chal 419 nsswitch/libwbclient/wbc_pam.c memcpy(request.data.auth_crap.chal, chal 421 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth_crap.chal)); chal 852 nsswitch/wbinfo4.c generate_random_buffer(request.data.auth_crap.chal, 8); chal 868 nsswitch/wbinfo4.c server_chal = data_blob(request.data.auth_crap.chal, 8); chal 898 nsswitch/wbinfo4.c && SMBencrypt(pass, request.data.auth_crap.chal, chal 904 nsswitch/wbinfo4.c SMBNTencrypt(pass, request.data.auth_crap.chal, chal 256 nsswitch/winbind_struct_protocol.h uint8_t chal[8]; chal 80 source3/auth/auth.c uint8_t chal[8]) chal 90 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8); chal 146 source3/auth/auth.c memcpy(chal, auth_context->challenge.data, 8); chal 540 source3/auth/auth.c NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) chal 547 source3/auth/auth.c (*auth_context)->challenge = data_blob_talloc((*auth_context)->mem_ctx, chal, 8); chal 42 source3/auth/auth_compat.c uint8_t chal[8]; chal 49 source3/auth/auth_compat.c chal); chal 52 source3/auth/auth_compat.c smb_name, lp_workgroup(), chal, chal 255 source3/auth/auth_domain.c uchar chal[8], chal 311 source3/auth/auth_domain.c chal, /* 8 byte challenge. */ chal 31 source3/auth/auth_ntlmssp.c uint8_t chal[8]) chal 36 source3/auth/auth_ntlmssp.c auth_ntlmssp_state->auth_context, chal); chal 295 source3/auth/auth_util.c const uchar chal[8], chal 340 source3/auth/auth_util.c SMBOWFencrypt(lm_pwd, chal, chal 344 source3/auth/auth_util.c SMBOWFencrypt(nt_pwd, chal, chal 405 source3/auth/auth_util.c const uint8 chal[8], chal 431 source3/auth/auth_util.c (const uchar*)chal, local_lm_response); chal 96 source3/include/auth.h uint8_t chal[8]); chal 96 source3/include/ntlmssp.h DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ chal 33 source3/include/proto.h NTSTATUS make_auth_context_fixed(struct auth_context **auth_context, uchar chal[8]) ; chal 94 source3/include/proto.h const uchar chal[8], chal 101 source3/include/proto.h const uint8 chal[8], chal 5232 source3/include/proto.h const uint8 chal[8], chal 5243 source3/include/proto.h const uint8 chal[8], chal 114 source3/libsmb/ntlmssp.c uint8_t chal[8]) chal 116 source3/libsmb/ntlmssp.c generate_random_buffer(chal, 8); chal 363 source3/libsmb/ntlmssp.c data_blob_free(&(*ntlmssp_state)->chal); chal 562 source3/libsmb/ntlmssp.c ntlmssp_state->chal = data_blob_talloc(ntlmssp_state, cryptkey, 8); chal 771 source3/libsmb/ntlmssp.c ntlmssp_state->chal = data_blob_talloc( chal 778 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) { chal 1196 source3/libsmb/ntlmssp.c data_blob_free(&ntlmssp_state->chal); chal 1200 source3/libsmb/ntlmssp.c ntlmssp_state->chal = challenge_blob; chal 236 source3/rpc_client/cli_netlogon.c uint8 chal[8]; chal 250 source3/rpc_client/cli_netlogon.c generate_random_buffer(chal, 8); chal 252 source3/rpc_client/cli_netlogon.c SMBencrypt(password, chal, local_lm_response); chal 253 source3/rpc_client/cli_netlogon.c SMBNTencrypt(password, chal, local_nt_response); chal 268 source3/rpc_client/cli_netlogon.c chal, chal 318 source3/rpc_client/cli_netlogon.c const uint8 chal[8], chal 388 source3/rpc_client/cli_netlogon.c (uint8_t *) chal, chal 440 source3/rpc_client/cli_netlogon.c const uint8 chal[8], chal 506 source3/rpc_client/cli_netlogon.c (uint8_t *) chal, chal 1007 source3/rpc_server/srv_netlog_nt.c uint8_t chal[8]; chal 1013 source3/rpc_server/srv_netlog_nt.c auth_context->get_ntlm_challenge(auth_context, chal); chal 1019 source3/rpc_server/srv_netlog_nt.c chal, chal 1102 