chal 419 nsswitch/libwbclient/wbc_pam.c memcpy(request.data.auth_crap.chal,
chal 421 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth_crap.chal));
chal 852 nsswitch/wbinfo4.c generate_random_buffer(request.data.auth_crap.chal, 8);
chal 868 nsswitch/wbinfo4.c server_chal = data_blob(request.data.auth_crap.chal, 8);
chal 898 nsswitch/wbinfo4.c && SMBencrypt(pass, request.data.auth_crap.chal,
chal 904 nsswitch/wbinfo4.c SMBNTencrypt(pass, request.data.auth_crap.chal,
chal 256 nsswitch/winbind_struct_protocol.h uint8_t chal[8];
chal 80 source3/auth/auth.c uint8_t chal[8])
chal 90 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8);
chal 146 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8);
chal 540 source3/auth/auth.c NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8])
chal 547 source3/auth/auth.c (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
chal 42 source3/auth/auth_compat.c uint8_t chal[8];
chal 49 source3/auth/auth_compat.c chal);
chal 52 source3/auth/auth_compat.c smb_name, lp_workgroup(), chal,
chal 255 source3/auth/auth_domain.c uchar chal[8],
chal 311 source3/auth/auth_domain.c chal, /* 8 byte challenge. */
chal 31 source3/auth/auth_ntlmssp.c uint8_t chal[8])
chal 36 source3/auth/auth_ntlmssp.c auth_ntlmssp_state->auth_context, chal);
chal 295 source3/auth/auth_util.c const uchar chal[8],
chal 340 source3/auth/auth_util.c SMBOWFencrypt(lm_pwd, chal,
chal 344 source3/auth/auth_util.c SMBOWFencrypt(nt_pwd, chal,
chal 405 source3/auth/auth_util.c const uint8 chal[8],
chal 431 source3/auth/auth_util.c (const uchar*)chal, local_lm_response);
chal 96 source3/include/auth.h uint8_t chal[8]);
chal 96 source3/include/ntlmssp.h DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
chal 33 source3/include/proto.h NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) ;
chal 94 source3/include/proto.h const uchar chal[8],
chal 101 source3/include/proto.h const uint8 chal[8],
chal 5232 source3/include/proto.h const uint8 chal[8],
chal 5243 source3/include/proto.h const uint8 chal[8],
chal 114 source3/libsmb/ntlmssp.c uint8_t chal[8])
chal 116 source3/libsmb/ntlmssp.c generate_random_buffer(chal, 8);
chal 363 source3/libsmb/ntlmssp.c data_blob_free(&(*ntlmssp_state)->chal);
chal 562 source3/libsmb/ntlmssp.c ntlmssp_state->chal = data_blob_talloc(ntlmssp_state, cryptkey, 8);
chal 771 source3/libsmb/ntlmssp.c ntlmssp_state->chal = data_blob_talloc(
chal 778 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) {
chal 1196 source3/libsmb/ntlmssp.c data_blob_free(&ntlmssp_state->chal);
chal 1200 source3/libsmb/ntlmssp.c ntlmssp_state->chal = challenge_blob;
chal 236 source3/rpc_client/cli_netlogon.c uint8 chal[8];
chal 250 source3/rpc_client/cli_netlogon.c generate_random_buffer(chal, 8);
chal 252 source3/rpc_client/cli_netlogon.c SMBencrypt(password, chal, local_lm_response);
chal 253 source3/rpc_client/cli_netlogon.c SMBNTencrypt(password, chal, local_nt_response);
chal 268 source3/rpc_client/cli_netlogon.c chal,
chal 318 source3/rpc_client/cli_netlogon.c const uint8 chal[8],
chal 388 source3/rpc_client/cli_netlogon.c (uint8_t *) chal,
chal 440 source3/rpc_client/cli_netlogon.c const uint8 chal[8],
chal 506 source3/rpc_client/cli_netlogon.c (uint8_t *) chal,
chal 1007 source3/rpc_server/srv_netlog_nt.c uint8_t chal[8];
