/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/include/ |
H A D | ntdomain.h | 155 struct schannel_state *schannel_auth; member in union:pipe_auth_data::__anon8991
|
H A D | client.h | 58 struct schannel_state *schannel_auth; member in union:cli_pipe_auth_data::__anon8972
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/include/ |
H A D | ntdomain.h | 155 struct schannel_state *schannel_auth; member in union:pipe_auth_data::__anon8086
|
H A D | client.h | 58 struct schannel_state *schannel_auth; member in union:cli_pipe_auth_data::__anon8067
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/include/ |
H A D | ntdomain.h | 155 struct schannel_state *schannel_auth; member in union:pipe_auth_data::__anon43016
|
H A D | client.h | 58 struct schannel_state *schannel_auth; member in union:cli_pipe_auth_data::__anon42997
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/ |
H A D | client.h | 51 struct schannel_auth_struct *schannel_auth; member in union:cli_pipe_auth_data::__anon5977
|
H A D | ntdomain.h | 200 struct schannel_auth_struct *schannel_auth; member in union:pipe_auth_data::__anon6137
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/ |
H A D | client.h | 51 struct schannel_auth_struct *schannel_auth; member in union:cli_pipe_auth_data::__anon6882
|
H A D | ntdomain.h | 200 struct schannel_auth_struct *schannel_auth; member in union:pipe_auth_data::__anon7042
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/ |
H A D | client.h | 51 struct schannel_auth_struct *schannel_auth; member in union:cli_pipe_auth_data::__anon40907
|
H A D | ntdomain.h | 200 struct schannel_auth_struct *schannel_auth; member in union:pipe_auth_data::__anon41067
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_pipe.c | 418 schannel_encode(p->auth.a_u.schannel_auth, 429 p->auth.a_u.schannel_auth->seq_num++; 1337 p->auth.a_u.schannel_auth = TALLOC_P(p->pipe_state_mem_ctx, struct schannel_auth_struct); 1338 if (!p->auth.a_u.schannel_auth) { 1343 memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key)); 1344 memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key, 1349 p->auth.a_u.schannel_auth->seq_num = 0; 2110 if (!schannel_decode(p->auth.a_u.schannel_auth, 2130 p->auth.a_u.schannel_auth [all...] |
H A D | srv_netlog_nt.c | 1034 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1037 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16); 1052 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1055 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/rpc_server/ |
H A D | srv_pipe.c | 434 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 442 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 1431 p->auth.a_u.schannel_auth = talloc(p, struct schannel_state); 1432 if (!p->auth.a_u.schannel_auth) { 1437 p->auth.a_u.schannel_auth->state = SCHANNEL_STATE_START; 1438 p->auth.a_u.schannel_auth->seq_num = 0; 1439 p->auth.a_u.schannel_auth->initiator = false; 1440 p->auth.a_u.schannel_auth->creds = creds; 2258 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, 2266 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_pipe.c | 418 schannel_encode(p->auth.a_u.schannel_auth, 429 p->auth.a_u.schannel_auth->seq_num++; 1337 p->auth.a_u.schannel_auth = TALLOC_P(p->pipe_state_mem_ctx, struct schannel_auth_struct); 1338 if (!p->auth.a_u.schannel_auth) { 1343 memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key)); 1344 memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key, 1349 p->auth.a_u.schannel_auth->seq_num = 0; 2110 if (!schannel_decode(p->auth.a_u.schannel_auth, 2130 p->auth.a_u.schannel_auth [all...] |
H A D | srv_netlog_nt.c | 1034 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1037 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16); 1052 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1055 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/rpc_server/ |
