challenge 489 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
challenge 511 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
challenge 533 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "challenge", r->challenge, 8);
challenge 83 librpc/gen_ndr/netlogon.h uint8_t challenge[8];
challenge 420 nsswitch/libwbclient/wbc_pam.c params->password.response.challenge,
challenge 217 nsswitch/libwbclient/wbclient.h uint8_t challenge[8];
challenge 1321 nsswitch/wbinfo.c generate_random_buffer(params.password.response.challenge, 8);
challenge 1327 nsswitch/wbinfo.c server_chal = data_blob(params.password.response.challenge, 8);
challenge 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge,
challenge 1354 nsswitch/wbinfo.c SMBNTencrypt(pass, params.password.response.challenge,
challenge 82 source3/auth/auth.c DATA_BLOB challenge = data_blob_null;
challenge 87 source3/auth/auth.c if (auth_context->challenge.length) {
challenge 90 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8);
challenge 114 source3/auth/auth.c challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx);
challenge 115 source3/auth/auth.c if (!challenge.length) {
challenge 120 source3/auth/auth.c auth_context->challenge = challenge;
challenge 131 source3/auth/auth.c auth_context->challenge = data_blob_talloc(auth_context->mem_ctx,
challenge 140 source3/auth/auth.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge 142 source3/auth/auth.c SMB_ASSERT(auth_context->challenge.length == 8);
challenge 146 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8);
challenge 227 source3/auth/auth.c if (auth_context->challenge.length != 8) {
challenge 237 source3/auth/auth.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge 547 source3/auth/auth.c (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
challenge 147 source3/auth/auth_builtin.c const char *challenge = "I am a teapot";
challenge 148 source3/auth/auth_builtin.c return data_blob(challenge, 8);
challenge 415 source3/auth/auth_domain.c (uchar *)auth_context->challenge.data,
challenge 517 source3/auth/auth_domain.c (uchar *)auth_context->challenge.data,
challenge 88 source3/auth/auth_netlogond.c (uchar *)auth_context->challenge.data, /* 8 byte challenge. */
challenge 57 source3/auth/auth_ntlmssp.c static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge)
challenge 63 source3/auth/auth_ntlmssp.c SMB_ASSERT(challenge->length == 8);
challenge 65 source3/auth/auth_ntlmssp.c auth_context->challenge = data_blob_talloc(auth_context->mem_ctx,
challenge 66 source3/auth/auth_ntlmssp.c challenge->data, challenge->length);
challenge 72 source3/auth/auth_ntlmssp.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge 58 source3/auth/auth_sam.c return ntlm_password_check(mem_ctx, &auth_context->challenge,
challenge 82 source3/auth/auth_script.c slprintf(&hex_str[i*2], 3, "%02X", auth_context->challenge.data[i]);
challenge 303 source3/auth/auth_server.c if (memcmp(cli->secblob.data, auth_context->challenge.data, 8) != 0) {
challenge 83 source3/auth/auth_wbc.c memcpy(params.password.response.challenge,
challenge 84 source3/auth/auth_wbc.c auth_context->challenge.data,
challenge 85 source3/auth/auth_wbc.c sizeof(params.password.response.challenge));
challenge 69 source3/auth/auth_winbind.c memcpy(params.password.response.challenge,
challenge 70 source3/auth/auth_winbind.c auth_context->challenge.data,
challenge 71 source3/auth/auth_winbind.c sizeof(params.password.response.challenge));
challenge 83 source3/include/auth.h DATA_BLOB challenge;
challenge 113 source3/include/ntlmssp.h uint8_t challenge[8]);
challenge 137 source3/include/ntlmssp.h NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge);
challenge 3090 source3/include/proto.h const DATA_BLOB *challenge,
challenge 5670 source3/include/proto.h uint8_t challenge[8],
challenge 174 source3/libsmb/ntlm_check.c const DATA_BLOB *challenge,
