samlogon_state     88 source4/torture/rpc/samlogon.c 	struct netr_LogonSamLogon *r = &samlogon_state->r;
samlogon_state     89 source4/torture/rpc/samlogon.c 	struct netr_LogonSamLogonEx *r_ex = &samlogon_state->r_ex;
samlogon_state     90 source4/torture/rpc/samlogon.c 	struct netr_LogonSamLogonWithFlags *r_flags = &samlogon_state->r_flags;
samlogon_state     95 source4/torture/rpc/samlogon.c 	samlogon_state->r.in.logon->network = &ninfo;
samlogon_state     96 source4/torture/rpc/samlogon.c 	samlogon_state->r_ex.in.logon->network = &ninfo;
samlogon_state     97 source4/torture/rpc/samlogon.c 	samlogon_state->r_flags.in.logon->network = &ninfo;
samlogon_state     99 source4/torture/rpc/samlogon.c 	ninfo.identity_info.domain_name.string = samlogon_state->account_domain;
samlogon_state    103 source4/torture/rpc/samlogon.c 	ninfo.identity_info.account_name.string = samlogon_state->account_name;
samlogon_state    153 source4/torture/rpc/samlogon.c 	switch (samlogon_state->function_level) {
samlogon_state    155 source4/torture/rpc/samlogon.c 		ZERO_STRUCT(samlogon_state->auth2);
samlogon_state    156 source4/torture/rpc/samlogon.c 		creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
samlogon_state    159 source4/torture/rpc/samlogon.c 		status = dcerpc_netr_LogonSamLogon(samlogon_state->p, samlogon_state->mem_ctx, r);
samlogon_state    161 source4/torture/rpc/samlogon.c 		    !creds_client_check(samlogon_state->creds, &r->out.return_authenticator->cred)) {
samlogon_state    173 source4/torture/rpc/samlogon.c 		creds_decrypt_samlogon(samlogon_state->creds, validation_level, r->out.validation);
samlogon_state    188 source4/torture/rpc/samlogon.c 		status = dcerpc_netr_LogonSamLogonEx(samlogon_state->p, samlogon_state->mem_ctx, r_ex);
samlogon_state    198 source4/torture/rpc/samlogon.c 		creds_decrypt_samlogon(samlogon_state->creds, validation_level, r_ex->out.validation);
samlogon_state    213 source4/torture/rpc/samlogon.c 		ZERO_STRUCT(samlogon_state->auth2);
samlogon_state    214 source4/torture/rpc/samlogon.c 		creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
samlogon_state    217 source4/torture/rpc/samlogon.c 		status = dcerpc_netr_LogonSamLogonWithFlags(samlogon_state->p, samlogon_state->mem_ctx, r_flags);
samlogon_state    219 source4/torture/rpc/samlogon.c 		    !creds_client_check(samlogon_state->creds, &r_flags->out.return_authenticator->cred)) {
samlogon_state    231 source4/torture/rpc/samlogon.c 		creds_decrypt_samlogon(samlogon_state->creds, validation_level, r_flags->out.validation);
samlogon_state    275 source4/torture/rpc/samlogon.c 	DATA_BLOB lm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state    276 source4/torture/rpc/samlogon.c 	DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state    277 source4/torture/rpc/samlogon.c 	DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16);
samlogon_state    287 source4/torture/rpc/samlogon.c 	lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data);
samlogon_state    291 source4/torture/rpc/samlogon.c 		E_deshash(samlogon_state->password, lm_hash); 
samlogon_state    294 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
samlogon_state    296 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
samlogon_state    299 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state    301 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state    302 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state    317 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state    321 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
samlogon_state    323 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state    325 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state    327 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state    386 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, NO_NT, error_string);
samlogon_state    395 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, NO_LM, error_string);
samlogon_state    407 source4/torture/rpc/samlogon.c 	DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state    408 source4/torture/rpc/samlogon.c 	DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16);
samlogon_state    418 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
samlogon_state    420 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
samlogon_state    424 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
samlogon_state    428 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state    430 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state    431 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state    440 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state    444 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state    446 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state    448 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state    503 source4/torture/rpc/samlogon.c 	DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state    504 source4/torture/rpc/samlogon.c 	DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16);
