samlogon_state 88 source4/torture/rpc/samlogon.c struct netr_LogonSamLogon *r = &samlogon_state->r; samlogon_state 89 source4/torture/rpc/samlogon.c struct netr_LogonSamLogonEx *r_ex = &samlogon_state->r_ex; samlogon_state 90 source4/torture/rpc/samlogon.c struct netr_LogonSamLogonWithFlags *r_flags = &samlogon_state->r_flags; samlogon_state 95 source4/torture/rpc/samlogon.c samlogon_state->r.in.logon->network = &ninfo; samlogon_state 96 source4/torture/rpc/samlogon.c samlogon_state->r_ex.in.logon->network = &ninfo; samlogon_state 97 source4/torture/rpc/samlogon.c samlogon_state->r_flags.in.logon->network = &ninfo; samlogon_state 99 source4/torture/rpc/samlogon.c ninfo.identity_info.domain_name.string = samlogon_state->account_domain; samlogon_state 103 source4/torture/rpc/samlogon.c ninfo.identity_info.account_name.string = samlogon_state->account_name; samlogon_state 153 source4/torture/rpc/samlogon.c switch (samlogon_state->function_level) { samlogon_state 155 source4/torture/rpc/samlogon.c ZERO_STRUCT(samlogon_state->auth2); samlogon_state 156 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth); samlogon_state 159 source4/torture/rpc/samlogon.c status = dcerpc_netr_LogonSamLogon(samlogon_state->p, samlogon_state->mem_ctx, r); samlogon_state 161 source4/torture/rpc/samlogon.c !creds_client_check(samlogon_state->creds, &r->out.return_authenticator->cred)) { samlogon_state 173 source4/torture/rpc/samlogon.c creds_decrypt_samlogon(samlogon_state->creds, validation_level, r->out.validation); samlogon_state 188 source4/torture/rpc/samlogon.c status = dcerpc_netr_LogonSamLogonEx(samlogon_state->p, samlogon_state->mem_ctx, r_ex); samlogon_state 198 source4/torture/rpc/samlogon.c creds_decrypt_samlogon(samlogon_state->creds, validation_level, r_ex->out.validation); samlogon_state 213 source4/torture/rpc/samlogon.c ZERO_STRUCT(samlogon_state->auth2); samlogon_state 214 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth); samlogon_state 217 source4/torture/rpc/samlogon.c status = dcerpc_netr_LogonSamLogonWithFlags(samlogon_state->p, samlogon_state->mem_ctx, r_flags); samlogon_state 219 source4/torture/rpc/samlogon.c !creds_client_check(samlogon_state->creds, &r_flags->out.return_authenticator->cred)) { samlogon_state 231 source4/torture/rpc/samlogon.c creds_decrypt_samlogon(samlogon_state->creds, validation_level, r_flags->out.validation); samlogon_state 275 source4/torture/rpc/samlogon.c DATA_BLOB lm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 276 source4/torture/rpc/samlogon.c DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 277 source4/torture/rpc/samlogon.c DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16); samlogon_state 287 source4/torture/rpc/samlogon.c lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data); samlogon_state 291 source4/torture/rpc/samlogon.c E_deshash(samlogon_state->password, lm_hash); samlogon_state 294 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data); samlogon_state 296 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); samlogon_state 299 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 301 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 302 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 317 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 321 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { samlogon_state 323 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 325 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 327 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 386 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, NO_NT, error_string); samlogon_state 395 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, NO_LM, error_string); samlogon_state 407 source4/torture/rpc/samlogon.c DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 408 source4/torture/rpc/samlogon.c DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16); samlogon_state 418 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, samlogon_state 420 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); samlogon_state 424 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); samlogon_state 428 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 430 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 431 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 440 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 444 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 446 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 448 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 503 source4/torture/rpc/samlogon.c DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 504 source4/torture/rpc/samlogon.c DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16); samlogon_state 514 