challenge         489 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
challenge         511 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
challenge         533 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_array_uint8(ndr, "challenge", r->challenge, 8);
challenge          83 librpc/gen_ndr/netlogon.h 	uint8_t challenge[8];
challenge         420 nsswitch/libwbclient/wbc_pam.c 		       params->password.response.challenge,
challenge         217 nsswitch/libwbclient/wbclient.h 			uint8_t challenge[8];
challenge        1321 nsswitch/wbinfo.c 	generate_random_buffer(params.password.response.challenge, 8);
challenge        1327 nsswitch/wbinfo.c 		server_chal = data_blob(params.password.response.challenge, 8);
challenge        1347 nsswitch/wbinfo.c 			ok = SMBencrypt(pass, params.password.response.challenge,
challenge        1354 nsswitch/wbinfo.c 		SMBNTencrypt(pass, params.password.response.challenge,
challenge          82 source3/auth/auth.c 	DATA_BLOB challenge = data_blob_null;
challenge          87 source3/auth/auth.c 	if (auth_context->challenge.length) {
challenge          90 source3/auth/auth.c 		memcpy(chal, auth_context->challenge.data, 8);
challenge         114 source3/auth/auth.c 		challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx);
challenge         115 source3/auth/auth.c 		if (!challenge.length) {
challenge         120 source3/auth/auth.c 			auth_context->challenge = challenge;
challenge         131 source3/auth/auth.c 		auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, 
challenge         140 source3/auth/auth.c 	dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge         142 source3/auth/auth.c 	SMB_ASSERT(auth_context->challenge.length == 8);
challenge         146 source3/auth/auth.c 	memcpy(chal, auth_context->challenge.data, 8);
challenge         227 source3/auth/auth.c 	if (auth_context->challenge.length != 8) {
challenge         237 source3/auth/auth.c 	dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge         547 source3/auth/auth.c 	(*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
challenge         147 source3/auth/auth_builtin.c 	const char *challenge = "I am a teapot";   
challenge         148 source3/auth/auth_builtin.c 	return data_blob(challenge, 8);
challenge         415 source3/auth/auth_domain.c 					(uchar *)auth_context->challenge.data,
challenge         517 source3/auth/auth_domain.c 					(uchar *)auth_context->challenge.data,
challenge          88 source3/auth/auth_netlogond.c 		(uchar *)auth_context->challenge.data, /* 8 byte challenge. */
challenge          57 source3/auth/auth_ntlmssp.c static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge)
challenge          63 source3/auth/auth_ntlmssp.c 	SMB_ASSERT(challenge->length == 8);
challenge          65 source3/auth/auth_ntlmssp.c 	auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, 
challenge          66 source3/auth/auth_ntlmssp.c 						   challenge->data, challenge->length);
challenge          72 source3/auth/auth_ntlmssp.c 	dump_data(5, auth_context->challenge.data, auth_context->challenge.length);
challenge          58 source3/auth/auth_sam.c 	return ntlm_password_check(mem_ctx, &auth_context->challenge, 
challenge          82 source3/auth/auth_script.c 		slprintf(&hex_str[i*2], 3, "%02X", auth_context->challenge.data[i]);
challenge         303 source3/auth/auth_server.c 		if (memcmp(cli->secblob.data, auth_context->challenge.data, 8) != 0) {
challenge          83 source3/auth/auth_wbc.c 		memcpy(params.password.response.challenge,
challenge          84 source3/auth/auth_wbc.c 		    auth_context->challenge.data,
challenge          85 source3/auth/auth_wbc.c 		    sizeof(params.password.response.challenge));
