/dports/net/samba412/samba-4.12.15/source4/torture/nbt/ |
H A D | dgram.c | 220 logon.req.logon.request_count = 0; in nbt_test_netlogon2() 222 logon.req.logon.user_name = ""; in nbt_test_netlogon2() 265 logon.req.logon.request_count = 0; in nbt_test_netlogon2() 269 logon.req.logon.nt_version = 1; in nbt_test_netlogon2() 319 logon.req.logon.request_count = 0; in nbt_test_netlogon2() 324 logon.req.logon.nt_version = 1; in nbt_test_netlogon2() 364 logon.req.logon.request_count = 0; in nbt_test_netlogon2() 370 logon.req.logon.nt_version = 1; in nbt_test_netlogon2() 407 logon.req.logon.request_count = 0; in nbt_test_netlogon2() 413 logon.req.logon.nt_version = 1; in nbt_test_netlogon2() [all …]
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/torture/nbt/ |
H A D | dgram.c | 115 ZERO_STRUCT(logon); in nbt_test_netlogon() 194 ZERO_STRUCT(logon); in nbt_test_netlogon2() 313 logon.req.logon.request_count = 0; in nbt_test_ntlogon() 314 logon.req.logon.computer_name = TEST_NAME; in nbt_test_ntlogon() 315 logon.req.logon.user_name = TEST_NAME"$"; in nbt_test_ntlogon() 316 logon.req.logon.mailslot_name = dgmslot->mailslot_name; in nbt_test_ntlogon() 317 logon.req.logon.acct_control = ACB_WSTRUST; in nbt_test_ntlogon() 318 logon.req.logon.sid = *dom_sid; in nbt_test_ntlogon() 319 logon.req.logon.nt_version = 1; in nbt_test_ntlogon() 320 logon.req.logon.lmnt_token = 0xFFFF; in nbt_test_ntlogon() [all …]
|
/dports/net/samba412/samba-4.12.15/source4/nbt_server/dgram/ |
H A D | ntlogon.c | 41 struct nbt_ntlogon_sam_logon_reply *logon; in nbtd_ntlogon_sam_logon() local 51 logon = &reply.req.reply; in nbtd_ntlogon_sam_logon() 53 logon->server = talloc_asprintf(packet, "\\\\%s", in nbtd_ntlogon_sam_logon() 55 logon->user_name = ntlogon->req.logon.user_name; in nbtd_ntlogon_sam_logon() 56 logon->domain = lpcfg_workgroup(iface->nbtsrv->task->lp_ctx); in nbtd_ntlogon_sam_logon() 57 logon->nt_version = 1; in nbtd_ntlogon_sam_logon() 58 logon->lmnt_token = 0xFFFF; in nbtd_ntlogon_sam_logon() 59 logon->lm20_token = 0xFFFF; in nbtd_ntlogon_sam_logon() 66 ntlogon->req.logon.mailslot_name, in nbtd_ntlogon_sam_logon()
|
H A D | netlogon.c | 142 if (netlogon->req.logon.sid_size != 0) { in nbtd_netlogon_samlogon() 143 sid = &netlogon->req.logon.sid; in nbtd_netlogon_samlogon() 147 mem_ctx, netlogon->req.logon.mailslot_name); in nbtd_netlogon_samlogon() 161 netlogon->req.logon.user_name, in nbtd_netlogon_samlogon() 162 netlogon->req.logon.acct_control, src->addr, in nbtd_netlogon_samlogon() 163 netlogon->req.logon.nt_version, nbtsrv->task->lp_ctx, in nbtd_netlogon_samlogon() 172 netlogon->req.logon.nt_version, in nbtd_netlogon_samlogon()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/nbt_server/dgram/ |
H A D | ntlogon.c | 40 struct nbt_ntlogon_sam_logon_reply *logon; in nbtd_ntlogon_sam_logon() local 50 logon = &reply.req.reply; in nbtd_ntlogon_sam_logon() 52 logon->server = talloc_asprintf(packet, "\\\\%s", lp_netbios_name()); in nbtd_ntlogon_sam_logon() 53 logon->user_name = ntlogon->req.logon.user_name; in nbtd_ntlogon_sam_logon() 54 logon->domain = lp_workgroup(); in nbtd_ntlogon_sam_logon() 55 logon->nt_version = 1; in nbtd_ntlogon_sam_logon() 56 logon->lmnt_token = 0xFFFF; in nbtd_ntlogon_sam_logon() 57 logon->lm20_token = 0xFFFF; in nbtd_ntlogon_sam_logon() 63 ntlogon->req.logon.mailslot_name, in nbtd_ntlogon_sam_logon()
|
/dports/finance/quickfix/quickfix-1.15.1/src/C++/test/ |
H A D | SocketAcceptorTestCase.cpp | 104 FIX42::Logon logon; in SUITE() local 105 logon.getHeader().set( SenderCompID("TW") ); in SUITE() 106 logon.getHeader().set( TargetCompID("ISLD") ); in SUITE() 107 logon.getHeader().set( MsgSeqNum(1) ); in SUITE() 108 logon.getHeader().set( SendingTime() ); in SUITE() 109 logon.set( HeartBtInt(30) ); in SUITE() 111 CHECK( socket_send( s, logon.toString().c_str(), (int)strlen(logon.toString().c_str()) ) ); in SUITE()
