chal              419 nsswitch/libwbclient/wbc_pam.c 		memcpy(request.data.auth_crap.chal,
chal              421 nsswitch/libwbclient/wbc_pam.c 		       sizeof(request.data.auth_crap.chal));
chal              852 nsswitch/wbinfo4.c 	generate_random_buffer(request.data.auth_crap.chal, 8);
chal              868 nsswitch/wbinfo4.c 		server_chal = data_blob(request.data.auth_crap.chal, 8);
chal              898 nsswitch/wbinfo4.c 		    && SMBencrypt(pass, request.data.auth_crap.chal,
chal              904 nsswitch/wbinfo4.c 		SMBNTencrypt(pass, request.data.auth_crap.chal,
chal              256 nsswitch/winbind_struct_protocol.h                         uint8_t chal[8];
chal               80 source3/auth/auth.c 			       uint8_t chal[8])
chal               90 source3/auth/auth.c 		memcpy(chal, auth_context->challenge.data, 8);
chal              146 source3/auth/auth.c 	memcpy(chal, auth_context->challenge.data, 8);
chal              540 source3/auth/auth.c NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) 
chal              547 source3/auth/auth.c 	(*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8);
chal               42 source3/auth/auth_compat.c 	uint8_t chal[8];
chal               49 source3/auth/auth_compat.c 						   chal);
chal               52 source3/auth/auth_compat.c 				      smb_name, lp_workgroup(), chal,
chal              255 source3/auth/auth_domain.c 					uchar chal[8],
chal              311 source3/auth/auth_domain.c 						      chal,                       /* 8 byte challenge. */
chal               31 source3/auth/auth_ntlmssp.c 				       uint8_t chal[8])
chal               36 source3/auth/auth_ntlmssp.c 		auth_ntlmssp_state->auth_context, chal);
chal              295 source3/auth/auth_util.c 					 const uchar chal[8], 
chal              340 source3/auth/auth_util.c 		SMBOWFencrypt(lm_pwd, chal,
chal              344 source3/auth/auth_util.c 		SMBOWFencrypt(nt_pwd, chal,
chal              405 source3/auth/auth_util.c 			      const uint8 chal[8],
chal              431 source3/auth/auth_util.c 			    (const uchar*)chal, local_lm_response);
chal               96 source3/include/auth.h 				   uint8_t chal[8]);
chal               96 source3/include/ntlmssp.h 	DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
chal               33 source3/include/proto.h NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) ;
chal               94 source3/include/proto.h 					 const uchar chal[8], 
chal              101 source3/include/proto.h 			      const uint8 chal[8],
chal             5232 source3/include/proto.h 					   const uint8 chal[8],
chal             5243 source3/include/proto.h 					      const uint8 chal[8],
chal              114 source3/libsmb/ntlmssp.c 			  uint8_t chal[8])
chal              116 source3/libsmb/ntlmssp.c 	generate_random_buffer(chal, 8);
chal              363 source3/libsmb/ntlmssp.c 		data_blob_free(&(*ntlmssp_state)->chal);
chal              562 source3/libsmb/ntlmssp.c 	ntlmssp_state->chal = data_blob_talloc(ntlmssp_state, cryptkey, 8);
chal              771 source3/libsmb/ntlmssp.c 			ntlmssp_state->chal = data_blob_talloc(
chal              778 source3/libsmb/ntlmssp.c 			if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) {
chal             1196 source3/libsmb/ntlmssp.c 	data_blob_free(&ntlmssp_state->chal);
chal             1200 source3/libsmb/ntlmssp.c 	ntlmssp_state->chal = challenge_blob;
chal              236 source3/rpc_client/cli_netlogon.c 		uint8 chal[8];
chal              250 source3/rpc_client/cli_netlogon.c 		generate_random_buffer(chal, 8);
chal              252 source3/rpc_client/cli_netlogon.c 		SMBencrypt(password, chal, local_lm_response);
chal              253 source3/rpc_client/cli_netlogon.c 		SMBNTencrypt(password, chal, local_nt_response);
chal              268 source3/rpc_client/cli_netlogon.c 				      chal,
chal              318 source3/rpc_client/cli_netlogon.c 					   const uint8 chal[8],
chal              388 source3/rpc_client/cli_netlogon.c 			      (uint8_t *) chal,
chal              440 source3/rpc_client/cli_netlogon.c 					      const uint8 chal[8],
chal              506 source3/rpc_client/cli_netlogon.c 			      (uint8_t *) chal,
chal             1007 source3/rpc_server/srv_netlog_nt.c 		uint8_t chal[8];
chal             1013 source3/rpc_server/srv_netlog_nt.c 		auth_context->get_ntlm_challenge(auth_context, chal);
