Lines Matching refs:netr_info

83 	netr_info_t *netr_info;
87 netr_info = &netr_global_info;
88 bzero(netr_info, sizeof (netr_info_t));
90 netr_info->flags |= flags;
92 rc = smb_getnetbiosname(netr_info->hostname, NETBIOS_NAME_SZ);
96 (void) snprintf(netr_info->server, sizeof (netr_info->server),
101 (void) memcpy(&netr_info->client_challenge, leout_rc,
104 if ((rc = netr_server_req_challenge(netr_handle, netr_info)) == 0) {
105 rc = netr_server_authenticate2(netr_handle, netr_info);
108 netr_info->flags |= NETR_FLG_VALID;
154 netr_server_req_challenge(mlsvc_handle_t *netr_handle, netr_info_t *netr_info)
162 arg.servername = (unsigned char *)netr_info->server;
163 arg.hostname = (unsigned char *)netr_info->hostname;
165 (void) memcpy(&arg.client_challenge, &netr_info->client_challenge,
177 (void) memcpy(&netr_info->server_challenge, &arg.server_challenge,
188 netr_server_authenticate2(mlsvc_handle_t *netr_handle, netr_info_t *netr_info)
199 netr_info->hostname);
202 netr_info->server, account_name, netr_info->hostname);
204 arg.servername = (unsigned char *)netr_info->server;
207 arg.hostname = (unsigned char *)netr_info->hostname;
212 if (netr_gen_skey128(netr_info) != SMBAUTH_SUCCESS)
215 if (netr_gen_skey64(netr_info) != SMBAUTH_SUCCESS)
219 if (netr_gen_credentials(netr_info->session_key.key,
220 &netr_info->client_challenge, 0,
221 &netr_info->client_credential) != SMBAUTH_SUCCESS) {
225 if (netr_gen_credentials(netr_info->session_key.key,
226 &netr_info->server_challenge, 0,
227 &netr_info->server_credential) != SMBAUTH_SUCCESS) {
231 (void) memcpy(&arg.client_credential, &netr_info->client_credential,
243 rc = memcmp(&netr_info->server_credential, &arg.server_credential,
257 netr_gen_skey128(netr_info_t *netr_info)
270 * We should check (netr_info->flags & NETR_FLG_INIT) and use
274 bzero(netr_info->password, sizeof (netr_info->password));
276 (char *)netr_info->password, sizeof (netr_info->password));
278 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') {
282 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash);
306 (CK_BYTE_PTR)netr_info->client_challenge.data, NETR_CRED_DATA_SZ);
311 (CK_BYTE_PTR)netr_info->server_challenge.data, NETR_CRED_DATA_SZ);
320 netr_info->session_key.key);
322 netr_info->session_key.len = NETR_SESSKEY128_SZ;
360 netr_gen_skey64(netr_info_t *netr_info)
370 client_challenge = (DWORD *)(uintptr_t)&netr_info->client_challenge;
371 server_challenge = (DWORD *)(uintptr_t)&netr_info->server_challenge;
375 * We should check (netr_info->flags & NETR_FLG_INIT) and use
379 bzero(netr_info->password, sizeof (netr_info->password));
381 (char *)netr_info->password, sizeof (netr_info->password));
383 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') {
387 rc = smb_auth_ntlm_hash((char *)netr_info->password, md4hash);
402 netr_info->session_key.len = NETR_SESSKEY64_SZ;
403 rc = smb_auth_DES(netr_info->session_key.key,
404 netr_info->session_key.len, &md4hash[9], NETR_DESKEY_LEN, buffer,
478 netr_server_password_set(mlsvc_handle_t *netr_handle, netr_info_t *netr_info)
489 netr_info->hostname);
491 arg.servername = (unsigned char *)netr_info->server;
494 arg.hostname = (unsigned char *)netr_info->hostname;
499 if (netr_setup_authenticator(netr_info, &arg.auth, 0) !=
507 if (netr_gen_password(netr_info->session_key.key,
508 netr_info->password, new_password) == SMBAUTH_FAILURE) {
534 if (netr_validate_chain(netr_info, &arg.auth) == 0) {
538 (void) memcpy(netr_info->password, new_password,