challenge 237 source3/libsmb/ntlm_check.c if (challenge->length == sizeof(zeros) &&
challenge 238 source3/libsmb/ntlm_check.c (memcmp(challenge->data, zeros, challenge->length) == 0 )) {
challenge 294 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 305 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 316 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 334 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 381 source3/libsmb/ntlm_check.c lm_pw, challenge,
challenge 408 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 419 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 430 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 444 source3/libsmb/ntlm_check.c nt_pw, challenge,
challenge 136 source3/libsmb/ntlmssp.c static NTSTATUS set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge)
challenge 138 source3/libsmb/ntlmssp.c SMB_ASSERT(challenge->length == 8);
challenge 368 source3/rpc_client/init_netlogon.c uint8_t challenge[8],
challenge 379 source3/rpc_client/init_netlogon.c memcpy(r->challenge, challenge, 8);
challenge 977 source3/rpc_server/srv_netlog_nt.c logon->network->challenge);
challenge 339 source3/utils/ntlm_auth.c const DATA_BLOB *challenge,
challenge 373 source3/utils/ntlm_auth.c memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8));
challenge 1743 source3/utils/ntlm_auth.c static DATA_BLOB challenge;
challenge 1771 source3/utils/ntlm_auth.c } else if (!challenge.data) {
challenge 1807 source3/utils/ntlm_auth.c &challenge,
challenge 1848 source3/utils/ntlm_auth.c challenge = data_blob_null;
challenge 1892 source3/utils/ntlm_auth.c challenge = strhex_to_data_blob(NULL, parameter);
challenge 1893 source3/utils/ntlm_auth.c if (challenge.length != 8) {
challenge 1896 source3/utils/ntlm_auth.c (int)challenge.length);
challenge 1897 source3/utils/ntlm_auth.c challenge = data_blob_null;
challenge 35 source3/utils/ntlm_auth_proto.h const DATA_BLOB *challenge,
challenge 194 source3/winbindd/winbindd_ccache_access.c DATA_BLOB initial, challenge, auth;
challenge 254 source3/winbindd/winbindd_ccache_access.c challenge = data_blob(state->request.extra_data.data + initial_blob_len,
challenge 257 source3/winbindd/winbindd_ccache_access.c if (!initial.data || !challenge.data) {
challenge 262 source3/winbindd/winbindd_ccache_access.c initial, challenge, &auth);
challenge 266 source3/winbindd/winbindd_ccache_access.c data_blob_free(&challenge);
challenge 136 source4/auth/auth.h NTSTATUS (*get_challenge)(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge);
challenge 172 source4/auth/auth.h } challenge;
challenge 152 source4/auth/credentials/credentials.h DATA_BLOB challenge, DATA_BLOB target_info,
challenge 45 source4/auth/credentials/credentials_ntlm.c DATA_BLOB challenge, DATA_BLOB target_info,
challenge 116 source4/auth/credentials/credentials_ntlm.c nt_hash->hash, &challenge,
challenge 135 source4/auth/credentials/credentials_ntlm.c memcpy(session_nonce, challenge.data, 8);
challenge 139 source4/auth/credentials/credentials_ntlm.c MD5Update(&md5_session_nonce_ctx, challenge.data, 8);
challenge 163 source4/auth/credentials/credentials_ntlm.c SMBOWFencrypt(nt_hash->hash, challenge.data,
challenge 179 source4/auth/credentials/credentials_ntlm.c if (!SMBencrypt(password,challenge.data,
challenge 33 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = talloc_strdup(auth_ctx, set_by);
challenge 34 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.set_by);
challenge 36 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
challenge 37 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data);
challenge 47 source4/auth/ntlm/auth.c return auth_ctx->challenge.may_be_modified;
challenge 59 source4/auth/ntlm/auth.c if (auth_ctx->challenge.data.length) {
challenge 61 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by));
challenge 62 source4/auth/ntlm/auth.c *_chal = auth_ctx->challenge.data.data;