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, samlogon_state 516 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); samlogon_state 520 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); samlogon_state 525 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 527 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 528 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 537 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 541 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 543 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 545 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 598 source4/torture/rpc/samlogon.c DATA_BLOB names_blob = NTLMv2_generate_names_blob(samlogon_state->mem_ctx, TEST_MACHINE_NAME, samlogon_state->workgroup); samlogon_state 608 source4/torture/rpc/samlogon.c if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, samlogon_state 609 source4/torture/rpc/samlogon.c samlogon_state->account_name, samlogon_state->account_domain, samlogon_state 610 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, samlogon_state 619 source4/torture/rpc/samlogon.c if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, samlogon_state 620 source4/torture/rpc/samlogon.c samlogon_state->account_name, "", samlogon_state 621 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, samlogon_state 632 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 634 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 635 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 648 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 652 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { samlogon_state 654 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 656 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 658 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 746 source4/torture/rpc/samlogon.c DATA_BLOB names_blob = NTLMv2_generate_names_blob(samlogon_state->mem_ctx, samlogon_state->netbios_name, samlogon_state->workgroup); samlogon_state 748 source4/torture/rpc/samlogon.c DATA_BLOB ntlm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 749 source4/torture/rpc/samlogon.c DATA_BLOB ntlm_session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16); samlogon_state 757 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, samlogon_state 759 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); samlogon_state 763 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); samlogon_state 774 source4/torture/rpc/samlogon.c if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, samlogon_state 775 source4/torture/rpc/samlogon.c samlogon_state->account_name, samlogon_state->account_domain, samlogon_state 776 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, samlogon_state 786 source4/torture/rpc/samlogon.c if (!SMBNTLMv2encrypt(samlogon_state->mem_ctx, samlogon_state 787 source4/torture/rpc/samlogon.c samlogon_state->account_name, "", samlogon_state 788 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, samlogon_state 800 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 802 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 803 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 816 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 820 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { samlogon_state 822 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 824 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 826 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 916 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NONE, UPPER_DOMAIN, error_string); samlogon_state 922 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NONE, NO_DOMAIN, error_string); samlogon_state 932 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, NO_NT, UPPER_DOMAIN, error_string); samlogon_state 937 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, NO_NT, NO_DOMAIN, error_string); samlogon_state 946 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, NO_LM, UPPER_DOMAIN, error_string); samlogon_state 951 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, NO_LM, NO_DOMAIN, error_string); samlogon_state 956 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, BREAK_NONE, error_string); samlogon_state 961 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, BREAK_LM, error_string); samlogon_state 966 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, BREAK_NT, error_string); samlogon_state 971 source4/torture/rpc/samlogon.c return test_lm_ntlm_broken(samlogon_state, BREAK_BOTH, error_string); samlogon_state 975 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_LM, UPPER_DOMAIN, error_string); samlogon_state 980 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_LM, NO_DOMAIN, error_string); samlogon_state 