H A D | srv_pipe.c | 434 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 442 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 1431 p->auth.a_u.schannel_auth = talloc(p, struct schannel_state); 1432 if (!p->auth.a_u.schannel_auth) { 1437 p->auth.a_u.schannel_auth->state = SCHANNEL_STATE_START; 1438 p->auth.a_u.schannel_auth->seq_num = 0; 1439 p->auth.a_u.schannel_auth->initiator = false; 1440 p->auth.a_u.schannel_auth->creds = creds; 2258 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, 2266 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/rpc_server/ |
H A D | srv_pipe.c | 434 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 442 status = netsec_outgoing_packet(p->auth.a_u.schannel_auth, 1431 p->auth.a_u.schannel_auth = talloc(p, struct schannel_state); 1432 if (!p->auth.a_u.schannel_auth) { 1437 p->auth.a_u.schannel_auth->state = SCHANNEL_STATE_START; 1438 p->auth.a_u.schannel_auth->seq_num = 0; 1439 p->auth.a_u.schannel_auth->initiator = false; 1440 p->auth.a_u.schannel_auth->creds = creds; 2258 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, 2266 status = netsec_incoming_packet(p->auth.a_u.schannel_auth, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_pipe.c | 418 schannel_encode(p->auth.a_u.schannel_auth, 429 p->auth.a_u.schannel_auth->seq_num++; 1337 p->auth.a_u.schannel_auth = TALLOC_P(p->pipe_state_mem_ctx, struct schannel_auth_struct); 1338 if (!p->auth.a_u.schannel_auth) { 1343 memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key)); 1344 memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key, 1349 p->auth.a_u.schannel_auth->seq_num = 0; 2110 if (!schannel_decode(p->auth.a_u.schannel_auth, 2130 p->auth.a_u.schannel_auth [all...] |
H A D | srv_netlog_nt.c | 1034 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1037 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16); 1052 if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL || p->auth.a_u.schannel_auth == NULL) { 1055 memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 346 struct schannel_auth_struct *schannel_auth = cli->auth.a_u.schannel_auth; local 358 if (!schannel_auth) { 395 if (!schannel_decode(schannel_auth, 411 schannel_auth->seq_num++; 1333 struct schannel_auth_struct *sas = cli->auth.a_u.schannel_auth; 2517 result->auth.a_u.schannel_auth = TALLOC_ZERO_P(result->mem_ctx, struct schannel_auth_struct); 2518 if (!result->auth.a_u.schannel_auth) { 2525 memcpy(result->auth.a_u.schannel_auth->sess_key, pdc->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 346 struct schannel_auth_struct *schannel_auth = cli->auth.a_u.schannel_auth; local 358 if (!schannel_auth) { 395 if (!schannel_decode(schannel_auth, 411 schannel_auth->seq_num++; 1333 struct schannel_auth_struct *sas = cli->auth.a_u.schannel_auth; 2517 result->auth.a_u.schannel_auth = TALLOC_ZERO_P(result->mem_ctx, struct schannel_auth_struct); 2518 if (!result->auth.a_u.schannel_auth) { 2525 memcpy(result->auth.a_u.schannel_auth->sess_key, pdc->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 346 struct schannel_auth_struct *schannel_auth = cli->auth.a_u.schannel_auth; local 358 if (!schannel_auth) { 395 if (!schannel_decode(schannel_auth, 411 schannel_auth->seq_num++; 1333 struct schannel_auth_struct *sas = cli->auth.a_u.schannel_auth; 2517 result->auth.a_u.schannel_auth = TALLOC_ZERO_P(result->mem_ctx, struct schannel_auth_struct); 2518 if (!result->auth.a_u.schannel_auth) { 2525 memcpy(result->auth.a_u.schannel_auth->sess_key, pdc->sess_key, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/rpc_client/ |
H A D | cli_pipe.c | 755 struct schannel_state *schannel_auth = local 756 cli->auth->a_u.schannel_auth; 772 if (!schannel_auth) { 813 status = netsec_incoming_packet(schannel_auth, 821 status = netsec_incoming_packet(schannel_auth, 2007 struct schannel_state *sas = cli->auth->a_u.schannel_auth; 3208 result->a_u.schannel_auth = talloc(result, struct schannel_state); 3209 if (result->a_u.schannel_auth == NULL) { 3213 result->a_u.schannel_auth->state = SCHANNEL_STATE_START; 3214 result->a_u.schannel_auth [all...] |