ninfo 592 source4/torture/rpc/netlogon.c struct netr_NetworkInfo ninfo; ninfo 605 source4/torture/rpc/netlogon.c &ninfo.identity_info.account_name.string, ninfo 606 source4/torture/rpc/netlogon.c &ninfo.identity_info.domain_name.string); ninfo 608 source4/torture/rpc/netlogon.c generate_random_buffer(ninfo.challenge, ninfo 609 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge)); ninfo 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge, ninfo 611 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge)); ninfo 624 source4/torture/rpc/netlogon.c ninfo.lm.data = lm_resp.data; ninfo 625 source4/torture/rpc/netlogon.c ninfo.lm.length = lm_resp.length; ninfo 627 source4/torture/rpc/netlogon.c ninfo.nt.data = nt_resp.data; ninfo 628 source4/torture/rpc/netlogon.c ninfo.nt.length = nt_resp.length; ninfo 630 source4/torture/rpc/netlogon.c ninfo.identity_info.parameter_control = 0; ninfo 631 source4/torture/rpc/netlogon.c ninfo.identity_info.logon_id_low = 0; ninfo 632 source4/torture/rpc/netlogon.c ninfo.identity_info.logon_id_high = 0; ninfo 633 source4/torture/rpc/netlogon.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(credentials); ninfo 635 source4/torture/rpc/netlogon.c logon.network = &ninfo; ninfo 646 source4/torture/rpc/netlogon.c d_printf("Testing LogonSamLogon with name %s\n", ninfo.identity_info.account_name.string); ninfo 1059 source4/torture/rpc/samba3rpc.c struct netr_NetworkInfo ninfo; ninfo 1093 source4/torture/rpc/samba3rpc.c ninfo.identity_info.account_name.string = ninfo 1095 source4/torture/rpc/samba3rpc.c ninfo.identity_info.domain_name.string = ninfo 1097 source4/torture/rpc/samba3rpc.c ninfo.identity_info.parameter_control = 0; ninfo 1098 source4/torture/rpc/samba3rpc.c ninfo.identity_info.logon_id_low = 0; ninfo 1099 source4/torture/rpc/samba3rpc.c ninfo.identity_info.logon_id_high = 0; ninfo 1100 source4/torture/rpc/samba3rpc.c ninfo.identity_info.workstation.string = ninfo 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge)); ninfo 1103 source4/torture/rpc/samba3rpc.c ninfo.nt.length = nt_resp.length; ninfo 1104 source4/torture/rpc/samba3rpc.c ninfo.nt.data = nt_resp.data; ninfo 1105 source4/torture/rpc/samba3rpc.c ninfo.lm.length = lm_resp.length; ninfo 1106 source4/torture/rpc/samba3rpc.c ninfo.lm.data = lm_resp.data; ninfo 1108 source4/torture/rpc/samba3rpc.c logon.network = &ninfo; ninfo 1140 source4/torture/rpc/samba3rpc.c pinfo.identity_info = ninfo.identity_info; ninfo 91 source4/torture/rpc/samlogon.c struct netr_NetworkInfo ninfo; ninfo 95 source4/torture/rpc/samlogon.c samlogon_state->r.in.logon->network = &ninfo; ninfo 96 source4/torture/rpc/samlogon.c samlogon_state->r_ex.in.logon->network = &ninfo; ninfo 97 source4/torture/rpc/samlogon.c samlogon_state->r_flags.in.logon->network = &ninfo; ninfo 99 source4/torture/rpc/samlogon.c ninfo.identity_info.domain_name.string = samlogon_state->account_domain; ninfo 100 source4/torture/rpc/samlogon.c ninfo.identity_info.parameter_control = parameter_control; ninfo 101 source4/torture/rpc/samlogon.c ninfo.identity_info.logon_id_low = 0; ninfo 102 source4/torture/rpc/samlogon.c ninfo.identity_info.logon_id_high = 0; ninfo 103 source4/torture/rpc/samlogon.c ninfo.identity_info.account_name.string = samlogon_state->account_name; ninfo 104 source4/torture/rpc/samlogon.c ninfo.identity_info.workstation.string = TEST_MACHINE_NAME; ninfo 106 source4/torture/rpc/samlogon.c memcpy(ninfo.challenge, chall->data, 8); ninfo 138 source4/torture/rpc/samlogon.c ninfo.nt.data = nt_response->data; ninfo 139 source4/torture/rpc/samlogon.c ninfo.nt.length = nt_response->length; ninfo 141 source4/torture/rpc/samlogon.c ninfo.nt.data = NULL; ninfo 142 source4/torture/rpc/samlogon.c ninfo.nt.length = 0; ninfo 