/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | ntlm_check.c | 33 static BOOL smb_pwd_check_ntlmv1(const DATA_BLOB *nt_response, argument 53 if (nt_response->length != 24) { 55 (unsigned long)nt_response->length)); 70 dump_data(100, (const char *)nt_response->data, nt_response->length); 76 return (memcmp(p24, nt_response->data, 24) == 0); 162 * @param nt_response 'unicode' NT response to the challenge, or unicode password 176 const DATA_BLOB *nt_response, 241 if (nt_pw && nt_response->length) { 243 mdfour(pwhash, nt_response 173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument [all...] |
H A D | smbencrypt.c | 438 DATA_BLOB *lm_response, DATA_BLOB *nt_response, 451 if (nt_response) { 452 *nt_response = NTLMv2_generate_response(ntlm_v2_hash, server_chal, 458 /* use only the first 16 bytes of nt_response for session key */ 459 SMBsesskeygen_ntv2(ntlm_v2_hash, nt_response->data, user_session_key->data); 477 DATA_BLOB *lm_response, DATA_BLOB *nt_response, 486 lm_response, nt_response, 435 SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument 474 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument
|
H A D | cliconnect.c | 303 DATA_BLOB nt_response = data_blob(NULL, 0); local 324 &lm_response, &nt_response, &session_key)) { 337 nt_response = data_blob(NULL, 0); 339 nt_response = data_blob(NULL, 24); 340 SMBNTencrypt(pass,cli->secblob.data,nt_response.data); 349 lm_response = data_blob(nt_response.data, nt_response.length); 353 lm_response = data_blob(nt_response.data, nt_response.length); 367 cli_simple_set_signing(cli, session_key, nt_response); [all...] |
H A D | ntlmssp.c | 1029 DATA_BLOB nt_response = data_blob(NULL, 0); local 1118 &lm_response, &nt_response, &session_key)) { 1145 nt_response = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 24); 1148 nt_response.data); 1163 nt_response = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 24); 1165 nt_response.data); 1203 nt_response.data, nt_response.length, 1221 ntlmssp_state->nt_resp = nt_response;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth_diagnostics.c | 54 DATA_BLOB nt_response = data_blob(NULL, 24); local 73 SMBNTencrypt(opt_password,chall.data,nt_response.data); 85 nt_response.data[0]++; 91 data_blob_free(&nt_response); 99 &nt_response, 177 DATA_BLOB nt_response = data_blob(NULL, 24); local 190 SMBNTencrypt(opt_password,chall.data,nt_response.data); 197 &nt_response, 204 data_blob_free(&nt_response); 243 DATA_BLOB nt_response local 445 DATA_BLOB nt_response = data_blob(NULL, 0); local [all...] |
H A D | ntlm_auth.c | 311 const DATA_BLOB *nt_response, 352 if (nt_response && nt_response->length) { 354 nt_response->data, 355 MIN(nt_response->length, sizeof(request.data.auth_crap.nt_resp))); 356 request.data.auth_crap.nt_resp_len = nt_response->length; 1651 static DATA_BLOB nt_response; local 1675 } else if (!lm_response.data && !nt_response.data) { 1715 &nt_response, 1755 nt_response 306 contact_winbind_auth_crap(const char *username, const char *domain, const char *workstation, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, uint32 flags, uint8 lm_key[8], uint8 user_session_key[16], char **error_string, char **unix_name) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 249 const u_char *nt_response, 375 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); 550 u_char *nt_response = NULL; local 561 nt_response = &response[MS_CHAP_NTRESP]; 582 nt_response, nt_response_size, 241 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | wbinfo.c | 882 DATA_BLOB nt_response; local 891 &lm_response, &nt_response, NULL)) { 899 memcpy(request.data.auth_crap.nt_resp, nt_response.data, 900 MIN(nt_response.length, 902 request.data.auth_crap.nt_resp_len = nt_response.length; 909 data_blob_free(&nt_response);
|
H A D | winbindd_pam.c | 1140 DATA_BLOB nt_response; local 1154 &lm_response, &nt_response, NULL)) { 1165 nt_resp = data_blob_talloc(state->mem_ctx, nt_response.data, 1166 nt_response.length); 1168 data_blob_free(&nt_response);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_netlogon.c | 930 DATA_BLOB nt_response, 979 lm_response.data, lm_response.length, nt_response.data, nt_response.length); 921 rpccli_netlogon_sam_network_logon(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 logon_parameters, const char *server, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
|