samlogon_state    514 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
samlogon_state    516 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
samlogon_state    520 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
samlogon_state    525 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state    527 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state    528 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state    537 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state    541 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state    543 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state    545 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state    598 source4/torture/rpc/samlogon.c 	DATA_BLOB names_blob = NTLMv2_generate_names_blob(samlogon_state->mem_ctx, TEST_MACHINE_NAME, samlogon_state->workgroup);
samlogon_state    608 source4/torture/rpc/samlogon.c 		if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, 
samlogon_state    609 source4/torture/rpc/samlogon.c 				      samlogon_state->account_name, samlogon_state->account_domain, 
samlogon_state    610 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
samlogon_state    619 source4/torture/rpc/samlogon.c 		if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, 
samlogon_state    620 source4/torture/rpc/samlogon.c 				      samlogon_state->account_name, "",
samlogon_state    621 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
samlogon_state    632 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state    634 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state    635 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state    648 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state    652 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
samlogon_state    654 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state    656 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state    658 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state    746 source4/torture/rpc/samlogon.c 	DATA_BLOB names_blob = NTLMv2_generate_names_blob(samlogon_state->mem_ctx, samlogon_state->netbios_name, samlogon_state->workgroup);
samlogon_state    748 source4/torture/rpc/samlogon.c 	DATA_BLOB ntlm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state    749 source4/torture/rpc/samlogon.c 	DATA_BLOB ntlm_session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16);
samlogon_state    757 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
samlogon_state    759 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
samlogon_state    763 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
samlogon_state    774 source4/torture/rpc/samlogon.c 		if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, 
samlogon_state    775 source4/torture/rpc/samlogon.c 				      samlogon_state->account_name, samlogon_state->account_domain, 
samlogon_state    776 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
samlogon_state    786 source4/torture/rpc/samlogon.c 		if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, 
samlogon_state    787 source4/torture/rpc/samlogon.c 				      samlogon_state->account_name, "",
samlogon_state    788 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
samlogon_state    800 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state    802 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state    803 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state    816 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state    820 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
samlogon_state    822 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state    824 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state    826 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state    916 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NONE, UPPER_DOMAIN, error_string);
samlogon_state    922 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NONE, NO_DOMAIN, error_string);
samlogon_state    932 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, NO_NT, UPPER_DOMAIN, error_string);
samlogon_state    937 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, NO_NT, NO_DOMAIN, error_string);
samlogon_state    946 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, NO_LM, UPPER_DOMAIN, error_string);
samlogon_state    951 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, NO_LM, NO_DOMAIN, error_string);
samlogon_state    956 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, BREAK_NONE, error_string);
samlogon_state    961 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, BREAK_LM, error_string);
samlogon_state    966 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, BREAK_NT, error_string);
samlogon_state    971 source4/torture/rpc/samlogon.c 	return test_lm_ntlm_broken(samlogon_state, BREAK_BOTH, error_string);