985 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NT, UPPER_DOMAIN, error_string); samlogon_state 991 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_NT, NO_DOMAIN, error_string); samlogon_state 997 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_BOTH, UPPER_DOMAIN, error_string); samlogon_state 1002 source4/torture/rpc/samlogon.c return test_lmv2_ntlmv2_broken(samlogon_state, BREAK_BOTH, NO_DOMAIN, error_string); samlogon_state 1007 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_BOTH, UPPER_DOMAIN, error_string); samlogon_state 1012 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_BOTH, NO_DOMAIN, error_string); samlogon_state 1017 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_NT, UPPER_DOMAIN, error_string); samlogon_state 1022 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_NT, NO_DOMAIN, error_string); samlogon_state 1027 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_LM, UPPER_DOMAIN, error_string); samlogon_state 1032 source4/torture/rpc/samlogon.c return test_lmv2_ntlm_broken(samlogon_state, BREAK_LM, NO_DOMAIN, error_string); samlogon_state 1047 source4/torture/rpc/samlogon.c DATA_BLOB lm_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 1048 source4/torture/rpc/samlogon.c DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24); samlogon_state 1068 source4/torture/rpc/samlogon.c MD5Update(&md5_session_nonce_ctx, samlogon_state->chall.data, 8); samlogon_state 1072 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, (uint8_t *)nt_hash); samlogon_state 1073 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash); samlogon_state 1077 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data); samlogon_state 1083 source4/torture/rpc/samlogon.c hmac_md5_update(samlogon_state->chall.data, 8, &hmac_ctx); samlogon_state 1087 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 1089 source4/torture/rpc/samlogon.c samlogon_state->parameter_control, samlogon_state 1090 source4/torture/rpc/samlogon.c &samlogon_state->chall, samlogon_state 1099 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 1103 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 1105 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 1107 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 1159 source4/torture/rpc/samlogon.c DATA_BLOB chall = data_blob_talloc(samlogon_state->mem_ctx, zeros, sizeof(zeros)); samlogon_state 1160 source4/torture/rpc/samlogon.c bool lm_good = E_deshash(samlogon_state->password, lm_hash); samlogon_state 1164 source4/torture/rpc/samlogon.c if (!push_ucs2_talloc(samlogon_state->mem_ctx, samlogon_state 1165 source4/torture/rpc/samlogon.c &unicodepw, samlogon_state->password, NULL)) { samlogon_state 1170 source4/torture/rpc/samlogon.c nt_response = data_blob_talloc(samlogon_state->mem_ctx, unicodepw, strlen_m(samlogon_state->password)*2); samlogon_state 1172 source4/torture/rpc/samlogon.c password = strupper_talloc(samlogon_state->mem_ctx, samlogon_state->password); samlogon_state 1174 source4/torture/rpc/samlogon.c if (!convert_string_talloc_convenience(samlogon_state->mem_ctx, samlogon_state 1175 source4/torture/rpc/samlogon.c samlogon_state->iconv_convenience, samlogon_state 1183 source4/torture/rpc/samlogon.c lm_response = data_blob_talloc(samlogon_state->mem_ctx, dospw, strlen(dospw)); samlogon_state 1185 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, samlogon_state 1187 source4/torture/rpc/samlogon.c samlogon_state->parameter_control | MSV1_0_CLEARTEXT_PASSWORD_ALLOWED, samlogon_state 1197 source4/torture/rpc/samlogon.c if (samlogon_state->old_password) { samlogon_state 1205 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { samlogon_state 1207 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { samlogon_state 1209 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); samlogon_state 1211 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { samlogon_state 1227 source4/torture/rpc/samlogon.c return test_plaintext(samlogon_state, BREAK_NONE, error_string); samlogon_state 1232 source4/torture/rpc/samlogon.c return test_plaintext(samlogon_state, BREAK_LM, error_string); samlogon_state 1237 source4/torture/rpc/samlogon.c return test_plaintext(samlogon_state, BREAK_NT, error_string); samlogon_state 1242 source4/torture/rpc/samlogon.c return test_plaintext(samlogon_state, NO_LM, error_string); samlogon_state 1247 source4/torture/rpc/samlogon.c return test_plaintext(samlogon_state, NO_NT, error_string); samlogon_state 1269 source4/torture/rpc/samlogon.c bool (*fn)(struct samlogon_state *, char **); samlogon_state 1333 source4/torture/rpc/samlogon.c struct samlogon_state samlogon_state; samlogon_state 1344 source4/torture/rpc/samlogon.c samlogon_state.comment = comment; samlogon_state 1345 source4/torture/rpc/samlogon.c