Home
last modified time | relevance | path

Searched refs:logon (Results 1 – 25 of 1633) sorted by relevance

12345678910>>...66

/dports/net/samba412/samba-4.12.15/source4/torture/nbt/
H A Ddgram.c220 logon.req.logon.request_count = 0; in nbt_test_netlogon2()
222 logon.req.logon.user_name = ""; in nbt_test_netlogon2()
265 logon.req.logon.request_count = 0; in nbt_test_netlogon2()
269 logon.req.logon.nt_version = 1; in nbt_test_netlogon2()
319 logon.req.logon.request_count = 0; in nbt_test_netlogon2()
324 logon.req.logon.nt_version = 1; in nbt_test_netlogon2()
364 logon.req.logon.request_count = 0; in nbt_test_netlogon2()
370 logon.req.logon.nt_version = 1; in nbt_test_netlogon2()
407 logon.req.logon.request_count = 0; in nbt_test_netlogon2()
413 logon.req.logon.nt_version = 1; in nbt_test_netlogon2()
[all …]
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/torture/nbt/
H A Ddgram.c115 ZERO_STRUCT(logon); in nbt_test_netlogon()
194 ZERO_STRUCT(logon); in nbt_test_netlogon2()
313 logon.req.logon.request_count = 0; in nbt_test_ntlogon()
314 logon.req.logon.computer_name = TEST_NAME; in nbt_test_ntlogon()
315 logon.req.logon.user_name = TEST_NAME"$"; in nbt_test_ntlogon()
316 logon.req.logon.mailslot_name = dgmslot->mailslot_name; in nbt_test_ntlogon()
317 logon.req.logon.acct_control = ACB_WSTRUST; in nbt_test_ntlogon()
318 logon.req.logon.sid = *dom_sid; in nbt_test_ntlogon()
319 logon.req.logon.nt_version = 1; in nbt_test_ntlogon()
320 logon.req.logon.lmnt_token = 0xFFFF; in nbt_test_ntlogon()
[all …]
/dports/net/samba412/samba-4.12.15/source4/nbt_server/dgram/
H A Dntlogon.c41 struct nbt_ntlogon_sam_logon_reply *logon; in nbtd_ntlogon_sam_logon() local
51 logon = &reply.req.reply; in nbtd_ntlogon_sam_logon()
53 logon->server = talloc_asprintf(packet, "\\\\%s", in nbtd_ntlogon_sam_logon()
55 logon->user_name = ntlogon->req.logon.user_name; in nbtd_ntlogon_sam_logon()
56 logon->domain = lpcfg_workgroup(iface->nbtsrv->task->lp_ctx); in nbtd_ntlogon_sam_logon()
57 logon->nt_version = 1; in nbtd_ntlogon_sam_logon()
58 logon->lmnt_token = 0xFFFF; in nbtd_ntlogon_sam_logon()
59 logon->lm20_token = 0xFFFF; in nbtd_ntlogon_sam_logon()
66 ntlogon->req.logon.mailslot_name, in nbtd_ntlogon_sam_logon()
H A Dnetlogon.c142 if (netlogon->req.logon.sid_size != 0) { in nbtd_netlogon_samlogon()
143 sid = &netlogon->req.logon.sid; in nbtd_netlogon_samlogon()
147 mem_ctx, netlogon->req.logon.mailslot_name); in nbtd_netlogon_samlogon()
161 netlogon->req.logon.user_name, in nbtd_netlogon_samlogon()
162 netlogon->req.logon.acct_control, src->addr, in nbtd_netlogon_samlogon()
163 netlogon->req.logon.nt_version, nbtsrv->task->lp_ctx, in nbtd_netlogon_samlogon()
172 netlogon->req.logon.nt_version, in nbtd_netlogon_samlogon()
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/nbt_server/dgram/
H A Dntlogon.c40 struct nbt_ntlogon_sam_logon_reply *logon; in nbtd_ntlogon_sam_logon() local
50 logon = &reply.req.reply; in nbtd_ntlogon_sam_logon()
52 logon->server = talloc_asprintf(packet, "\\\\%s", lp_netbios_name()); in nbtd_ntlogon_sam_logon()
53 logon->user_name = ntlogon->req.logon.user_name; in nbtd_ntlogon_sam_logon()
54 logon->domain = lp_workgroup(); in nbtd_ntlogon_sam_logon()
55 logon->nt_version = 1; in nbtd_ntlogon_sam_logon()
56 logon->lmnt_token = 0xFFFF; in nbtd_ntlogon_sam_logon()
57 logon->lm20_token = 0xFFFF; in nbtd_ntlogon_sam_logon()