source3/rpc_server/srv_pipe.c DATA_BLOB chal; chal 1111 source3/rpc_server/srv_pipe.c ZERO_STRUCT(chal); chal 1168 source3/rpc_server/srv_pipe.c status = auth_ntlmssp_update(a, secblob, &chal); chal 1176 source3/rpc_server/srv_pipe.c response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP); chal 1206 source3/rpc_server/srv_pipe.c data_blob_free(&chal); chal 1216 source3/rpc_server/srv_pipe.c data_blob_free(&chal); chal 346 source3/smbd/negprot.c uint8 chal[8]; chal 349 source3/smbd/negprot.c get_challenge(chal); chal 351 source3/smbd/negprot.c &req->outbuf, data_blob_const(chal, sizeof(chal))); chal 446 source3/smbd/seal.c DATA_BLOB chal = data_blob_null; chal 454 source3/smbd/seal.c status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, secblob, &chal); chal 460 source3/smbd/seal.c response = spnego_gen_auth_response(&chal, status, OID_NTLMSSP); chal 461 source3/smbd/seal.c data_blob_free(&chal); chal 464 source3/smbd/seal.c response = chal; chal 147 source3/smbd/sesssetup.c unsigned char chal[8]; chal 149 source3/smbd/sesssetup.c ZERO_STRUCT(chal); chal 154 source3/smbd/sesssetup.c chal))) { chal 773 source3/smbd/sesssetup.c DATA_BLOB chal; chal 826 source3/smbd/sesssetup.c secblob, &chal); chal 831 source3/smbd/sesssetup.c &chal, status, OID_NTLMSSP, true); chal 833 source3/smbd/sesssetup.c data_blob_free(&chal); chal 1289 source3/smbd/sesssetup.c DATA_BLOB chal; chal 1303 source3/smbd/sesssetup.c blob1, &chal); chal 1309 source3/smbd/sesssetup.c &chal, status, OID_NTLMSSP, false); chal 1310 source3/smbd/sesssetup.c data_blob_free(&chal); chal 1691 source3/smbd/sesssetup.c uint8_t chal[8]; chal 1694 source3/smbd/sesssetup.c plaintext_auth_context, chal); chal 1697 source3/smbd/sesssetup.c user, domain, chal, chal 211 source3/utils/ntlm_auth.c static DATA_BLOB chal; chal 215 source3/utils/ntlm_auth.c chal = data_blob(NULL, 8); chal 217 source3/utils/ntlm_auth.c generate_random_buffer(chal.data, chal.length); chal 218 source3/utils/ntlm_auth.c return chal; chal 373 source3/utils/ntlm_auth.c memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8)); chal 533 source3/utils/ntlm_auth.c &ntlmssp_state->chal, chal 574 source3/utils/ntlm_auth.c &ntlmssp_state->chal, chal 1198 source3/winbindd/winbindd_pam.c const uint8 chal[8], chal 1209 source3/winbindd/winbindd_pam.c uchar chal[8]; chal 1232 source3/winbindd/winbindd_pam.c generate_random_buffer(chal, 8); chal 1238 source3/winbindd/winbindd_pam.c server_chal = data_blob_talloc(state->mem_ctx, chal, 8); chal 1269 source3/winbindd/winbindd_pam.c chal, chal 1278 source3/winbindd/winbindd_pam.c chal, chal 1353 source3/winbindd/winbindd_pam.c chal, chal 1927 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.chal, chal 195 source4/auth/auth.h NTSTATUS (*set_challenge)(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by); chal 281 source4/auth/auth.h NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by); chal 31 source4/auth/ntlm/auth.c _PUBLIC_ NTSTATUS auth_context_set_challenge(struct auth_context *auth_ctx, const uint8_t chal[8], const char *set_by) chal 36 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8); chal 89 source4/auth/ntlm/auth.c uint8_t chal[8]; chal 90 source4/auth/ntlm/auth.c generate_random_buffer(chal, 8); chal 92 source4/auth/ntlm/auth.c auth_ctx->challenge.data = data_blob_talloc(auth_ctx, chal, 8); chal 107 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.chal, ctx->auth_ctx->challenge.data.data, sizeof(request.data.auth_crap.chal)); chal 102 source4/auth/ntlmssp/ntlmssp.h DATA_BLOB