|
/dports/net/samba412/samba-4.12.15/python/samba/tests/ |
H A D | py_credentials.py | 111 logon = samlogon_logon_info(self.domain, 123 logon, 138 logon = samlogon_logon_info(self.domain, 150 logon, 163 logon = samlogon_logon_info(self.domain, 176 logon, 189 logon = samlogon_logon_info(self.domain, 204 logon, 337 logon, 366 logon = netlogon.netr_NetworkInfo() [all …]
|
H A D | auth_log_samlogon.py | 128 logon = samba.dcerpc.netlogon.netr_NetworkInfo() 130 logon.challenge = [ 132 logon.nt = netlogon.netr_ChallengeResponse() 133 logon.nt.length = len(response["nt_response"]) 134 logon.nt.data = [ 138 logon.identity_info = samba.dcerpc.netlogon.netr_IdentityInfo() 141 logon.identity_info.domain_name.string = domain 142 logon.identity_info.account_name.string = username 143 logon.identity_info.workstation.string = creds.get_workstation() 150 logon_level, logon,
|
/dports/www/tikiwiki/tiki-21.2/lib/payment/ |
H A D | cclitelib.php | 325 $logon = curl_exec($ch); 331 if ($logon) { 333 …if (preg_match('/^(login failed for ' . $username . '.*' . $registry . '[^<]*)/mi', $logon, $resul… 338 $logon = curl_exec($ch); // retry login 341 $logon = 'failed'; 348 if (preg_match('/^(.*?' . $username . '.*' . $registry . '[^<]*)/mi', $logon, $results)) { 350 $logon = 'failed'; // error in $results[0] 351 …} elseif (preg_match('/HTTP\/1.1 302/mis', $logon) && preg_match('/<BODY.*?>(.*)<\/BODY>/mis', $lo… 357 if ($logon && $logon != 'failed') { 358 preg_match_all('|Set-Cookie: (.*);|U', $logon, $results); [all …]
|
/dports/games/ldmud/ldmud-3.3.720/doc/applied/ |
H A D | logon | 2 int logon (void) 3 int logon (int flag) 8 object, it then calls logon() in that object. 14 background and failed, it will call logon(-1) in the intended 18 did not set an explicit TLS callback, the call to logon() won't 20 a TLS callback, that will be executed in place of logon(). 25 during logon.
|
/dports/net-im/matterbridge/matterbridge-1.22.3/vendor/github.com/Philipp15b/go-steam/ |
H A D | auth.go | 60 logon := new(CMsgClientLogon) 61 logon.AccountName = &details.Username 62 logon.Password = &details.Password 64 logon.AuthCode = proto.String(details.AuthCode) 67 logon.TwoFactorCode = proto.String(details.TwoFactorCode) 69 logon.ClientLanguage = proto.String("english") 70 logon.ProtocolVersion = proto.Uint32(MsgClientLogon_CurrentProtocol) 71 logon.ShaSentryfile = details.SentryFileHash 73 logon.LoginKey = proto.String(details.LoginKey) 76 logon.ShouldRememberPassword = proto.Bool(details.ShouldRememberPassword) [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/windows/tests/integration/targets/win_auto_logon/tasks/ |
H A D | tests.yml | 61 - name: add logon count (check mode) 70 - name: get result of add logon count (check mode) 74 - name: assert add logon count (check mode) 80 - name: add logon count 88 - name: get result of add logon count 92 - name: assert add logon count 98 - name: change auto logon (check mode) 110 - name: assert change auto logon (check mode) 116 - name: change auto logon 123 - name: get reuslt of change auto logon [all …]
|
/dports/misc/amanda-server/amanda-3.3.9/ndmp-src/ |
H A D | ThingsToTry | 14 % ndmjob -q -Dmyhost,logon,passwd 18 % ndmjob -q -Dmyhost/2,logon,passwd 22 % ndmjob -q -Dmyhost/3,logon,passwd 31 % ndmjob -q -Tmyhost,logon,passwd 39 % ndmjob -q -Dmyhost,logon,passwd -L log-file 43 % ndmjob -q -Dmyhost,logon,passwd -L log-file -d5 88 -Tmyhost,logon,passwd -f /dev/whatever 97 -Tmyhost,logon,passwd -f /dev/whatever 108 -Tmyhost,logon,passwd -f /dev/whatever 188 -Tmyhost,logon,passwd -f /dev/whatever \ [all …]
