challenge 489 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->challenge, 8)); challenge 511 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->challenge, 8)); challenge 533 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "challenge", r->challenge, 8); challenge 83 librpc/gen_ndr/netlogon.h uint8_t challenge[8]; challenge 420 nsswitch/libwbclient/wbc_pam.c params->password.response.challenge, challenge 217 nsswitch/libwbclient/wbclient.h uint8_t challenge[8]; challenge 1321 nsswitch/wbinfo.c generate_random_buffer(params.password.response.challenge, 8); challenge 1327 nsswitch/wbinfo.c server_chal = data_blob(params.password.response.challenge, 8); challenge 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge, challenge 1354 nsswitch/wbinfo.c SMBNTencrypt(pass, params.password.response.challenge, challenge 82 source3/auth/auth.c DATA_BLOB challenge = data_blob_null; challenge 87 source3/auth/auth.c if (auth_context->challenge.length) { challenge 90 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8); challenge 114 source3/auth/auth.c challenge = auth_method->get_chal(auth_context, &auth_method->private_data, mem_ctx); challenge 115 source3/auth/auth.c if (!challenge.length) { challenge 120 source3/auth/auth.c auth_context->challenge = challenge; challenge 131 source3/auth/auth.c auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, challenge 140 source3/auth/auth.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length); challenge 142 source3/auth/auth.c SMB_ASSERT(auth_context->challenge.length == 8); challenge 146 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8); challenge 227 source3/auth/auth.c if (auth_context->challenge.length != 8) { challenge 237 source3/auth/auth.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length); challenge 547 source3/auth/auth.c (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8); challenge 147 source3/auth/auth_builtin.c const char *challenge = "I am a teapot"; challenge 148 source3/auth/auth_builtin.c return data_blob(challenge, 8); challenge 415 source3/auth/auth_domain.c (uchar *)auth_context->challenge.data, challenge 517 source3/auth/auth_domain.c (uchar *)auth_context->challenge.data, challenge 88 source3/auth/auth_netlogond.c (uchar *)auth_context->challenge.data, /* 8 byte challenge. */ challenge 57 source3/auth/auth_ntlmssp.c static NTSTATUS auth_ntlmssp_set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) challenge 63 source3/auth/auth_ntlmssp.c SMB_ASSERT(challenge->length == 8); challenge 65 source3/auth/auth_ntlmssp.c auth_context->challenge = data_blob_talloc(auth_context->mem_ctx, challenge 66 source3/auth/auth_ntlmssp.c challenge->data, challenge->length); challenge 72 source3/auth/auth_ntlmssp.c dump_data(5, auth_context->challenge.data, auth_context->challenge.length); challenge 58 source3/auth/auth_sam.c return ntlm_password_check(mem_ctx, &auth_context->challenge, challenge 82 source3/auth/auth_script.c slprintf(&hex_str[i*2], 3, "%02X", auth_context->challenge.data[i]); challenge 303 source3/auth/auth_server.c if (memcmp(cli->secblob.data, auth_context->challenge.data, 8) != 0) { challenge 83 source3/auth/auth_wbc.c memcpy(params.password.response.challenge, challenge 84 source3/auth/auth_wbc.c auth_context->challenge.data, challenge 85 source3/auth/auth_wbc.c sizeof(params.password.response.challenge)); challenge 69 source3/auth/auth_winbind.c memcpy(params.password.response.challenge, challenge 70 source3/auth/auth_winbind.c auth_context->challenge.data, challenge 71 source3/auth/auth_winbind.c sizeof(params.password.response.challenge)); challenge 83 source3/include/auth.h DATA_BLOB challenge; challenge 113 source3/include/ntlmssp.h uint8_t challenge[8]); challenge 137 source3/include/ntlmssp.h NTSTATUS (*set_challenge)(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge); challenge 3090 source3/include/proto.h const DATA_BLOB *challenge, challenge 5670 source3/include/proto.h