146 source4/torture/rpc/samlogon.c ninfo.lm.data = lm_response->data; ninfo 147 source4/torture/rpc/samlogon.c ninfo.lm.length = lm_response->length; ninfo 149 source4/torture/rpc/samlogon.c ninfo.lm.data = NULL; ninfo 150 source4/torture/rpc/samlogon.c ninfo.lm.length = 0; ninfo 2688 source4/torture/rpc/samr.c struct netr_NetworkInfo ninfo; ninfo 2701 source4/torture/rpc/samr.c &ninfo.identity_info.account_name.string, ninfo 2702 source4/torture/rpc/samr.c &ninfo.identity_info.domain_name.string); ninfo 2704 source4/torture/rpc/samr.c generate_random_buffer(ninfo.challenge, ninfo 2705 source4/torture/rpc/samr.c sizeof(ninfo.challenge)); ninfo 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge, ninfo 2707 source4/torture/rpc/samr.c sizeof(ninfo.challenge)); ninfo 2720 source4/torture/rpc/samr.c ninfo.lm.data = lm_resp.data; ninfo 2721 source4/torture/rpc/samr.c ninfo.lm.length = lm_resp.length; ninfo 2723 source4/torture/rpc/samr.c ninfo.nt.data = nt_resp.data; ninfo 2724 source4/torture/rpc/samr.c ninfo.nt.length = nt_resp.length; ninfo 2726 source4/torture/rpc/samr.c ninfo.identity_info.parameter_control = ninfo 2729 source4/torture/rpc/samr.c ninfo.identity_info.logon_id_low = 0; ninfo 2730 source4/torture/rpc/samr.c ninfo.identity_info.logon_id_high = 0; ninfo 2731 source4/torture/rpc/samr.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(machine_credentials); ninfo 2733 source4/torture/rpc/samr.c logon.network = &ninfo; ninfo 2744 source4/torture/rpc/samr.c d_printf("Testing LogonSamLogon with name %s\n", ninfo.identity_info.account_name.string); ninfo 60 source4/torture/rpc/samsync.c struct netr_NetworkInfo ninfo; ninfo 65 source4/torture/rpc/samsync.c ninfo.identity_info.domain_name.string = domain; ninfo 66 source4/torture/rpc/samsync.c ninfo.identity_info.parameter_control = 0; ninfo 67 source4/torture/rpc/samsync.c ninfo.identity_info.logon_id_low = 0; ninfo 68 source4/torture/rpc/samsync.c ninfo.identity_info.logon_id_high = 0; ninfo 69 source4/torture/rpc/samsync.c ninfo.identity_info.account_name.string = account_name; ninfo 70 source4/torture/rpc/samsync.c ninfo.identity_info.workstation.string = workstation; ninfo 71 source4/torture/rpc/samsync.c generate_random_buffer(ninfo.challenge, ninfo 72 source4/torture/rpc/samsync.c sizeof(ninfo.challenge)); ninfo 74 source4/torture/rpc/samsync.c ninfo.nt.length = 24; ninfo 75 source4/torture/rpc/samsync.c ninfo.nt.data = talloc_array(mem_ctx, uint8_t, 24); ninfo 76 source4/torture/rpc/samsync.c SMBOWFencrypt(nt_hash->hash, ninfo.challenge, ninfo.nt.data); ninfo 78 source4/torture/rpc/samsync.c ninfo.nt.length = 0; ninfo 79 source4/torture/rpc/samsync.c ninfo.nt.data = NULL; ninfo 83 source4/torture/rpc/samsync.c ninfo.lm.length = 24; ninfo 84 source4/torture/rpc/samsync.c ninfo.lm.data = talloc_array(mem_ctx, uint8_t, 24); ninfo 85 source4/torture/rpc/samsync.c SMBOWFencrypt(lm_hash->hash, ninfo.challenge, ninfo.lm.data); ninfo 87 source4/torture/rpc/samsync.c ninfo.lm.length = 0; ninfo 88 source4/torture/rpc/samsync.c ninfo.lm.data = NULL; ninfo 91 source4/torture/rpc/samsync.c logon.network = &ninfo; ninfo 50 source4/torture/rpc/schannel.c struct netr_NetworkInfo ninfo; ninfo 67 source4/torture/rpc/schannel.c &ninfo.identity_info.account_name.string, ninfo 68 source4/torture/rpc/schannel.c &ninfo.identity_info.domain_name.string); ninfo 70 source4/torture/rpc/schannel.c generate_random_buffer(ninfo.challenge, ninfo 71 source4/torture/rpc/schannel.c sizeof(ninfo.challenge)); ninfo 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge, ninfo 73 source4/torture/rpc/schannel.c sizeof(ninfo.challenge)); ninfo 87 source4/torture/rpc/schannel.c ninfo.lm.data = lm_resp.data; ninfo 88 source4/torture/rpc/schannel.c