challenge          69 source3/auth/auth_winbind.c 	memcpy(params.password.response.challenge,
challenge          70 source3/auth/auth_winbind.c 	       auth_context->challenge.data,
challenge          71 source3/auth/auth_winbind.c 	       sizeof(params.password.response.challenge));
challenge          83 source3/include/auth.h 	DATA_BLOB challenge; 
challenge         113 source3/include/ntlmssp.h 			      uint8_t challenge[8]);
challenge         137 source3/include/ntlmssp.h 	NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge);
challenge        3090 source3/include/proto.h 			     const DATA_BLOB *challenge,
challenge        5670 source3/include/proto.h 			   uint8_t challenge[8],
challenge         174 source3/libsmb/ntlm_check.c 			     const DATA_BLOB *challenge,
challenge         237 source3/libsmb/ntlm_check.c 	if (challenge->length == sizeof(zeros) && 
challenge         238 source3/libsmb/ntlm_check.c 	    (memcmp(challenge->data, zeros, challenge->length) == 0 )) {
challenge         294 source3/libsmb/ntlm_check.c 						  nt_pw, challenge, 
challenge         305 source3/libsmb/ntlm_check.c 						  nt_pw, challenge, 
challenge         316 source3/libsmb/ntlm_check.c 						  nt_pw, challenge, 
challenge         334 source3/libsmb/ntlm_check.c 						 nt_pw, challenge,
challenge         381 source3/libsmb/ntlm_check.c 					 lm_pw, challenge,
challenge         408 source3/libsmb/ntlm_check.c 				  nt_pw, challenge, 
challenge         419 source3/libsmb/ntlm_check.c 				  nt_pw, challenge, 
challenge         430 source3/libsmb/ntlm_check.c 				  nt_pw, challenge, 
challenge         444 source3/libsmb/ntlm_check.c 					 nt_pw, challenge,
challenge         136 source3/libsmb/ntlmssp.c static NTSTATUS set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge)
challenge         138 source3/libsmb/ntlmssp.c 	SMB_ASSERT(challenge->length == 8);
challenge         368 source3/rpc_client/init_netlogon.c 			   uint8_t challenge[8],
challenge         379 source3/rpc_client/init_netlogon.c 	memcpy(r->challenge, challenge, 8);
challenge         977 source3/rpc_server/srv_netlog_nt.c 						 logon->network->challenge);
challenge         339 source3/utils/ntlm_auth.c 				   const DATA_BLOB *challenge,
challenge         373 source3/utils/ntlm_auth.c 	memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8));
challenge        1743 source3/utils/ntlm_auth.c 	static DATA_BLOB challenge;
challenge        1771 source3/utils/ntlm_auth.c 		} else if (!challenge.data) {	
challenge        1807 source3/utils/ntlm_auth.c 							      &challenge, 
challenge        1848 source3/utils/ntlm_auth.c 		challenge = data_blob_null;
challenge        1892 source3/utils/ntlm_auth.c 		challenge = strhex_to_data_blob(NULL, parameter);
challenge        1893 source3/utils/ntlm_auth.c 		if (challenge.length != 8) {
challenge        1896 source3/utils/ntlm_auth.c 				  (int)challenge.length);
challenge        1897 source3/utils/ntlm_auth.c 			challenge = data_blob_null;
challenge          35 source3/utils/ntlm_auth_proto.h 				   const DATA_BLOB *challenge,
challenge         194 source3/winbindd/winbindd_ccache_access.c 	DATA_BLOB initial, challenge, auth;
challenge         254 source3/winbindd/winbindd_ccache_access.c 	challenge = data_blob(state->request.extra_data.data + initial_blob_len, 
challenge         257 source3/winbindd/winbindd_ccache_access.c 	if (!initial.data || !challenge.data) {
challenge         262 source3/winbindd/winbindd_ccache_access.c 						initial, challenge, &auth);
challenge         266 source3/winbindd/winbindd_ccache_access.c 	data_blob_free(&challenge);
