a_u 61 source3/include/client.h } a_u; a_u 198 source3/include/ntdomain.h } a_u; a_u 555 source3/rpc_client/cli_pipe.c NTLMSSP_STATE *ntlmssp_state = cli->auth->a_u.ntlmssp_state; a_u 678 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth; a_u 1480 source3/rpc_client/cli_pipe.c struct kerberos_auth_struct *a = cli->auth->a_u.kerberos_auth; a_u 1546 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, a_u 1592 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, a_u 1825 source3/rpc_client/cli_pipe.c if (!cli->auth->a_u.ntlmssp_state) { a_u 1846 source3/rpc_client/cli_pipe.c status = ntlmssp_seal_packet(cli->auth->a_u.ntlmssp_state, a_u 1860 source3/rpc_client/cli_pipe.c status = ntlmssp_sign_packet(cli->auth->a_u.ntlmssp_state, a_u 1903 source3/rpc_client/cli_pipe.c struct schannel_auth_struct *sas = cli->auth->a_u.schannel_auth; a_u 2733 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state, a_u 2829 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state, a_u 3002 source3/rpc_client/cli_pipe.c memcpy(nt_hash, rpc_cli->auth->a_u.ntlmssp_state->nt_hash, 16); a_u 3040 source3/rpc_client/cli_pipe.c ntlmssp_end(&auth->a_u.ntlmssp_state); a_u 3070 source3/rpc_client/cli_pipe.c status = ntlmssp_client_start(&result->a_u.ntlmssp_state); a_u 3077 source3/rpc_client/cli_pipe.c status = ntlmssp_set_username(result->a_u.ntlmssp_state, username); a_u 3082 source3/rpc_client/cli_pipe.c status = ntlmssp_set_domain(result->a_u.ntlmssp_state, domain); a_u 3087 source3/rpc_client/cli_pipe.c status = ntlmssp_set_password(result->a_u.ntlmssp_state, password); a_u 3095 source3/rpc_client/cli_pipe.c result->a_u.ntlmssp_state->neg_flags &= a_u 3099 source3/rpc_client/cli_pipe.c result->a_u.ntlmssp_state->neg_flags |= NTLMSSP_NEGOTIATE_SIGN; a_u 3101 source3/rpc_client/cli_pipe.c result->a_u.ntlmssp_state->neg_flags a_u 3134 source3/rpc_client/cli_pipe.c result->a_u.schannel_auth = talloc(result, a_u 3136 source3/rpc_client/cli_pipe.c if (result->a_u.schannel_auth == NULL) { a_u 3140 source3/rpc_client/cli_pipe.c memcpy(result->a_u.schannel_auth->sess_key, sess_key, a_u 3141 source3/rpc_client/cli_pipe.c sizeof(result->a_u.schannel_auth->sess_key)); a_u 3142 source3/rpc_client/cli_pipe.c result->a_u.schannel_auth->seq_num = 0; a_u 3194 source3/rpc_client/cli_pipe.c result->a_u.kerberos_auth = TALLOC_ZERO_P( a_u 3196 source3/rpc_client/cli_pipe.c if (result->a_u.kerberos_auth == NULL) { a_u 3199 source3/rpc_client/cli_pipe.c talloc_set_destructor(result->a_u.kerberos_auth, a_u 3202 source3/rpc_client/cli_pipe.c result->a_u.kerberos_auth->service_principal = talloc_strdup( a_u 3204 source3/rpc_client/cli_pipe.c if (result->a_u.kerberos_auth->service_principal == NULL) { a_u 4157 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth->sess_key, 16); a_u 4162 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.data, a_u 4163 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.length); a_u 4168 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.data, a_u 4169 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.length); a_u 1077 source3/rpc_server/srv_netlog_nt.c || (p->auth.a_u.schannel_auth == NULL)) { a_u 1080 source3/rpc_server/srv_netlog_nt.c memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16); a_u 39 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = auth->a_u.auth_ntlmssp_state; a_u 44 source3/rpc_server/srv_pipe.c auth->a_u.auth_ntlmssp_state = NULL; a_u 68 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; a_u 425 source3/rpc_server/srv_pipe.c schannel_encode(p->auth.a_u.schannel_auth, a_u 436 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++; a_u 610 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; a_u 770 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; a_u 1150 source3/rpc_server/srv_pipe.c if (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP && p->auth.a_u.auth_ntlmssp_state) { a_u 1200 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a; a_u 1219 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; a_u 1236 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; a_u 1313 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; a_u 1353 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth = talloc(p, struct schannel_auth_struct); a_u 1354 source3/rpc_server/srv_pipe.c if (!p->auth.a_u.schannel_auth) { a_u 1359 source3/rpc_server/srv_pipe.c memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key)); a_u 1360 source3/rpc_server/srv_pipe.c memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key, a_u 1365 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num = 0; a_u 1486 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a; a_u 1504 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; a_u 1996 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; a_u 2165 source3/rpc_server/srv_pipe.c if (!schannel_decode(p->auth.a_u.schannel_auth, a_u 2185 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++;