samlogon_state    975 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_LM, UPPER_DOMAIN, error_string);
samlogon_state    980 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_LM, NO_DOMAIN, error_string);
samlogon_state    985 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NT, UPPER_DOMAIN, error_string);
samlogon_state    991 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NT, NO_DOMAIN, error_string);
samlogon_state    997 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_BOTH, UPPER_DOMAIN, error_string);
samlogon_state   1002 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_BOTH, NO_DOMAIN, error_string);
samlogon_state   1007 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_BOTH, UPPER_DOMAIN, error_string);
samlogon_state   1012 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_BOTH, NO_DOMAIN, error_string);
samlogon_state   1017 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_NT, UPPER_DOMAIN, error_string);
samlogon_state   1022 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_NT, NO_DOMAIN, error_string);
samlogon_state   1027 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_LM, UPPER_DOMAIN, error_string);
samlogon_state   1032 source4/torture/rpc/samlogon.c 	return test_lmv2_ntlm_broken(samlogon_state, BREAK_LM, NO_DOMAIN, error_string);
samlogon_state   1047 source4/torture/rpc/samlogon.c 	DATA_BLOB lm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state   1048 source4/torture/rpc/samlogon.c 	DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
samlogon_state   1068 source4/torture/rpc/samlogon.c 	MD5Update(&md5_session_nonce_ctx, samlogon_state->chall.data, 8);
samlogon_state   1072 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, (uint8_t *)nt_hash);
samlogon_state   1073 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash);
samlogon_state   1077 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
samlogon_state   1083 source4/torture/rpc/samlogon.c 	hmac_md5_update(samlogon_state->chall.data, 8, &hmac_ctx);
samlogon_state   1087 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state   1089 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control,
samlogon_state   1090 source4/torture/rpc/samlogon.c 				   &samlogon_state->chall,
samlogon_state   1099 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state   1103 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state   1105 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state   1107 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state   1159 source4/torture/rpc/samlogon.c 	DATA_BLOB chall = data_blob_talloc(samlogon_state->mem_ctx, zeros, sizeof(zeros));
samlogon_state   1160 source4/torture/rpc/samlogon.c 	bool lm_good = E_deshash(samlogon_state->password, lm_hash); 
samlogon_state   1164 source4/torture/rpc/samlogon.c 	if (!push_ucs2_talloc(samlogon_state->mem_ctx, 
samlogon_state   1165 source4/torture/rpc/samlogon.c 			      &unicodepw, samlogon_state->password, NULL)) {
samlogon_state   1170 source4/torture/rpc/samlogon.c 	nt_response = data_blob_talloc(samlogon_state->mem_ctx, unicodepw, strlen_m(samlogon_state->password)*2);
samlogon_state   1172 source4/torture/rpc/samlogon.c 	password = strupper_talloc(samlogon_state->mem_ctx, samlogon_state->password);
samlogon_state   1174 source4/torture/rpc/samlogon.c 	if (!convert_string_talloc_convenience(samlogon_state->mem_ctx, 
samlogon_state   1175 source4/torture/rpc/samlogon.c 				   samlogon_state->iconv_convenience,
samlogon_state   1183 source4/torture/rpc/samlogon.c 	lm_response = data_blob_talloc(samlogon_state->mem_ctx, dospw, strlen(dospw));
samlogon_state   1185 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
samlogon_state   1187 source4/torture/rpc/samlogon.c 				   samlogon_state->parameter_control | MSV1_0_CLEARTEXT_PASSWORD_ALLOWED,
samlogon_state   1197 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
samlogon_state   1205 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
samlogon_state   1207 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
samlogon_state   1209 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
samlogon_state   1211 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
samlogon_state   1227 source4/torture/rpc/samlogon.c 	return test_plaintext(samlogon_state, BREAK_NONE, error_string);
samlogon_state   1232 source4/torture/rpc/samlogon.c 	return test_plaintext(samlogon_state, BREAK_LM, error_string);
samlogon_state   1237 source4/torture/rpc/samlogon.c 	return test_plaintext(samlogon_state, BREAK_NT, error_string);
samlogon_state   1242 source4/torture/rpc/samlogon.c 	return test_plaintext(samlogon_state, NO_LM, error_string);
samlogon_state   1247 source4/torture/rpc/samlogon.c 	return test_plaintext(samlogon_state, NO_NT, error_string);
samlogon_state   1269 source4/torture/rpc/samlogon.c 	bool (*fn)(struct samlogon_state *, char **);
samlogon_state   1333 source4/torture/rpc/samlogon.c 	struct samlogon_state samlogon_state;
samlogon_state   1344 source4/torture/rpc/samlogon.c 	samlogon_state.comment = comment;