challenge         136 source4/auth/auth.h 	NTSTATUS (*get_challenge)(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge);
challenge         172 source4/auth/auth.h 	} challenge;
challenge         152 source4/auth/credentials/credentials.h 					   DATA_BLOB challenge, DATA_BLOB target_info, 
challenge          45 source4/auth/credentials/credentials_ntlm.c 					   DATA_BLOB challenge, DATA_BLOB target_info, 
challenge         116 source4/auth/credentials/credentials_ntlm.c 					   nt_hash->hash, &challenge, 
challenge         135 source4/auth/credentials/credentials_ntlm.c 		memcpy(session_nonce, challenge.data, 8);
challenge         139 source4/auth/credentials/credentials_ntlm.c 		MD5Update(&md5_session_nonce_ctx, challenge.data, 8);
challenge         163 source4/auth/credentials/credentials_ntlm.c 		SMBOWFencrypt(nt_hash->hash, challenge.data,
challenge         179 source4/auth/credentials/credentials_ntlm.c 				if (!SMBencrypt(password,challenge.data,
challenge          33 source4/auth/ntlm/auth.c 	auth_ctx->challenge.set_by = talloc_strdup(auth_ctx, set_by);
challenge          34 source4/auth/ntlm/auth.c 	NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.set_by);
challenge          36 source4/auth/ntlm/auth.c 	auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
challenge          37 source4/auth/ntlm/auth.c 	NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data);
challenge          47 source4/auth/ntlm/auth.c 	return auth_ctx->challenge.may_be_modified;
challenge          59 source4/auth/ntlm/auth.c 	if (auth_ctx->challenge.data.length) {
challenge          61 source4/auth/ntlm/auth.c 			  auth_ctx->challenge.set_by));
challenge          62 source4/auth/ntlm/auth.c 		*_chal = auth_ctx->challenge.data.data;
challenge          67 source4/auth/ntlm/auth.c 		DATA_BLOB challenge = data_blob(NULL,0);
challenge          69 source4/auth/ntlm/auth.c 		nt_status = method->ops->get_challenge(method, auth_ctx, &challenge);
challenge          76 source4/auth/ntlm/auth.c 		if (challenge.length != 8) {
challenge          78 source4/auth/ntlm/auth.c 				(unsigned)challenge.length, method->ops->name));
challenge          82 source4/auth/ntlm/auth.c 		auth_ctx->challenge.data	= challenge;
challenge          83 source4/auth/ntlm/auth.c 		auth_ctx->challenge.set_by	= method->ops->name;
challenge          88 source4/auth/ntlm/auth.c 	if (!auth_ctx->challenge.set_by) {
challenge          92 source4/auth/ntlm/auth.c 		auth_ctx->challenge.data		= data_blob_talloc(auth_ctx, chal, 8);
challenge          93 source4/auth/ntlm/auth.c 		NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data);
challenge          94 source4/auth/ntlm/auth.c 		auth_ctx->challenge.set_by		= "random";
challenge          96 source4/auth/ntlm/auth.c 		auth_ctx->challenge.may_be_modified	= true;
challenge         100 source4/auth/ntlm/auth.c 		 auth_ctx->challenge.set_by));
challenge         102 source4/auth/ntlm/auth.c 	*_chal = auth_ctx->challenge.data.data;
challenge         259 source4/auth/ntlm/auth.c 	const uint8_t *challenge;
challenge         286 source4/auth/ntlm/auth.c 	nt_status = auth_get_challenge(auth_ctx, &challenge);
challenge         289 source4/auth/ntlm/auth.c 			(unsigned)auth_ctx->challenge.data.length, auth_ctx->challenge.set_by, nt_errstr(nt_status)));
challenge         293 source4/auth/ntlm/auth.c 	if (auth_ctx->challenge.set_by) {
challenge         295 source4/auth/ntlm/auth.c 					auth_ctx->challenge.set_by));
challenge         299 source4/auth/ntlm/auth.c 	dump_data(5, auth_ctx->challenge.data.data, auth_ctx->challenge.data.length);
challenge         411 source4/auth/ntlm/auth.c 	ctx->challenge.set_by		= NULL;
challenge         412 source4/auth/ntlm/auth.c 	ctx->challenge.may_be_modified	= false;
