Searched refs:nt_response (Results 1 - 10 of 10) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dntlm_check.c33 static BOOL smb_pwd_check_ntlmv1(const DATA_BLOB *nt_response, argument
53 if (nt_response->length != 24) {
55 (unsigned long)nt_response->length));
70 dump_data(100, (const char *)nt_response->data, nt_response->length);
76 return (memcmp(p24, nt_response->data, 24) == 0);
162 * @param nt_response 'unicode' NT response to the challenge, or unicode password
176 const DATA_BLOB *nt_response,
241 if (nt_pw && nt_response->length) {
243 mdfour(pwhash, nt_response
173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument
[all...]
H A Dsmbencrypt.c438 DATA_BLOB *lm_response, DATA_BLOB *nt_response,
451 if (nt_response) {
452 *nt_response = NTLMv2_generate_response(ntlm_v2_hash, server_chal,
458 /* use only the first 16 bytes of nt_response for session key */
459 SMBsesskeygen_ntv2(ntlm_v2_hash, nt_response->data, user_session_key->data);
477 DATA_BLOB *lm_response, DATA_BLOB *nt_response,
486 lm_response, nt_response,
435 SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument
474 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument
H A Dcliconnect.c303 DATA_BLOB nt_response = data_blob(NULL, 0); local
324 &lm_response, &nt_response, &session_key)) {
337 nt_response = data_blob(NULL, 0);
339 nt_response = data_blob(NULL, 24);
340 SMBNTencrypt(pass,cli->secblob.data,nt_response.data);
349 lm_response = data_blob(nt_response.data, nt_response.length);
353 lm_response = data_blob(nt_response.data, nt_response.length);
367 cli_simple_set_signing(cli, session_key, nt_response);
[all...]
H A Dntlmssp.c1029 DATA_BLOB nt_response = data_blob(NULL, 0); local
1118 &lm_response, &nt_response, &session_key)) {
1145 nt_response = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 24);
1148 nt_response.data);
1163 nt_response = data_blob_talloc(ntlmssp_state->mem_ctx, NULL, 24);
1165 nt_response.data);
1203 nt_response.data, nt_response.length,
1221 ntlmssp_state->nt_resp = nt_response;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dntlm_auth_diagnostics.c54 DATA_BLOB nt_response = data_blob(NULL, 24); local
73 SMBNTencrypt(opt_password,chall.data,nt_response.data);
85 nt_response.data[0]++;
91 data_blob_free(&nt_response);
99 &nt_response,
177 DATA_BLOB nt_response = data_blob(NULL, 24); local
190 SMBNTencrypt(opt_password,chall.data,nt_response.data);
197 &nt_response,
204 data_blob_free(&nt_response);
243 DATA_BLOB nt_response local
445 DATA_BLOB nt_response = data_blob(NULL, 0); local
[all...]
H A Dntlm_auth.c311 const DATA_BLOB *nt_response,
352 if (nt_response && nt_response->length) {
354 nt_response->data,
355 MIN(nt_response->length, sizeof(request.data.auth_crap.nt_resp)));
356 request.data.auth_crap.nt_resp_len = nt_response->length;
1651 static DATA_BLOB nt_response; local
1675 } else if (!lm_response.data && !nt_response.data) {
1715 &nt_response,
1755 nt_response
306 contact_winbind_auth_crap(const char *username, const char *domain, const char *workstation, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, uint32 flags, uint8 lm_key[8], uint8 user_session_key[16], char **error_string, char **unix_name) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c249 const u_char *nt_response,
375 sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]);
550 u_char *nt_response = NULL; local
561 nt_response = &response[MS_CHAP_NTRESP];
582 nt_response, nt_response_size,
241 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwbinfo.c882 DATA_BLOB nt_response; local
891 &lm_response, &nt_response, NULL)) {
899 memcpy(request.data.auth_crap.nt_resp, nt_response.data,
900 MIN(nt_response.length,
902 request.data.auth_crap.nt_resp_len = nt_response.length;
909 data_blob_free(&nt_response);
H A Dwinbindd_pam.c1140 DATA_BLOB nt_response; local
1154 &lm_response, &nt_response, NULL)) {
1165 nt_resp = data_blob_talloc(state->mem_ctx, nt_response.data,
1166 nt_response.length);
1168 data_blob_free(&nt_response);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/
H A Dcli_netlogon.c930 DATA_BLOB nt_response,
979 lm_response.data, lm_response.length, nt_response.data, nt_response.length);
921 rpccli_netlogon_sam_network_logon(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 logon_parameters, const char *server, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument

Completed in 244 milliseconds