chal             1019 source3/rpc_server/srv_netlog_nt.c 							 chal,
chal             1102 source3/rpc_server/srv_pipe.c 	DATA_BLOB chal;
chal             1111 source3/rpc_server/srv_pipe.c 	ZERO_STRUCT(chal);
chal             1168 source3/rpc_server/srv_pipe.c 		status = auth_ntlmssp_update(a, secblob, &chal);
chal             1176 source3/rpc_server/srv_pipe.c 		response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP);
chal             1206 source3/rpc_server/srv_pipe.c 	data_blob_free(&chal);
chal             1216 source3/rpc_server/srv_pipe.c 	data_blob_free(&chal);
chal              346 source3/smbd/negprot.c 			uint8 chal[8];
chal              349 source3/smbd/negprot.c 			get_challenge(chal);
chal              351 source3/smbd/negprot.c 				&req->outbuf, data_blob_const(chal, sizeof(chal)));
chal              446 source3/smbd/seal.c 	DATA_BLOB chal = data_blob_null;
chal              454 source3/smbd/seal.c 	status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, secblob, &chal);
chal              460 source3/smbd/seal.c 		response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP);
chal              461 source3/smbd/seal.c 		data_blob_free(&chal);
chal              464 source3/smbd/seal.c 		response = chal;
chal              147 source3/smbd/sesssetup.c 	unsigned char chal[8];
chal              149 source3/smbd/sesssetup.c 	ZERO_STRUCT(chal);
chal              154 source3/smbd/sesssetup.c 					chal))) {
chal              773 source3/smbd/sesssetup.c 	DATA_BLOB chal;
chal              826 source3/smbd/sesssetup.c 					secblob, &chal);
chal              831 source3/smbd/sesssetup.c 			     &chal, status, OID_NTLMSSP, true);
chal              833 source3/smbd/sesssetup.c 	data_blob_free(&chal);
chal             1289 source3/smbd/sesssetup.c 		DATA_BLOB chal;
chal             1303 source3/smbd/sesssetup.c 						blob1, &chal);
chal             1309 source3/smbd/sesssetup.c 				     &chal, status, OID_NTLMSSP, false);
chal             1310 source3/smbd/sesssetup.c 		data_blob_free(&chal);
chal             1691 source3/smbd/sesssetup.c 			uint8_t chal[8];
chal             1694 source3/smbd/sesssetup.c 					plaintext_auth_context, chal);
chal             1697 source3/smbd/sesssetup.c 						      user, domain, chal,
chal              211 source3/utils/ntlm_auth.c 	static DATA_BLOB chal;
chal              215 source3/utils/ntlm_auth.c 	chal = data_blob(NULL, 8);
chal              217 source3/utils/ntlm_auth.c 	generate_random_buffer(chal.data, chal.length);
chal              218 source3/utils/ntlm_auth.c 	return chal;
chal              373 source3/utils/ntlm_auth.c 	memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8));
chal              533 source3/utils/ntlm_auth.c 					      &ntlmssp_state->chal,
chal              574 source3/utils/ntlm_auth.c 					&ntlmssp_state->chal,
chal             1198 source3/winbindd/winbindd_pam.c 				  const uint8 chal[8],
chal             1209 source3/winbindd/winbindd_pam.c 	uchar chal[8];
chal             1232 source3/winbindd/winbindd_pam.c 	generate_random_buffer(chal, 8);
chal             1238 source3/winbindd/winbindd_pam.c 		server_chal = data_blob_talloc(state->mem_ctx, chal, 8);
chal             1269 source3/winbindd/winbindd_pam.c 				  chal,
chal             1278 source3/winbindd/winbindd_pam.c 			     chal,
chal             1353 source3/winbindd/winbindd_pam.c 				  chal,
chal             1927 source3/winbindd/winbindd_pam.c 				  state->request.data.auth_crap.chal,
chal              195 source4/auth/auth.h 	NTSTATUS (*set_challenge)(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by);
chal              281 source4/auth/auth.h NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by);
chal               31 source4/auth/ntlm/auth.c _PUBLIC_ NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by) 
chal               36 source4/auth/ntlm/auth.c 	auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8);
chal               89 source4/auth/ntlm/auth.c 		uint8_t chal[8];
chal               90 source4/auth/ntlm/auth.c 		generate_random_buffer(chal, 8);
chal               92 source4/auth/ntlm/auth.c 		auth_ctx->challenge.data		= data_blob_talloc(auth_ctx, chal, 8);
chal              107 source4/auth/ntlm/auth_winbind.c 	memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal));