challenge         413 source4/auth/ntlm/auth.c 	ctx->challenge.data		= data_blob(NULL, 0);
challenge         157 source4/auth/ntlm/auth_developer.c 	const char *challenge = "I am a teapot";
challenge         159 source4/auth/ntlm/auth_developer.c 	blob = data_blob_talloc(mem_ctx, challenge, 8);
challenge          26 source4/auth/ntlm/auth_proto.h NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge);
challenge         201 source4/auth/ntlm/auth_sam.c 					     &auth_context->challenge.data, 
challenge          36 source4/auth/ntlm/auth_util.c NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge)
challenge         129 source4/auth/ntlm/auth_util.c 			const uint8_t *challenge;
challenge         141 source4/auth/ntlm/auth_util.c 			nt_status = auth_get_challenge(auth_context, &challenge);
challenge         146 source4/auth/ntlm/auth_util.c 			chall_blob = data_blob_talloc(mem_ctx, challenge, 8);
challenge         169 source4/auth/ntlm/auth_util.c 				SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data);
challenge         174 source4/auth/ntlm/auth_util.c 					SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data);
challenge         107 source4/auth/ntlm/auth_winbind.c 	memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal));
challenge         201 source4/auth/ntlm/auth_winbind.c 		const uint8_t *challenge;
challenge         211 source4/auth/ntlm/auth_winbind.c 		status = auth_get_challenge(ctx->auth_ctx, &challenge);
challenge         214 source4/auth/ntlm/auth_winbind.c 		memcpy(network_info->challenge, challenge, sizeof(network_info->challenge));
challenge         288 source4/auth/ntlm/ntlm_check.c 			     const DATA_BLOB *challenge,
challenge         312 source4/auth/ntlm/ntlm_check.c 	    && challenge->length == sizeof(zeros) 
challenge         313 source4/auth/ntlm/ntlm_check.c 	    && (memcmp(challenge->data, zeros, challenge->length) == 0 )) {
challenge         355 source4/auth/ntlm/ntlm_check.c 					 stored_nt->hash, challenge, 
challenge         370 source4/auth/ntlm/ntlm_check.c 					 stored_nt->hash, challenge, 
challenge         385 source4/auth/ntlm/ntlm_check.c 					 stored_nt->hash, challenge, 
challenge         406 source4/auth/ntlm/ntlm_check.c 						 stored_nt->hash, challenge,
challenge         452 source4/auth/ntlm/ntlm_check.c 					 stored_lanman->hash, challenge,
challenge         480 source4/auth/ntlm/ntlm_check.c 				 stored_nt->hash, challenge, 
challenge         492 source4/auth/ntlm/ntlm_check.c 					    stored_nt->hash, challenge, 
challenge         511 source4/auth/ntlm/ntlm_check.c 				 stored_nt->hash, challenge, 
challenge         523 source4/auth/ntlm/ntlm_check.c 					    stored_nt->hash, challenge, 
challenge         542 source4/auth/ntlm/ntlm_check.c 				 stored_nt->hash, challenge, 
challenge         554 source4/auth/ntlm/ntlm_check.c 					    stored_nt->hash, challenge, 
challenge         577 source4/auth/ntlm/ntlm_check.c 					 stored_nt->hash, challenge,
challenge          67 source4/auth/ntlm/ntlm_check.h 			     const DATA_BLOB *challenge,
challenge         143 source4/auth/ntlmssp/ntlmssp.h 	NTSTATUS (*set_challenge)(struct gensec_ntlmssp_state *, DATA_BLOB *challenge);
challenge         635 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS auth_ntlmssp_set_challenge(struct gensec_ntlmssp_state *gensec_ntlmssp_state, DATA_BLOB *challenge)
challenge         641 source4/auth/ntlmssp/ntlmssp_server.c 	if (challenge->length != 8) {
challenge         645 source4/auth/ntlmssp/ntlmssp_server.c 	chal = challenge->data;
challenge         292 source4/heimdal/kdc/kaserver.c 		     uint32_t challenge,
challenge         330 source4/heimdal/kdc/kaserver.c     krb5_store_int32 (sp, challenge);