challenge 67 source4/auth/ntlm/auth.c DATA_BLOB challenge = data_blob(NULL,0);
challenge 69 source4/auth/ntlm/auth.c nt_status = method->ops->get_challenge(method, auth_ctx, &challenge);
challenge 76 source4/auth/ntlm/auth.c if (challenge.length != 8) {
challenge 78 source4/auth/ntlm/auth.c (unsigned)challenge.length, method->ops->name));
challenge 82 source4/auth/ntlm/auth.c auth_ctx->challenge.data = challenge;
challenge 83 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = method->ops->name;
challenge 88 source4/auth/ntlm/auth.c if (!auth_ctx->challenge.set_by) {
challenge 92 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
challenge 93 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data);
challenge 94 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = "random";
challenge 96 source4/auth/ntlm/auth.c auth_ctx->challenge.may_be_modified = true;
challenge 100 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by));
challenge 102 source4/auth/ntlm/auth.c *_chal = auth_ctx->challenge.data.data;
challenge 259 source4/auth/ntlm/auth.c const uint8_t *challenge;
challenge 286 source4/auth/ntlm/auth.c nt_status = auth_get_challenge(auth_ctx, &challenge);
challenge 289 source4/auth/ntlm/auth.c (unsigned)auth_ctx->challenge.data.length, auth_ctx->challenge.set_by, nt_errstr(nt_status)));
challenge 293 source4/auth/ntlm/auth.c if (auth_ctx->challenge.set_by) {
challenge 295 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by));
challenge 299 source4/auth/ntlm/auth.c dump_data(5, auth_ctx->challenge.data.data, auth_ctx->challenge.data.length);
challenge 411 source4/auth/ntlm/auth.c ctx->challenge.set_by = NULL;
challenge 412 source4/auth/ntlm/auth.c ctx->challenge.may_be_modified = false;
challenge 413 source4/auth/ntlm/auth.c ctx->challenge.data = data_blob(NULL, 0);
challenge 157 source4/auth/ntlm/auth_developer.c const char *challenge = "I am a teapot";
challenge 159 source4/auth/ntlm/auth_developer.c blob = data_blob_talloc(mem_ctx, challenge, 8);
challenge 26 source4/auth/ntlm/auth_proto.h NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge);
challenge 201 source4/auth/ntlm/auth_sam.c &auth_context->challenge.data,
challenge 36 source4/auth/ntlm/auth_util.c NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge)
challenge 129 source4/auth/ntlm/auth_util.c const uint8_t *challenge;
challenge 141 source4/auth/ntlm/auth_util.c nt_status = auth_get_challenge(auth_context, &challenge);
challenge 146 source4/auth/ntlm/auth_util.c chall_blob = data_blob_talloc(mem_ctx, challenge, 8);
challenge 169 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data);
challenge 174 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data);
challenge 107 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal));
challenge 201 source4/auth/ntlm/auth_winbind.c const uint8_t *challenge;
challenge 211 source4/auth/ntlm/auth_winbind.c status = auth_get_challenge(ctx->auth_ctx, &challenge);
challenge 214 source4/auth/ntlm/auth_winbind.c memcpy(network_info->challenge, challenge, sizeof(network_info->challenge));
challenge 288 source4/auth/ntlm/ntlm_check.c const DATA_BLOB *challenge,
challenge 312 source4/auth/ntlm/ntlm_check.c && challenge->length == sizeof(zeros)
challenge 313 source4/auth/ntlm/ntlm_check.c && (memcmp(challenge->data, zeros, challenge->length) == 0 )) {
challenge 355 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 370 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 385 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 406 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 452 source4/auth/ntlm/ntlm_check.c stored_lanman->hash, challenge,
challenge 480 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 492 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 511 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 523 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 542 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 554 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 577 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge,