uint8_t challenge[8], challenge 174 source3/libsmb/ntlm_check.c const DATA_BLOB *challenge, challenge 237 source3/libsmb/ntlm_check.c if (challenge->length == sizeof(zeros) && challenge 238 source3/libsmb/ntlm_check.c (memcmp(challenge->data, zeros, challenge->length) == 0 )) { challenge 294 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 305 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 316 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 334 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 381 source3/libsmb/ntlm_check.c lm_pw, challenge, challenge 408 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 419 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 430 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 444 source3/libsmb/ntlm_check.c nt_pw, challenge, challenge 136 source3/libsmb/ntlmssp.c static NTSTATUS set_challenge(struct ntlmssp_state *ntlmssp_state, DATA_BLOB *challenge) challenge 138 source3/libsmb/ntlmssp.c SMB_ASSERT(challenge->length == 8); challenge 368 source3/rpc_client/init_netlogon.c uint8_t challenge[8], challenge 379 source3/rpc_client/init_netlogon.c memcpy(r->challenge, challenge, 8); challenge 977 source3/rpc_server/srv_netlog_nt.c logon->network->challenge); challenge 339 source3/utils/ntlm_auth.c const DATA_BLOB *challenge, challenge 373 source3/utils/ntlm_auth.c memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8)); challenge 1743 source3/utils/ntlm_auth.c static DATA_BLOB challenge; challenge 1771 source3/utils/ntlm_auth.c } else if (!challenge.data) { challenge 1807 source3/utils/ntlm_auth.c &challenge, challenge 1848 source3/utils/ntlm_auth.c challenge = data_blob_null; challenge 1892 source3/utils/ntlm_auth.c challenge = strhex_to_data_blob(NULL, parameter); challenge 1893 source3/utils/ntlm_auth.c if (challenge.length != 8) { challenge 1896 source3/utils/ntlm_auth.c (int)challenge.length); challenge 1897 source3/utils/ntlm_auth.c challenge = data_blob_null; challenge 35 source3/utils/ntlm_auth_proto.h const DATA_BLOB *challenge, challenge 194 source3/winbindd/winbindd_ccache_access.c DATA_BLOB initial, challenge, auth; challenge 254 source3/winbindd/winbindd_ccache_access.c challenge = data_blob(state->request.extra_data.data + initial_blob_len, challenge 257 source3/winbindd/winbindd_ccache_access.c if (!initial.data || !challenge.data) { challenge 262 source3/winbindd/winbindd_ccache_access.c initial, challenge, &auth); challenge 266 source3/winbindd/winbindd_ccache_access.c data_blob_free(&challenge); challenge 136 source4/auth/auth.h NTSTATUS (*get_challenge)(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge); challenge 172 source4/auth/auth.h } challenge; challenge 152 source4/auth/credentials/credentials.h DATA_BLOB challenge, DATA_BLOB target_info, challenge 45 source4/auth/credentials/credentials_ntlm.c DATA_BLOB challenge, DATA_BLOB target_info, challenge 116 source4/auth/credentials/credentials_ntlm.c nt_hash->hash, &challenge, challenge 135 source4/auth/credentials/credentials_ntlm.c memcpy(session_nonce, challenge.data, 8); challenge 139 source4/auth/credentials/credentials_ntlm.c MD5Update(&md5_session_nonce_ctx, challenge.data, 8); challenge 163 source4/auth/credentials/credentials_ntlm.c SMBOWFencrypt(nt_hash->hash, challenge.data, challenge 179 source4/auth/credentials/credentials_ntlm.c if (!SMBencrypt(password,challenge.data, challenge 33 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = talloc_strdup(auth_ctx, set_by); challenge 34 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.set_by); challenge 36 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8); challenge 37 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data); challenge 47 source4/auth/ntlm/auth.c return auth_ctx->challenge.may_be_modified; challenge 59 source4/auth/ntlm/auth.c if (auth_ctx->challenge.data.length) { challenge 61 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by)); challenge 