chal 1013 source3/rpc_server/srv_netlog_nt.c auth_context->get_ntlm_challenge(auth_context, chal);
chal 1019 source3/rpc_server/srv_netlog_nt.c chal,
chal 1102 source3/rpc_server/srv_pipe.c DATA_BLOB chal;
chal 1111 source3/rpc_server/srv_pipe.c ZERO_STRUCT(chal);
chal 1168 source3/rpc_server/srv_pipe.c status = auth_ntlmssp_update(a, secblob, &chal);
chal 1176 source3/rpc_server/srv_pipe.c response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP);
chal 1206 source3/rpc_server/srv_pipe.c data_blob_free(&chal);
chal 1216 source3/rpc_server/srv_pipe.c data_blob_free(&chal);
chal 346 source3/smbd/negprot.c uint8 chal[8];
chal 349 source3/smbd/negprot.c get_challenge(chal);
chal 351 source3/smbd/negprot.c &req->outbuf, data_blob_const(chal, sizeof(chal)));
chal 446 source3/smbd/seal.c DATA_BLOB chal = data_blob_null;
chal 454 source3/smbd/seal.c status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, secblob, &chal);
chal 460 source3/smbd/seal.c response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP);
chal 461 source3/smbd/seal.c data_blob_free(&chal);
chal 464 source3/smbd/seal.c response = chal;
chal 147 source3/smbd/sesssetup.c unsigned char chal[8];
chal 149 source3/smbd/sesssetup.c ZERO_STRUCT(chal);
chal 154 source3/smbd/sesssetup.c chal))) {
chal 773 source3/smbd/sesssetup.c DATA_BLOB chal;
chal 826 source3/smbd/sesssetup.c secblob, &chal);
chal 831 source3/smbd/sesssetup.c &chal, status, OID_NTLMSSP, true);
chal 833 source3/smbd/sesssetup.c data_blob_free(&chal);
chal 1289 source3/smbd/sesssetup.c DATA_BLOB chal;
chal 1303 source3/smbd/sesssetup.c blob1, &chal);
chal 1309 source3/smbd/sesssetup.c &chal, status, OID_NTLMSSP, false);
chal 1310 source3/smbd/sesssetup.c data_blob_free(&chal);
chal 1691 source3/smbd/sesssetup.c uint8_t chal[8];
chal 1694 source3/smbd/sesssetup.c plaintext_auth_context, chal);
chal 1697 source3/smbd/sesssetup.c user, domain, chal,
chal 211 source3/utils/ntlm_auth.c static DATA_BLOB chal;
chal 215 source3/utils/ntlm_auth.c chal = data_blob(NULL, 8);
chal 217 source3/utils/ntlm_auth.c generate_random_buffer(chal.data, chal.length);
chal 218 source3/utils/ntlm_auth.c return chal;
chal 373 source3/utils/ntlm_auth.c memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8));
chal 533 source3/utils/ntlm_auth.c &ntlmssp_state->chal,
chal 574 source3/utils/ntlm_auth.c &ntlmssp_state->chal,
chal 1198 source3/winbindd/winbindd_pam.c const uint8 chal[8],
chal 1209 source3/winbindd/winbindd_pam.c uchar chal[8];
chal 1232 source3/winbindd/winbindd_pam.c generate_random_buffer(chal, 8);
chal 1238 source3/winbindd/winbindd_pam.c server_chal = data_blob_talloc(state->mem_ctx, chal, 8);
chal 1269 source3/winbindd/winbindd_pam.c chal,
chal 1278 source3/winbindd/winbindd_pam.c chal,
chal 1353 source3/winbindd/winbindd_pam.c chal,
chal 1927 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.chal,
chal 195 source4/auth/auth.h NTSTATUS (*set_challenge)(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by);
chal 281 source4/auth/auth.h NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by);
chal 31 source4/auth/ntlm/auth.c _PUBLIC_ NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by)
chal 36 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
chal 89 source4/auth/ntlm/auth.c uint8_t chal[8];
chal 90 source4/auth/ntlm/auth.c generate_random_buffer(chal, 8);