challenge         557 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = auth_context_set_challenge(auth_context, r->in.logon->network->challenge, "netr_LogonSamLogonWithFlags");
challenge          37 source4/smb_server/smb/negprot.c 	const uint8_t *challenge;
challenge          57 source4/smb_server/smb/negprot.c 	nt_status = auth_get_challenge(smb_conn->negotiate.auth_context, &challenge);
challenge          63 source4/smb_server/smb/negprot.c 	memcpy(buff, challenge, 8);
challenge         608 source4/torture/rpc/netlogon.c 	generate_random_buffer(ninfo.challenge, 
challenge         609 source4/torture/rpc/netlogon.c 			       sizeof(ninfo.challenge));
challenge         610 source4/torture/rpc/netlogon.c 	chal = data_blob_const(ninfo.challenge, 
challenge         611 source4/torture/rpc/netlogon.c 			       sizeof(ninfo.challenge));
challenge        1102 source4/torture/rpc/samba3rpc.c 		memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge));
challenge         106 source4/torture/rpc/samlogon.c 	memcpy(ninfo.challenge, chall->data, 8);
challenge        2704 source4/torture/rpc/samr.c 	generate_random_buffer(ninfo.challenge,
challenge        2705 source4/torture/rpc/samr.c 			       sizeof(ninfo.challenge));
challenge        2706 source4/torture/rpc/samr.c 	chal = data_blob_const(ninfo.challenge,
challenge        2707 source4/torture/rpc/samr.c 			       sizeof(ninfo.challenge));
challenge          71 source4/torture/rpc/samsync.c 	generate_random_buffer(ninfo.challenge, 
challenge          72 source4/torture/rpc/samsync.c 			       sizeof(ninfo.challenge));
challenge          76 source4/torture/rpc/samsync.c 		SMBOWFencrypt(nt_hash->hash, ninfo.challenge, ninfo.nt.data);
challenge          85 source4/torture/rpc/samsync.c 		SMBOWFencrypt(lm_hash->hash, ninfo.challenge, ninfo.lm.data);
challenge          70 source4/torture/rpc/schannel.c 	generate_random_buffer(ninfo.challenge, 
challenge          71 source4/torture/rpc/schannel.c 			       sizeof(ninfo.challenge));
challenge          72 source4/torture/rpc/schannel.c 	chal = data_blob_const(ninfo.challenge, 
challenge          73 source4/torture/rpc/schannel.c 			       sizeof(ninfo.challenge));
challenge         591 source4/torture/rpc/schannel.c 	generate_random_buffer(conn->ninfo.challenge,
challenge         592 source4/torture/rpc/schannel.c 			       sizeof(conn->ninfo.challenge));
challenge         593 source4/torture/rpc/schannel.c 	chal = data_blob_const(conn->ninfo.challenge,
challenge         594 source4/torture/rpc/schannel.c 			       sizeof(conn->ninfo.challenge));
challenge         188 source4/utils/ntlm_auth.c 					 const DATA_BLOB *challenge, 
challenge         219 source4/utils/ntlm_auth.c 						challenge,
challenge         738 source4/utils/ntlm_auth.c 	static DATA_BLOB challenge;
challenge         766 source4/utils/ntlm_auth.c 		} else if (!challenge.data) {	
challenge         800 source4/utils/ntlm_auth.c 							      &challenge, 
challenge         843 source4/utils/ntlm_auth.c 		challenge = data_blob(NULL, 0);
challenge         887 source4/utils/ntlm_auth.c 		challenge = strhex_to_data_blob(NULL, parameter);
challenge         888 source4/utils/ntlm_auth.c 		if (challenge.length != 8) {
challenge         891 source4/utils/ntlm_auth.c 				  (int)challenge.length);
challenge         892 source4/utils/ntlm_auth.c 			challenge = data_blob(NULL, 0);
challenge          98 source4/winbind/wb_pam_auth.c 	SMB_ASSERT(chal.length == sizeof(ninfo->challenge));
challenge          99 source4/winbind/wb_pam_auth.c 	memcpy(ninfo->challenge, chal.data,
challenge         100 source4/winbind/wb_pam_auth.c 	       sizeof(ninfo->challenge));