62 source4/auth/ntlm/auth.c *_chal = auth_ctx->challenge.data.data; challenge 67 source4/auth/ntlm/auth.c DATA_BLOB challenge = data_blob(NULL,0); challenge 69 source4/auth/ntlm/auth.c nt_status = method->ops->get_challenge(method, auth_ctx, &challenge); challenge 76 source4/auth/ntlm/auth.c if (challenge.length != 8) { challenge 78 source4/auth/ntlm/auth.c (unsigned)challenge.length, method->ops->name)); challenge 82 source4/auth/ntlm/auth.c auth_ctx->challenge.data = challenge; challenge 83 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = method->ops->name; challenge 88 source4/auth/ntlm/auth.c if (!auth_ctx->challenge.set_by) { challenge 92 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8); challenge 93 source4/auth/ntlm/auth.c NT_STATUS_HAVE_NO_MEMORY(auth_ctx->challenge.data.data); challenge 94 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by = "random"; challenge 96 source4/auth/ntlm/auth.c auth_ctx->challenge.may_be_modified = true; challenge 100 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by)); challenge 102 source4/auth/ntlm/auth.c *_chal = auth_ctx->challenge.data.data; challenge 259 source4/auth/ntlm/auth.c const uint8_t *challenge; challenge 286 source4/auth/ntlm/auth.c nt_status = auth_get_challenge(auth_ctx, &challenge); challenge 289 source4/auth/ntlm/auth.c (unsigned)auth_ctx->challenge.data.length, auth_ctx->challenge.set_by, nt_errstr(nt_status))); challenge 293 source4/auth/ntlm/auth.c if (auth_ctx->challenge.set_by) { challenge 295 source4/auth/ntlm/auth.c auth_ctx->challenge.set_by)); challenge 299 source4/auth/ntlm/auth.c dump_data(5, auth_ctx->challenge.data.data, auth_ctx->challenge.data.length); challenge 411 source4/auth/ntlm/auth.c ctx->challenge.set_by = NULL; challenge 412 source4/auth/ntlm/auth.c ctx->challenge.may_be_modified = false; challenge 413 source4/auth/ntlm/auth.c ctx->challenge.data = data_blob(NULL, 0); challenge 157 source4/auth/ntlm/auth_developer.c const char *challenge = "I am a teapot"; challenge 159 source4/auth/ntlm/auth_developer.c blob = data_blob_talloc(mem_ctx, challenge, 8); challenge 26 source4/auth/ntlm/auth_proto.h NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge); challenge 201 source4/auth/ntlm/auth_sam.c &auth_context->challenge.data, challenge 36 source4/auth/ntlm/auth_util.c NTSTATUS auth_get_challenge_not_implemented(struct auth_method_context *ctx, TALLOC_CTX *mem_ctx, DATA_BLOB *challenge) challenge 129 source4/auth/ntlm/auth_util.c const uint8_t *challenge; challenge 141 source4/auth/ntlm/auth_util.c nt_status = auth_get_challenge(auth_context, &challenge); challenge 146 source4/auth/ntlm/auth_util.c chall_blob = data_blob_talloc(mem_ctx, challenge, 8); challenge 169 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data); challenge 174 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data); challenge 107 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal)); challenge 201 source4/auth/ntlm/auth_winbind.c const uint8_t *challenge; challenge 211 source4/auth/ntlm/auth_winbind.c status = auth_get_challenge(ctx->auth_ctx, &challenge); challenge 214 source4/auth/ntlm/auth_winbind.c memcpy(network_info->challenge, challenge, sizeof(network_info->challenge)); challenge 288 source4/auth/ntlm/ntlm_check.c const DATA_BLOB *challenge, challenge 312 source4/auth/ntlm/ntlm_check.c && challenge->length == sizeof(zeros) challenge 313 source4/auth/ntlm/ntlm_check.c && (memcmp(challenge->data, zeros, challenge->length) == 0 )) { challenge 355 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 370 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 385 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 406 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 452 source4/auth/ntlm/ntlm_check.c stored_lanman->hash, challenge, challenge 480 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 492 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 511 