chal; /* Random challenge as input into the actual NTLM (or NTLM2) authentication */ chal 277 source4/auth/ntlmssp/ntlmssp_client.c gensec_ntlmssp_state->chal = challenge_blob; chal 180 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, cryptkey, 8); chal 375 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, chal 384 source4/auth/ntlmssp/ntlmssp_server.c &gensec_ntlmssp_state->chal))) { chal 609 source4/auth/ntlmssp/ntlmssp_server.c const uint8_t *chal; chal 611 source4/auth/ntlmssp/ntlmssp_server.c status = gensec_ntlmssp_state->auth_context->get_challenge(gensec_ntlmssp_state->auth_context, &chal); chal 618 source4/auth/ntlmssp/ntlmssp_server.c return chal; chal 639 source4/auth/ntlmssp/ntlmssp_server.c const uint8_t *chal; chal 645 source4/auth/ntlmssp/ntlmssp_server.c chal = challenge->data; chal 648 source4/auth/ntlmssp/ntlmssp_server.c chal, chal 455 source4/heimdal/kdc/kaserver.c int32_t chal; chal 546 source4/heimdal/kdc/kaserver.c krb5_ret_int32 (reply_sp, &chal); chal 549 source4/heimdal/kdc/kaserver.c if (abs(chal - kdc_time) > context->max_skew) { chal 573 source4/heimdal/kdc/kaserver.c chal + 1, "tgsT", chal 593 source4/torture/rpc/netlogon.c DATA_BLOB names_blob, chal, lm_resp, nt_resp; chal 610 source4/torture/rpc/netlogon.c chal = data_blob_const(ninfo.challenge, chal 618 source4/torture/rpc/netlogon.c chal, chal 1056 source4/torture/rpc/samba3rpc.c DATA_BLOB chal, nt_resp, lm_resp, names_blob, session_key; chal 1070 source4/torture/rpc/samba3rpc.c chal = data_blob_talloc(mem_ctx, NULL, 8); chal 1071 source4/torture/rpc/samba3rpc.c if (chal.data == NULL) { chal 1076 source4/torture/rpc/samba3rpc.c generate_random_buffer(chal.data, chal.length); chal 1082 source4/torture/rpc/samba3rpc.c user_creds, mem_ctx, &flags, chal, names_blob, chal 1102 source4/torture/rpc/samba3rpc.c memcpy(ninfo.challenge, chal.data, sizeof(ninfo.challenge)); chal 2689 source4/torture/rpc/samr.c DATA_BLOB names_blob, chal, lm_resp, nt_resp; chal 2706 source4/torture/rpc/samr.c chal = data_blob_const(ninfo.challenge, chal 2714 source4/torture/rpc/samr.c chal, chal 55 source4/torture/rpc/schannel.c DATA_BLOB names_blob, chal, lm_resp, nt_resp; chal 72 source4/torture/rpc/schannel.c chal = data_blob_const(ninfo.challenge, chal 80 source4/torture/rpc/schannel.c chal, chal 563 source4/torture/rpc/schannel.c DATA_BLOB names_blob, chal, lm_resp, nt_resp; chal 593 source4/torture/rpc/schannel.c chal = data_blob_const(conn->ninfo.challenge, chal 602 source4/torture/rpc/schannel.c chal, chal 66 source4/winbind/wb_pam_auth.c DATA_BLOB chal, chal 98 source4/winbind/wb_pam_auth.c SMB_ASSERT(chal.length == sizeof(ninfo->challenge)); chal 99 source4/winbind/wb_pam_auth.c memcpy(ninfo->challenge, chal.data, chal 222 source4/winbind/wb_pam_auth.c DATA_BLOB chal, nt_resp, lm_resp, names_blob; chal 234 source4/winbind/wb_pam_auth.c chal = data_blob_talloc(mem_ctx, NULL, 8); chal 235 source4/winbind/wb_pam_auth.c if (!chal.data) { chal 238 source4/winbind/wb_pam_auth.c generate_random_buffer(chal.data, chal.length); chal 252 source4/winbind/wb_pam_auth.c credentials, mem_ctx, &flags, chal, names_blob, chal 260 source4/winbind/wb_pam_auth.c chal, nt_resp, lm_resp); chal 494 source4/winbind/wb_samba3_cmd.c DATA_BLOB chal, nt_resp, lm_resp; chal 498 source4/winbind/wb_samba3_cmd.c chal.data = s3call->request.data.auth_crap.chal; chal 499 source4/winbind/wb_samba3_cmd.c chal.length = sizeof(s3call->request.data.auth_crap.chal); chal 511 source4/winbind/wb_samba3_cmd.c chal, nt_resp, lm_resp);