|
/dports/misc/amanda-client/amanda-3.3.9/ndmp-src/ |
H A D | ThingsToTry | 14 % ndmjob -q -Dmyhost,logon,passwd 18 % ndmjob -q -Dmyhost/2,logon,passwd 22 % ndmjob -q -Dmyhost/3,logon,passwd 31 % ndmjob -q -Tmyhost,logon,passwd 39 % ndmjob -q -Dmyhost,logon,passwd -L log-file 43 % ndmjob -q -Dmyhost,logon,passwd -L log-file -d5 88 -Tmyhost,logon,passwd -f /dev/whatever 97 -Tmyhost,logon,passwd -f /dev/whatever 108 -Tmyhost,logon,passwd -f /dev/whatever 188 -Tmyhost,logon,passwd -f /dev/whatever \ [all …]
|
/dports/net/samba412/samba-4.12.15/source4/torture/ndr/ |
H A D | nbt.c | 124 torture_assert_int_equal(tctx, r->req.logon.request_count, 0, "request_count"); 125 torture_assert_str_equal(tctx, r->req.logon.computer_name, "LENNY", "computer_name"); 126 torture_assert_str_equal(tctx, r->req.logon.user_name, "LENNY$", "user_name"); 127 …torture_assert_str_equal(tctx, r->req.logon.mailslot_name, "\\MAILSLOT\\NET\\GETDC52EAA8C0", "mail… 128 torture_assert_int_equal(tctx, r->req.logon.acct_control, 0x00000080, "acct_control"); 129 torture_assert_int_equal(tctx, r->req.logon.sid_size, 24, "sid_size"); 130 torture_assert_int_equal(tctx, r->req.logon._pad.length, 2, "_pad.length"); 131 …torture_assert_sid_equal(tctx, &r->req.logon.sid, dom_sid_parse_talloc(tctx, "S-1-5-21-4284042908-… 132 torture_assert_int_equal(tctx, r->req.logon.nt_version, NETLOGON_NT_VERSION_1, "nt_version"); 133 torture_assert_int_equal(tctx, r->req.logon.lmnt_token, 0xffff, "lmnt_token"); [all …]
|
H A D | netlogon.c | 151 torture_assert(tctx, r->in.logon, "logon NULL pointer"); 152 torture_assert(tctx, r->in.logon->password, "logon->password NULL pointer"); 153 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.domain_name.length, 12, "domai… 154 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.domain_name.size, 12, "domain_… 156 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.parameter_control, 0, "paramet… 157 …torture_assert_u64_equal(tctx, r->in.logon->password->identity_info.logon_id, 0xbeef0000dead, "log… 159 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.account_name.size, 26, "accoun… 161 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.workstation.length, 20, "works… 162 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.workstation.size, 20, "worksta… 164 …torture_assert_mem_equal(tctx, r->in.logon->password->lmpassword.hash, lmpassword_expected, 16, "l… [all …]
|
/dports/net/samba412/samba-4.12.15/source3/nmbd/ |
H A D | nmbd_processlogon.c | 206 user_name = state->req.req.logon.user_name; in nmbd_proxy_logon() 208 acct_control = state->req.req.logon.acct_control; in nmbd_proxy_logon() 209 if (state->req.req.logon.sid_size > 0) { in nmbd_proxy_logon() 211 &state->req.req.logon.sid); in nmbd_proxy_logon() 218 nt_version = state->req.req.logon.nt_version; in nmbd_proxy_logon() 474 request.req.logon.computer_name, in process_logon_packet() 476 request.req.logon.user_name, in process_logon_packet() 480 request.req.logon.lmnt_token)); in process_logon_packet() 482 if (!request.req.logon.user_name) { in process_logon_packet() 489 nt4.user_name = request.req.logon.user_name; in process_logon_packet() [all …]
|
/dports/net/haproxy/haproxy-2.4.10/reg-tests/converter/ |
H A D | fix.vtc | 7 # Valid FIX-4.0 logon 13 # Valid FIX-4.1 logon 20 # Valid FIX-4.2 logon 27 # Valid FIX-4.3 logon 34 # Valid FIX-4.4 logon 41 # Valid FIX-5.0 logon 49 # Valid FIX-4.4 logon 105 # Valid FIX-4.0 logon 113 # Valid FIX-4.1 logon 121 # Valid FIX-4.2 logon [all …]
|
/dports/net/samba412/samba-4.12.15/source3/rpc_client/ |