chal 92 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
chal 107 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal));
chal 102 source4/auth/ntlmssp/ntlmssp.h DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
chal 277 source4/auth/ntlmssp/ntlmssp_client.c gensec_ntlmssp_state->chal = challenge_blob;
chal 180 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, cryptkey, 8);
chal 375 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state,
chal 384 source4/auth/ntlmssp/ntlmssp_server.c &gensec_ntlmssp_state->chal))) {
chal 609 source4/auth/ntlmssp/ntlmssp_server.c const uint8_t *chal;
chal 611 source4/auth/ntlmssp/ntlmssp_server.c status = gensec_ntlmssp_state->auth_context->get_challenge(gensec_ntlmssp_state->auth_context, &chal);
chal 618 source4/auth/ntlmssp/ntlmssp_server.c return chal;
chal 639 source4/auth/ntlmssp/ntlmssp_server.c const uint8_t *chal;
chal 645 source4/auth/ntlmssp/ntlmssp_server.c chal = challenge->data;
chal 648 source4/auth/ntlmssp/ntlmssp_server.c chal,
chal 455 source4/heimdal/kdc/kaserver.c int32_t chal;
chal 546 source4/heimdal/kdc/kaserver.c krb5_ret_int32 (reply_sp, &chal);
chal 549 source4/heimdal/kdc/kaserver.c if (abs(chal - kdc_time) > context->max_skew) {
chal 573 source4/heimdal/kdc/kaserver.c chal + 1, "tgsT",
chal 593 source4/torture/rpc/netlogon.c DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge,
chal 618 source4/torture/rpc/netlogon.c chal,
chal 1056 source4/torture/rpc/samba3rpc.c DATA_BLOB chal, nt_resp, lm_resp, names_blob, session_key;
chal 1070 source4/torture/rpc/samba3rpc.c chal = data_blob_talloc(mem_ctx, NULL, 8);
chal 1071 source4/torture/rpc/samba3rpc.c if (chal.data == NULL) {
chal 1076 source4/torture/rpc/samba3rpc.c generate_random_buffer(chal.data, chal.length);
chal 1082 source4/torture/rpc/samba3rpc.c user_creds, mem_ctx, &flags, chal, names_blob,
chal 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge));
chal 2689 source4/torture/rpc/samr.c DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge,
chal 2714 source4/torture/rpc/samr.c chal,
chal 55 source4/torture/rpc/schannel.c DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge,
chal 80 source4/torture/rpc/schannel.c chal,
chal 563 source4/torture/rpc/schannel.c DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge,
chal 602 source4/torture/rpc/schannel.c chal,
chal 66 source4/winbind/wb_pam_auth.c DATA_BLOB chal,
chal 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge));
chal 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data,
chal 222 source4/winbind/wb_pam_auth.c DATA_BLOB chal, nt_resp, lm_resp, names_blob;
chal 234 source4/winbind/wb_pam_auth.c chal = data_blob_talloc(mem_ctx, NULL, 8);
chal 235 source4/winbind/wb_pam_auth.c if (!chal.data) {
chal 238 source4/winbind/wb_pam_auth.c generate_random_buffer(chal.data, chal.length);
chal 252 source4/winbind/wb_pam_auth.c credentials, mem_ctx, &flags, chal, names_blob,
chal 260 source4/winbind/wb_pam_auth.c chal, nt_resp, lm_resp);
chal 494 source4/winbind/wb_samba3_cmd.c DATA_BLOB chal, nt_resp, lm_resp;
chal 498 source4/winbind/wb_samba3_cmd.c chal.data = s3call->request.data.auth_crap.chal;
chal 499 source4/winbind/wb_samba3_cmd.c chal.length = sizeof(s3call->request.data.auth_crap.chal);
chal 511 source4/winbind/wb_samba3_cmd.c chal, nt_resp, lm_resp);