samlogon_state.account_name = account_name; samlogon_state 1346 source4/torture/rpc/samlogon.c samlogon_state.account_domain = account_domain; samlogon_state 1347 source4/torture/rpc/samlogon.c samlogon_state.password = plain_pass; samlogon_state 1348 source4/torture/rpc/samlogon.c samlogon_state.workgroup = lp_workgroup(tctx->lp_ctx); samlogon_state 1349 source4/torture/rpc/samlogon.c samlogon_state.netbios_name = lp_netbios_name(tctx->lp_ctx); samlogon_state 1350 source4/torture/rpc/samlogon.c samlogon_state.p = p; samlogon_state 1351 source4/torture/rpc/samlogon.c samlogon_state.creds = creds; samlogon_state 1352 source4/torture/rpc/samlogon.c samlogon_state.expected_error = expected_error; samlogon_state 1353 source4/torture/rpc/samlogon.c samlogon_state.chall = data_blob_talloc(fn_ctx, NULL, 8); samlogon_state 1354 source4/torture/rpc/samlogon.c samlogon_state.parameter_control = parameter_control; samlogon_state 1355 source4/torture/rpc/samlogon.c samlogon_state.old_password = old_password; samlogon_state 1356 source4/torture/rpc/samlogon.c samlogon_state.iconv_convenience = lp_iconv_convenience(tctx->lp_ctx); samlogon_state 1358 source4/torture/rpc/samlogon.c generate_random_buffer(samlogon_state.chall.data, 8); samlogon_state 1359 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p)); samlogon_state 1360 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.computer_name = TEST_MACHINE_NAME; samlogon_state 1361 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.credential = &samlogon_state.auth; samlogon_state 1362 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.return_authenticator = &samlogon_state.auth2; samlogon_state 1363 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.flags = &flags; samlogon_state 1364 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.logon = &logon; samlogon_state 1365 source4/torture/rpc/samlogon.c samlogon_state.r_flags.out.validation = &validation; samlogon_state 1366 source4/torture/rpc/samlogon.c samlogon_state.r_flags.out.authoritative = &authoritative; samlogon_state 1367 source4/torture/rpc/samlogon.c samlogon_state.r_flags.out.flags = &flags; samlogon_state 1369 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p)); samlogon_state 1370 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.computer_name = TEST_MACHINE_NAME; samlogon_state 1371 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.flags = &flags; samlogon_state 1372 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.logon = &logon; samlogon_state 1373 source4/torture/rpc/samlogon.c samlogon_state.r_ex.out.validation = &validation; samlogon_state 1374 source4/torture/rpc/samlogon.c samlogon_state.r_ex.out.authoritative = &authoritative; samlogon_state 1375 source4/torture/rpc/samlogon.c samlogon_state.r_ex.out.flags = &flags; samlogon_state 1377 source4/torture/rpc/samlogon.c samlogon_state.r.in.server_name = talloc_asprintf(fn_ctx, "\\\\%s", dcerpc_server_name(p)); samlogon_state 1378 source4/torture/rpc/samlogon.c samlogon_state.r.in.computer_name = TEST_MACHINE_NAME; samlogon_state 1379 source4/torture/rpc/samlogon.c samlogon_state.r.in.credential = &samlogon_state.auth; samlogon_state 1380 source4/torture/rpc/samlogon.c samlogon_state.r.in.return_authenticator = &samlogon_state.auth2; samlogon_state 1381 source4/torture/rpc/samlogon.c samlogon_state.r.in.logon = &logon; samlogon_state 1382 source4/torture/rpc/samlogon.c samlogon_state.r.out.validation = &validation; samlogon_state 1383 source4/torture/rpc/samlogon.c samlogon_state.r.out.authoritative = &authoritative; samlogon_state 1395 source4/torture/rpc/samlogon.c samlogon_state.mem_ctx = tmp_ctx; samlogon_state 1396 source4/torture/rpc/samlogon.c samlogon_state.function_level = function_levels[f]; samlogon_state 1397 source4/torture/rpc/samlogon.c samlogon_state.r.in.validation_level = validation_levels[v]; samlogon_state 1398 source4/torture/rpc/samlogon.c samlogon_state.r.in.logon_level = logon_levels[l]; samlogon_state 1399 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.validation_level = validation_levels[v]; samlogon_state 1400 source4/torture/rpc/samlogon.c samlogon_state.r_ex.in.logon_level = logon_levels[l]; samlogon_state 1401 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.validation_level = validation_levels[v]; samlogon_state 1402 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.logon_level = logon_levels[l]; samlogon_state 1403 source4/torture/rpc/samlogon.c if (!test_table[i].fn(&samlogon_state, &error_string)) { samlogon_state 1405 source4/torture/rpc/samlogon.c samlogon_state.comment, samlogon_state 1406 source4/torture/rpc/samlogon.c samlogon_state.account_domain, samlogon_state 1407 source4/torture/rpc/samlogon.c samlogon_state.account_name,