chal              102 source4/auth/ntlmssp/ntlmssp.h 	DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */
chal              277 source4/auth/ntlmssp/ntlmssp_client.c 	gensec_ntlmssp_state->chal = challenge_blob;
chal              180 source4/auth/ntlmssp/ntlmssp_server.c 	gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, cryptkey, 8);
chal              375 source4/auth/ntlmssp/ntlmssp_server.c 			gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, 
chal              384 source4/auth/ntlmssp/ntlmssp_server.c 										 &gensec_ntlmssp_state->chal))) {
chal              609 source4/auth/ntlmssp/ntlmssp_server.c 	const uint8_t *chal;
chal              611 source4/auth/ntlmssp/ntlmssp_server.c 	status = gensec_ntlmssp_state->auth_context->get_challenge(gensec_ntlmssp_state->auth_context, &chal);
chal              618 source4/auth/ntlmssp/ntlmssp_server.c 	return chal;
chal              639 source4/auth/ntlmssp/ntlmssp_server.c 	const uint8_t *chal;
chal              645 source4/auth/ntlmssp/ntlmssp_server.c 	chal = challenge->data;
chal              648 source4/auth/ntlmssp/ntlmssp_server.c 								      chal, 
chal              455 source4/heimdal/kdc/kaserver.c     int32_t chal;
chal              546 source4/heimdal/kdc/kaserver.c     krb5_ret_int32 (reply_sp, &chal);
chal              549 source4/heimdal/kdc/kaserver.c     if (abs(chal - kdc_time) > context->max_skew) {
chal              573 source4/heimdal/kdc/kaserver.c 			 chal + 1, "tgsT",
chal              593 source4/torture/rpc/netlogon.c 	DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal              610 source4/torture/rpc/netlogon.c 	chal = data_blob_const(ninfo.challenge, 
chal              618 source4/torture/rpc/netlogon.c 						   chal,
chal             1056 source4/torture/rpc/samba3rpc.c 		DATA_BLOB chal, nt_resp, lm_resp, names_blob, session_key;
chal             1070 source4/torture/rpc/samba3rpc.c 		chal = data_blob_talloc(mem_ctx, NULL, 8);
chal             1071 source4/torture/rpc/samba3rpc.c 		if (chal.data == NULL) {
chal             1076 source4/torture/rpc/samba3rpc.c 		generate_random_buffer(chal.data, chal.length);
chal             1082 source4/torture/rpc/samba3rpc.c 			user_creds, mem_ctx, &flags, chal, names_blob,
chal             1102 source4/torture/rpc/samba3rpc.c 		memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge));
chal             2689 source4/torture/rpc/samr.c 	DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal             2706 source4/torture/rpc/samr.c 	chal = data_blob_const(ninfo.challenge,
chal             2714 source4/torture/rpc/samr.c 						   chal,
chal               55 source4/torture/rpc/schannel.c 	DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal               72 source4/torture/rpc/schannel.c 	chal = data_blob_const(ninfo.challenge, 
chal               80 source4/torture/rpc/schannel.c 						   chal,
chal              563 source4/torture/rpc/schannel.c 	DATA_BLOB names_blob, chal, lm_resp, nt_resp;
chal              593 source4/torture/rpc/schannel.c 	chal = data_blob_const(conn->ninfo.challenge,
chal              602 source4/torture/rpc/schannel.c 						   chal,
chal               66 source4/winbind/wb_pam_auth.c 						    DATA_BLOB chal,
chal               98 source4/winbind/wb_pam_auth.c 	SMB_ASSERT(chal.length == sizeof(ninfo->challenge));
chal               99 source4/winbind/wb_pam_auth.c 	memcpy(ninfo->challenge, chal.data,
chal              222 source4/winbind/wb_pam_auth.c 	DATA_BLOB chal, nt_resp, lm_resp, names_blob;
chal              234 source4/winbind/wb_pam_auth.c 	chal = data_blob_talloc(mem_ctx, NULL, 8);
chal              235 source4/winbind/wb_pam_auth.c 	if (!chal.data) {
chal              238 source4/winbind/wb_pam_auth.c 	generate_random_buffer(chal.data, chal.length);
chal              252 source4/winbind/wb_pam_auth.c 		credentials, mem_ctx, &flags, chal, names_blob,
chal              260 source4/winbind/wb_pam_auth.c 					 chal, nt_resp, lm_resp);
chal              494 source4/winbind/wb_samba3_cmd.c 	DATA_BLOB chal, nt_resp, lm_resp;
chal              498 source4/winbind/wb_samba3_cmd.c 	chal.data       = s3call->request.data.auth_crap.chal;
chal              499 source4/winbind/wb_samba3_cmd.c 	chal.length     = sizeof(s3call->request.data.auth_crap.chal);
chal              511 source4/winbind/wb_samba3_cmd.c 		chal, nt_resp, lm_resp);