challenge 67 source4/auth/ntlm/ntlm_check.h const DATA_BLOB *challenge,
challenge 143 source4/auth/ntlmssp/ntlmssp.h NTSTATUS (*set_challenge)(struct gensec_ntlmssp_state *, DATA_BLOB *challenge);
challenge 635 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS auth_ntlmssp_set_challenge(struct gensec_ntlmssp_state *gensec_ntlmssp_state, DATA_BLOB *challenge)
challenge 641 source4/auth/ntlmssp/ntlmssp_server.c if (challenge->length != 8) {
challenge 645 source4/auth/ntlmssp/ntlmssp_server.c chal = challenge->data;
challenge 292 source4/heimdal/kdc/kaserver.c uint32_t challenge,
challenge 330 source4/heimdal/kdc/kaserver.c krb5_store_int32 (sp, challenge);
challenge 557 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_context_set_challenge(auth_context, r->in.logon->network->challenge, "netr_LogonSamLogonWithFlags");
challenge 37 source4/smb_server/smb/negprot.c const uint8_t *challenge;
challenge 57 source4/smb_server/smb/negprot.c nt_status = auth_get_challenge(smb_conn->negotiate.auth_context, &challenge);
challenge 63 source4/smb_server/smb/negprot.c memcpy(buff, challenge, 8);
challenge 608 source4/torture/rpc/netlogon.c generate_random_buffer(ninfo.challenge,
challenge 609 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge));
challenge 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge,
challenge 611 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge));
challenge 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge));
challenge 106 source4/torture/rpc/samlogon.c memcpy(ninfo.challenge, chall->data, 8);
challenge 2704 source4/torture/rpc/samr.c generate_random_buffer(ninfo.challenge,
challenge 2705 source4/torture/rpc/samr.c sizeof(ninfo.challenge));
challenge 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge,
challenge 2707 source4/torture/rpc/samr.c sizeof(ninfo.challenge));
challenge 71 source4/torture/rpc/samsync.c generate_random_buffer(ninfo.challenge,
challenge 72 source4/torture/rpc/samsync.c sizeof(ninfo.challenge));
challenge 76 source4/torture/rpc/samsync.c SMBOWFencrypt(nt_hash->hash, ninfo.challenge, ninfo.nt.data);
challenge 85 source4/torture/rpc/samsync.c SMBOWFencrypt(lm_hash->hash, ninfo.challenge, ninfo.lm.data);
challenge 70 source4/torture/rpc/schannel.c generate_random_buffer(ninfo.challenge,
challenge 71 source4/torture/rpc/schannel.c sizeof(ninfo.challenge));
challenge 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge,
challenge 73 source4/torture/rpc/schannel.c sizeof(ninfo.challenge));
challenge 591 source4/torture/rpc/schannel.c generate_random_buffer(conn->ninfo.challenge,
challenge 592 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge));
challenge 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge,
challenge 594 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge));
challenge 188 source4/utils/ntlm_auth.c const DATA_BLOB *challenge,
challenge 219 source4/utils/ntlm_auth.c challenge,
challenge 738 source4/utils/ntlm_auth.c static DATA_BLOB challenge;
challenge 766 source4/utils/ntlm_auth.c } else if (!challenge.data) {
challenge 800 source4/utils/ntlm_auth.c &challenge,
challenge 843 source4/utils/ntlm_auth.c challenge = data_blob(NULL, 0);
challenge 887 source4/utils/ntlm_auth.c challenge = strhex_to_data_blob(NULL, parameter);
challenge 888 source4/utils/ntlm_auth.c if (challenge.length != 8) {
challenge 891 source4/utils/ntlm_auth.c (int)challenge.length);
challenge 892 source4/utils/ntlm_auth.c challenge = data_blob(NULL, 0);
challenge 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge));
challenge 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data,
challenge 100 source4/winbind/wb_pam_auth.c sizeof(ninfo->challenge));