H A D | cli_netlogon.c | 470 union netr_LogonLevel *logon; in rpccli_netlogon_password_logon() local 483 if (logon == NULL) { in rpccli_netlogon_password_logon() 524 logon->password = password_info; in rpccli_netlogon_password_logon() 568 logon->network = network_info; in rpccli_netlogon_password_logon() 582 logon, in rpccli_netlogon_password_logon() 650 if (!logon) { in rpccli_netlogon_network_logon() 687 logon->network = network_info; in rpccli_netlogon_network_logon() 694 logon, in rpccli_netlogon_network_logon() 754 if (logon == NULL) { in rpccli_netlogon_interactive_logon() 797 logon->password = password_info; in rpccli_netlogon_interactive_logon() [all …]
|
/dports/games/ldmud/ldmud-3.3.720/doc/master/ |
H A D | connect | 11 The lfun logon() will be applied to the login object after 17 the driver will delay the call to logon() until the handshake either 22 during logon. 25 logon(A), disconnect(M), interactive(E), exec(E),
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/rpc_server/netlogon/ |
H A D | dcerpc_netlogon.c | 423 r->in.logon.password->lmpassword.hash, in netr_LogonSamLogon_base() 424 sizeof(r->in.logon.password->lmpassword.hash)); in netr_LogonSamLogon_base() 426 r->in.logon.password->ntpassword.hash, in netr_LogonSamLogon_base() 427 sizeof(r->in.logon.password->ntpassword.hash)); in netr_LogonSamLogon_base() 429 creds_des_decrypt(creds, &r->in.logon.password->lmpassword); in netr_LogonSamLogon_base() 430 creds_des_decrypt(creds, &r->in.logon.password->ntpassword); in netr_LogonSamLogon_base() 453 *user_info->password.hash.nt = r->in.logon.password->ntpassword; in netr_LogonSamLogon_base() 474 …password.response.lanman = data_blob_talloc(mem_ctx, r->in.logon.network->lm.data, r->in.logon.net… in netr_LogonSamLogon_base() 475 …fo->password.response.nt = data_blob_talloc(mem_ctx, r->in.logon.network->nt.data, r->in.logon.net… in netr_LogonSamLogon_base() 595 r2.in.logon = r->in.logon; in netr_LogonSamLogonWithFlags() [all …]
|
/dports/mail/alpine/alpine-465e23b/web/src/cgi.tcl-1.10/example/ |
H A D | oratcl.cgi | 24 set logon [oralogon [import user] [import password]] 25 set cursor [oraopen $logon] 31 oralogoff $logon
|
/dports/editors/pico-alpine/alpine-465e23b/web/src/cgi.tcl-1.10/example/ |
H A D | oratcl.cgi | 24 set logon [oralogon [import user] [import password]] 25 set cursor [oraopen $logon] 31 oralogoff $logon
|
/dports/net/samba412/samba-4.12.15/libcli/auth/ |
H A D | credentials.c | 977 if (logon == NULL) { in netlogon_creds_crypt_samlogon_logon() 986 if (logon->password == NULL) { in netlogon_creds_crypt_samlogon_logon() 1051 p = &logon->password->lmpassword; in netlogon_creds_crypt_samlogon_logon() 1062 p = &logon->password->ntpassword; in netlogon_creds_crypt_samlogon_logon() 1081 if (logon->generic == NULL) { in netlogon_creds_crypt_samlogon_logon() 1089 logon->generic->data, in netlogon_creds_crypt_samlogon_logon() 1090 logon->generic->length); in netlogon_creds_crypt_samlogon_logon() 1094 logon->generic->data, in netlogon_creds_crypt_samlogon_logon() 1095 logon->generic->length); in netlogon_creds_crypt_samlogon_logon() 1102 logon->generic->data, in netlogon_creds_crypt_samlogon_logon() [all …]
|
/dports/net/samba412/samba-4.12.15/source3/rpc_server/netlogon/ |
H A D | srv_netlog_nt.c | 1643 if (r->in.logon->network == NULL) { in _netr_LogonSamLogon_check() 1698 union netr_LogonLevel *logon = r->in.logon; in _netr_LogonSamLogon_base() local 1708 r->in.logon); in _netr_LogonSamLogon_base() 1709 if (logon == NULL) { in _netr_LogonSamLogon_base() 1710 logon = r->in.logon; in _netr_LogonSamLogon_base() 1794 logon); in _netr_LogonSamLogon_base() 1832 logon->network->lm.data, in _netr_LogonSamLogon_base() 1834 logon->network->nt.data, in _netr_LogonSamLogon_base() 1861 if (logon != r->in.logon) { in _netr_LogonSamLogon_base() 1985 r2.in.logon = r->in.logon; in _netr_LogonSamLogonWithFlags() [all …]
|