samlogon_state   1345 source4/torture/rpc/samlogon.c 	samlogon_state.account_name = account_name;
samlogon_state   1346 source4/torture/rpc/samlogon.c 	samlogon_state.account_domain = account_domain;
samlogon_state   1347 source4/torture/rpc/samlogon.c 	samlogon_state.password = plain_pass;
samlogon_state   1348 source4/torture/rpc/samlogon.c 	samlogon_state.workgroup = lp_workgroup(tctx->lp_ctx);
samlogon_state   1349 source4/torture/rpc/samlogon.c 	samlogon_state.netbios_name = lp_netbios_name(tctx->lp_ctx);
samlogon_state   1350 source4/torture/rpc/samlogon.c 	samlogon_state.p = p;
samlogon_state   1351 source4/torture/rpc/samlogon.c 	samlogon_state.creds = creds;
samlogon_state   1352 source4/torture/rpc/samlogon.c 	samlogon_state.expected_error = expected_error;
samlogon_state   1353 source4/torture/rpc/samlogon.c 	samlogon_state.chall = data_blob_talloc(fn_ctx, NULL, 8);
samlogon_state   1354 source4/torture/rpc/samlogon.c 	samlogon_state.parameter_control = parameter_control;
samlogon_state   1355 source4/torture/rpc/samlogon.c 	samlogon_state.old_password = old_password;
samlogon_state   1356 source4/torture/rpc/samlogon.c 	samlogon_state.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx);
samlogon_state   1358 source4/torture/rpc/samlogon.c 	generate_random_buffer(samlogon_state.chall.data, 8);
samlogon_state   1359 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p));
samlogon_state   1360 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.computer_name = TEST_MACHINE_NAME;
samlogon_state   1361 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.credential = &samlogon_state.auth;
samlogon_state   1362 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.return_authenticator = &samlogon_state.auth2;
samlogon_state   1363 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.flags = &flags;
samlogon_state   1364 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.logon = &logon;
samlogon_state   1365 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.out.validation = &validation;
samlogon_state   1366 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.out.authoritative = &authoritative;
samlogon_state   1367 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.out.flags = &flags;
samlogon_state   1369 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p));
samlogon_state   1370 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.in.computer_name = TEST_MACHINE_NAME;
samlogon_state   1371 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.in.flags = &flags;
samlogon_state   1372 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.in.logon = &logon;
samlogon_state   1373 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.out.validation = &validation;
samlogon_state   1374 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.out.authoritative = &authoritative;
samlogon_state   1375 source4/torture/rpc/samlogon.c 	samlogon_state.r_ex.out.flags = &flags;
samlogon_state   1377 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p));
samlogon_state   1378 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.computer_name = TEST_MACHINE_NAME;
samlogon_state   1379 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.credential = &samlogon_state.auth;
samlogon_state   1380 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.return_authenticator = &samlogon_state.auth2;
samlogon_state   1381 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.logon = &logon;
samlogon_state   1382 source4/torture/rpc/samlogon.c 	samlogon_state.r.out.validation = &validation;
samlogon_state   1383 source4/torture/rpc/samlogon.c 	samlogon_state.r.out.authoritative = &authoritative;
samlogon_state   1395 source4/torture/rpc/samlogon.c 					samlogon_state.mem_ctx = tmp_ctx;
samlogon_state   1396 source4/torture/rpc/samlogon.c 					samlogon_state.function_level = function_levels[f];
samlogon_state   1397 source4/torture/rpc/samlogon.c 					samlogon_state.r.in.validation_level = validation_levels[v];
samlogon_state   1398 source4/torture/rpc/samlogon.c 					samlogon_state.r.in.logon_level = logon_levels[l];
samlogon_state   1399 source4/torture/rpc/samlogon.c 					samlogon_state.r_ex.in.validation_level = validation_levels[v];
samlogon_state   1400 source4/torture/rpc/samlogon.c 					samlogon_state.r_ex.in.logon_level = logon_levels[l];
samlogon_state   1401 source4/torture/rpc/samlogon.c 					samlogon_state.r_flags.in.validation_level = validation_levels[v];
samlogon_state   1402 source4/torture/rpc/samlogon.c 					samlogon_state.r_flags.in.logon_level = logon_levels[l];
samlogon_state   1403 source4/torture/rpc/samlogon.c 					if (!test_table[i].fn(&samlogon_state, &error_string)) {
samlogon_state   1405 source4/torture/rpc/samlogon.c 						       samlogon_state.comment,
samlogon_state   1406 source4/torture/rpc/samlogon.c 						       samlogon_state.account_domain,
samlogon_state   1407 source4/torture/rpc/samlogon.c 						       samlogon_state.account_name,