/rpc/schannel.c &conn->ninfo.identity_info.domain_name.string);
ninfo 591 source4/torture/rpc/schannel.c generate_random_buffer(conn->ninfo.challenge,
ninfo 592 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge));
ninfo 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge,
ninfo 594 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge));
ninfo 609 source4/torture/rpc/schannel.c conn->ninfo.lm.data = lm_resp.data;
ninfo 610 source4/torture/rpc/schannel.c conn->ninfo.lm.length = lm_resp.length;
ninfo 612 source4/torture/rpc/schannel.c conn->ninfo.nt.data = nt_resp.data;
ninfo 613 source4/torture/rpc/schannel.c conn->ninfo.nt.length = nt_resp.length;
ninfo 615 source4/torture/rpc/schannel.c conn->ninfo.identity_info.parameter_control = 0;
ninfo 616 source4/torture/rpc/schannel.c conn->ninfo.identity_info.logon_id_low = 0;
ninfo 617 source4/torture/rpc/schannel.c conn->ninfo.identity_info.logon_id_high = 0;
ninfo 618 source4/torture/rpc/schannel.c conn->ninfo.identity_info.workstation.string = cli_credentials_get_workstation(conn->wks_creds);
ninfo 624 source4/torture/rpc/schannel.c conn->r.in.logon->network = &conn->ninfo;
ninfo 43 source4/winbind/wb_pam_auth.c struct netr_NetworkInfo ninfo;
ninfo 72 source4/winbind/wb_pam_auth.c struct netr_NetworkInfo *ninfo;
ninfo 88 source4/winbind/wb_pam_auth.c ninfo = state->req->in.logon.network = talloc(state, struct netr_NetworkInfo);
ninfo 89 source4/winbind/wb_pam_auth.c if (ninfo == NULL) goto failed;
ninfo 91 source4/winbind/wb_pam_auth.c ninfo->identity_info.account_name.string = talloc_strdup(state, user);
ninfo 92 source4/winbind/wb_pam_auth.c ninfo->identity_info.domain_name.string = talloc_strdup(state, domain);
ninfo 93 source4/winbind/wb_pam_auth.c ninfo->identity_info.parameter_control = logon_parameters;
ninfo 94 source4/winbind/wb_pam_auth.c ninfo->identity_info.logon_id_low = 0;
ninfo 95 source4/winbind/wb_pam_auth.c ninfo->identity_info.logon_id_high = 0;
ninfo 96 source4/winbind/wb_pam_auth.c ninfo->identity_info.workstation.string = talloc_strdup(state, workstation);
ninfo 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge));
ninfo 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data,
ninfo 100 source4/winbind/wb_pam_auth.c sizeof(ninfo->challenge));
ninfo 102 source4/winbind/wb_pam_auth.c tmp_nt_resp = data_blob_talloc(ninfo, nt_resp.data, nt_resp.length);
ninfo 106 source4/winbind/wb_pam_auth.c tmp_lm_resp = data_blob_talloc(ninfo, lm_resp.data, lm_resp.length);
ninfo 110 source4/winbind/wb_pam_auth.c ninfo->nt.length = tmp_nt_resp.length;
ninfo 111 source4/winbind/wb_pam_auth.c ninfo->nt.data = tmp_nt_resp.data;
ninfo 112 source4/winbind/wb_pam_auth.c ninfo->lm.length = tmp_lm_resp.length;
ninfo 113 source4/winbind/wb_pam_auth.c ninfo->lm.data = tmp_lm_resp.data;