/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_winbind.c | 102 request.data.auth_crap.nt_resp_len = MIN(user_info->nt_resp.length, 103 sizeof(request.data.auth_crap.nt_resp)); 107 memcpy(request.data.auth_crap.nt_resp, user_info->nt_resp.data,
|
H A D | auth_server.c | 271 if((user_info->nt_resp.length == sizeof(badpass)) && 272 !memcmp(badpass, user_info->nt_resp.data, sizeof(badpass))) { 360 (char *)user_info->nt_resp.data, 361 user_info->nt_resp.length,
|
H A D | auth_ntlmssp.c | 100 auth_ntlmssp_state->ntlmssp_state->nt_resp.data ? &auth_ntlmssp_state->ntlmssp_state->nt_resp : NULL,
|
H A D | auth.c | 239 user_info->lm_resp.length, user_info->nt_resp.length)); 243 dump_data(100, user_info->nt_resp.data, user_info->nt_resp.length);
|
H A D | auth_domain.c | 187 user_info->nt_resp, &info3);
|
H A D | auth_util.c | 189 (*user_info)->nt_resp = data_blob(nt_pwd->data, nt_pwd->length); 444 DATA_BLOB lm_resp, DATA_BLOB nt_resp) 450 nt_resp.data ? &nt_resp : NULL, 1391 data_blob_free(&(*user_info)->nt_resp); 441 make_user_info_for_reply_enc(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, DATA_BLOB lm_resp, DATA_BLOB nt_resp) argument
|
H A D | auth_sam.c | 60 &user_info->lm_resp, &user_info->nt_resp,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbindd_pam.c | 164 DATA_BLOB nt_resp; local 222 nt_resp = data_blob_talloc(mem_ctx, nt_response.data, nt_response.length); 241 nt_resp = data_blob_talloc(mem_ctx, 297 lm_resp, nt_resp, 437 DATA_BLOB lm_resp, nt_resp; local 486 || state->request.data.auth_crap.nt_resp_len > sizeof(state->request.data.auth_crap.nt_resp)) { 495 nt_resp = data_blob_talloc(mem_ctx, state->request.data.auth_crap.nt_resp, state->request.data.auth_crap.nt_resp_len); 547 lm_resp, nt_resp,
|
H A D | winbindd_nss.h | 181 fstring nt_resp; member in struct:winbindd_request::__anon1703::__anon1705
|
H A D | wbinfo.c | 599 memcpy(request.data.auth_crap.nt_resp, nt_response.data, 601 sizeof(request.data.auth_crap.nt_resp))); 621 (uchar *)request.data.auth_crap.nt_resp);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | auth.h | 34 DATA_BLOB nt_resp; member in struct:auth_usersupplied_info
|
H A D | ntlmssp.h | 91 DATA_BLOB nt_resp; member in struct:ntlmssp_state
|
H A D | rpc_dce.h | 346 fstring nt_resp; member in struct:rpc_auth_ntlmssp_resp_info
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | ntlmssp.c | 284 data_blob_free(&(*ntlmssp_state)->nt_resp); 532 data_blob_free(&ntlmssp_state->nt_resp); 543 &ntlmssp_state->nt_resp, 567 &ntlmssp_state->nt_resp, 635 ntlmssp_state->user, ntlmssp_state->domain, ntlmssp_state->workstation, (unsigned long)ntlmssp_state->lm_resp.length, (unsigned long)ntlmssp_state->nt_resp.length)); 638 file_save("nthash1.dat", &ntlmssp_state->nt_resp.data, &ntlmssp_state->nt_resp.length); 648 if (ntlmssp_state->nt_resp.length == 24 && ntlmssp_state->lm_resp.length == 24) { 1079 ntlmssp_state->nt_resp = nt_response;
|
H A D | smbencrypt.c | 281 const uchar * nt_resp, uint8 sess_key[16]) 288 hmac_md5_update(nt_resp, 16, &ctx); 298 const uchar * nt_resp, uint8 sess_key[16]) 280 SMBsesskeygen_ntv2(const uchar kr[16], const uchar * nt_resp, uint8 sess_key[16]) argument 297 SMBsesskeygen_ntv1(const uchar kr[16], const uchar * nt_resp, uint8 sess_key[16]) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | sesssetup.c | 673 DATA_BLOB nt_resp; local 700 ZERO_STRUCT(nt_resp); 801 nt_resp = data_blob(p+passlen1, passlen2); 899 data_blob_free(&nt_resp); 918 lm_resp, nt_resp); 953 data_blob_free(&nt_resp); 984 sess_vuid = register_vuid(server_info, session_key, nt_resp.data ? nt_resp : lm_resp, sub_user); 985 data_blob_free(&nt_resp);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_parse/ |
H A D | parse_rpc.c | 878 uchar lm_resp[24], uchar nt_resp[24], 887 int nt_len = (nt_resp != NULL) ? 24 : 0; 894 DEBUG(100,("nt_resp\n")); 895 dump_data(100, (char *)nt_resp, 24); 929 memcpy(rsp->nt_resp, nt_resp, 24); 1023 if(!prs_uint8s(False, "nt_resp ", ps, depth, (uint8*)rsp->nt_resp, 1024 MIN(rsp->hdr_nt_resp.str_str_len, sizeof(rsp->nt_resp )))) 1075 if(!prs_uint8s(False, "nt_resp ", p 877 init_rpc_auth_ntlmssp_resp(RPC_AUTH_NTLMSSP_RESP *rsp, uchar lm_resp[24], uchar nt_resp[24], const char *domain, const char *user, const char *wks, uint32 neg_flags) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_winbind.c | 445 (uchar *)request.data.auth_crap.nt_resp); 496 (uchar *)request.data.smbd_auth_crap.nt_resp);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth.c | 345 memcpy(request.data.auth_crap.nt_resp, 347 MIN(nt_response->length, sizeof(request.data.auth_crap.nt_resp))); 405 &ntlmssp_state->nt_resp, 443 &ntlmssp_state->nt_resp,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/ |
H A D | srv_pipe.c | 390 memcpy(nt_owf, ntlmssp_resp->nt_resp, nt_pw_len);
|