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 523 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 542 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 554 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 577 source4/auth/ntlm/ntlm_check.c stored_nt->hash, challenge, challenge 67 source4/auth/ntlm/ntlm_check.h const DATA_BLOB *challenge, challenge 143 source4/auth/ntlmssp/ntlmssp.h NTSTATUS (*set_challenge)(struct gensec_ntlmssp_state *, DATA_BLOB *challenge); challenge 635 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS auth_ntlmssp_set_challenge(struct gensec_ntlmssp_state *gensec_ntlmssp_state, DATA_BLOB *challenge) challenge 641 source4/auth/ntlmssp/ntlmssp_server.c if (challenge->length != 8) { challenge 645 source4/auth/ntlmssp/ntlmssp_server.c chal = challenge->data; challenge 292 source4/heimdal/kdc/kaserver.c uint32_t challenge, challenge 330 source4/heimdal/kdc/kaserver.c krb5_store_int32 (sp, challenge); challenge 557 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_context_set_challenge(auth_context, r->in.logon->network->challenge, "netr_LogonSamLogonWithFlags"); challenge 37 source4/smb_server/smb/negprot.c const uint8_t *challenge; challenge 57 source4/smb_server/smb/negprot.c nt_status = auth_get_challenge(smb_conn->negotiate.auth_context, &challenge); challenge 63 source4/smb_server/smb/negprot.c memcpy(buff, challenge, 8); challenge 608 source4/torture/rpc/netlogon.c generate_random_buffer(ninfo.challenge, challenge 609 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge)); challenge 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge, challenge 611 source4/torture/rpc/netlogon.c sizeof(ninfo.challenge)); challenge 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge)); challenge 106 source4/torture/rpc/samlogon.c memcpy(ninfo.challenge, chall->data, 8); challenge 2704 source4/torture/rpc/samr.c generate_random_buffer(ninfo.challenge, challenge 2705 source4/torture/rpc/samr.c sizeof(ninfo.challenge)); challenge 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge, challenge 2707 source4/torture/rpc/samr.c sizeof(ninfo.challenge)); challenge 71 source4/torture/rpc/samsync.c generate_random_buffer(ninfo.challenge, challenge 72 source4/torture/rpc/samsync.c sizeof(ninfo.challenge)); challenge 76 source4/torture/rpc/samsync.c SMBOWFencrypt(nt_hash->hash, ninfo.challenge, ninfo.nt.data); challenge 85 source4/torture/rpc/samsync.c SMBOWFencrypt(lm_hash->hash, ninfo.challenge, ninfo.lm.data); challenge 70 source4/torture/rpc/schannel.c generate_random_buffer(ninfo.challenge, challenge 71 source4/torture/rpc/schannel.c sizeof(ninfo.challenge)); challenge 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge, challenge 73 source4/torture/rpc/schannel.c sizeof(ninfo.challenge)); challenge 591 source4/torture/rpc/schannel.c generate_random_buffer(conn->ninfo.challenge, challenge 592 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge)); challenge 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge, challenge 594 source4/torture/rpc/schannel.c sizeof(conn->ninfo.challenge)); challenge 188 source4/utils/ntlm_auth.c const DATA_BLOB *challenge, challenge 219 source4/utils/ntlm_auth.c challenge, challenge 738 source4/utils/ntlm_auth.c static DATA_BLOB challenge; challenge 766 source4/utils/ntlm_auth.c } else if (!challenge.data) { challenge 800 source4/utils/ntlm_auth.c &challenge, challenge 843 source4/utils/ntlm_auth.c challenge = data_blob(NULL, 0); challenge 887 source4/utils/ntlm_auth.c challenge = strhex_to_data_blob(NULL, parameter); challenge 888 source4/utils/ntlm_auth.c if (challenge.length != 8) { challenge 891 source4/utils/ntlm_auth.c (int)challenge.length); challenge 892 source4/utils/ntlm_auth.c challenge = data_blob(NULL, 0); challenge 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge)); challenge 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data, challenge 100 source4/winbind/wb_pam_auth.c sizeof(ninfo->challenge));