ninfo.lm.length = lm_resp.length; ninfo 90 source4/torture/rpc/schannel.c ninfo.nt.data = nt_resp.data; ninfo 91 source4/torture/rpc/schannel.c ninfo.nt.length = nt_resp.length; ninfo 93 source4/torture/rpc/schannel.c ninfo.identity_info.parameter_control = 0; ninfo 94 source4/torture/rpc/schannel.c ninfo.identity_info.logon_id_low = 0; ninfo 95 source4/torture/rpc/schannel.c ninfo.identity_info.logon_id_high = 0; ninfo 96 source4/torture/rpc/schannel.c ninfo.identity_info.workstation.string = cli_credentials_get_workstation(credentials); ninfo 98 source4/torture/rpc/schannel.c logon.network = &ninfo; ninfo 111 source4/torture/rpc/schannel.c ninfo.identity_info.account_name.string); ninfo 517 source4/torture/rpc/schannel.c struct netr_NetworkInfo ninfo; ninfo 584 source4/torture/rpc/schannel.c ZERO_STRUCT(conn->ninfo); ninfo 588 source4/torture/rpc/schannel.c &conn->ninfo.identity_info.account_name.string, ninfo 589 source4/torture/rpc/schannel.c &conn->ninfo.identity_info.domain_name.string); ninfo 591 source4/torture/rpc/schannel.c generate_random_buffer(conn->ninfo.challenge, ninfo 592 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge)); ninfo 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge, ninfo 594 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge)); ninfo 609 source4/torture/rpc/schannel.c conn->ninfo.lm.data = lm_resp.data; ninfo 610 source4/torture/rpc/schannel.c conn->ninfo.lm.length = lm_resp.length; ninfo 612 source4/torture/rpc/schannel.c conn->ninfo.nt.data = nt_resp.data; ninfo 613 source4/torture/rpc/schannel.c conn->ninfo.nt.length = nt_resp.length; ninfo 615 source4/torture/rpc/schannel.c conn->ninfo.identity_info.parameter_control = 0; ninfo 616 source4/torture/rpc/schannel.c conn->ninfo.identity_info.logon_id_low = 0; ninfo 617 source4/torture/rpc/schannel.c conn->ninfo.identity_info.logon_id_high = 0; ninfo 618 source4/torture/rpc/schannel.c conn->ninfo.identity_info.workstation.string = cli_credentials_get_workstation(conn->wks_creds); ninfo 624 source4/torture/rpc/schannel.c conn->r.in.logon->network = &conn->ninfo; ninfo 43 source4/winbind/wb_pam_auth.c struct netr_NetworkInfo ninfo; ninfo 72 source4/winbind/wb_pam_auth.c struct netr_NetworkInfo *ninfo; ninfo 88 source4/winbind/wb_pam_auth.c ninfo = state->req->in.logon.network = talloc(state, struct netr_NetworkInfo); ninfo 89 source4/winbind/wb_pam_auth.c if (ninfo == NULL) goto failed; ninfo 91 source4/winbind/wb_pam_auth.c ninfo->identity_info.account_name.string = talloc_strdup(state, user); ninfo 92 source4/winbind/wb_pam_auth.c ninfo->identity_info.domain_name.string = talloc_strdup(state, domain); ninfo 93 source4/winbind/wb_pam_auth.c ninfo->identity_info.parameter_control = logon_parameters; ninfo 94 source4/winbind/wb_pam_auth.c ninfo->identity_info.logon_id_low = 0; ninfo 95 source4/winbind/wb_pam_auth.c ninfo->identity_info.logon_id_high = 0; ninfo 96 source4/winbind/wb_pam_auth.c ninfo->identity_info.workstation.string = talloc_strdup(state, workstation); ninfo 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge)); ninfo 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data, ninfo 100 source4/winbind/wb_pam_auth.c sizeof(ninfo->challenge)); ninfo 102 source4/winbind/wb_pam_auth.c tmp_nt_resp = data_blob_talloc(ninfo, nt_resp.data, nt_resp.length); ninfo 106 source4/winbind/wb_pam_auth.c tmp_lm_resp = data_blob_talloc(ninfo, lm_resp.data, lm_resp.length); ninfo 110 source4/winbind/wb_pam_auth.c ninfo->nt.length = tmp_nt_resp.length; ninfo 111 source4/winbind/wb_pam_auth.c ninfo->nt.data = tmp_nt_resp.data; ninfo 112 source4/winbind/wb_pam_auth.c ninfo->lm.length = tmp_lm_resp.length; ninfo 113 source4/winbind/wb_pam_auth.c ninfo->lm.data = tmp_lm_resp.data;