63 ntlogon->req.logon.mailslot_name, in nbtd_ntlogon_sam_logon()
/dports/finance/quickfix/quickfix-1.15.1/src/C++/test/
H A DSocketAcceptorTestCase.cpp104 FIX42::Logon logon; in SUITE() local
105 logon.getHeader().set( SenderCompID("TW") ); in SUITE()
106 logon.getHeader().set( TargetCompID("ISLD") ); in SUITE()
107 logon.getHeader().set( MsgSeqNum(1) ); in SUITE()
108 logon.getHeader().set( SendingTime() ); in SUITE()
109 logon.set( HeartBtInt(30) ); in SUITE()
111 CHECK( socket_send( s, logon.toString().c_str(), (int)strlen(logon.toString().c_str()) ) ); in SUITE()
/dports/net/samba412/samba-4.12.15/python/samba/tests/
H A Dpy_credentials.py111 logon = samlogon_logon_info(self.domain,
123 logon,
138 logon = samlogon_logon_info(self.domain,
150 logon,
163 logon = samlogon_logon_info(self.domain,
176 logon,
189 logon = samlogon_logon_info(self.domain,
204 logon,
337 logon,
366 logon = netlogon.netr_NetworkInfo()
[all …]
H A Dauth_log_samlogon.py128 logon = samba.dcerpc.netlogon.netr_NetworkInfo()
130 logon.challenge = [
132 logon.nt = netlogon.netr_ChallengeResponse()
133 logon.nt.length = len(response["nt_response"])
134 logon.nt.data = [
138 logon.identity_info = samba.dcerpc.netlogon.netr_IdentityInfo()
141 logon.identity_info.domain_name.string = domain
142 logon.identity_info.account_name.string = username
143 logon.identity_info.workstation.string = creds.get_workstation()
150 logon_level, logon,
/dports/www/tikiwiki/tiki-21.2/lib/payment/
H A Dcclitelib.php325 $logon = curl_exec($ch);
331 if ($logon) {
333 …if (preg_match('/^(login failed for ' . $username . '.*' . $registry . '[^<]*)/mi', $logon, $resul…
338 $logon = curl_exec($ch); // retry login
341 $logon = 'failed';
348 if (preg_match('/^(.*?' . $username . '.*' . $registry . '[^<]*)/mi', $logon, $results)) {
350 $logon = 'failed'; // error in $results[0]
351 …} elseif (preg_match('/HTTP\/1.1 302/mis', $logon) && preg_match('/<BODY.*?>(.*)<\/BODY>/mis', $lo…
357 if ($logon && $logon != 'failed') {
358 preg_match_all('|Set-Cookie: (.*);|U', $logon, $results);
[all …]
/dports/games/ldmud/ldmud-3.3.720/doc/applied/
H A Dlogon2 int logon (void)
3 int logon (int flag)
8 object, it then calls logon() in that object.
14 background and failed, it will call logon(-1) in the intended
18 did not set an explicit TLS callback, the call to logon() won't
20 a TLS callback, that will be executed in place of logon().
25 during logon.
/dports/net-im/matterbridge/matterbridge-1.22.3/vendor/github.com/Philipp15b/go-steam/
H A Dauth.go60 logon := new(CMsgClientLogon)
61 logon.AccountName = &details.Username
62 logon.Password = &details.Password
64 logon.AuthCode = proto.String(details.AuthCode)
67 logon.TwoFactorCode = proto.String(details.TwoFactorCode)
69 logon.ClientLanguage = proto.String("english")
70 logon.ProtocolVersion = proto.Uint32(MsgClientLogon_CurrentProtocol)
71 logon.ShaSentryfile = details.SentryFileHash
73 logon.LoginKey = proto.String(details.LoginKey)
76 logon.ShouldRememberPassword = proto.Bool(details.ShouldRememberPassword)
[all …]
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/windows/tests/integration/targets/win_auto_logon/tasks/
H A Dtests.yml61 - name: add logon count (check mode)
70 - name: get result of add logon count (check mode)
74 - name: assert add logon count (check mode)
80 - name: add logon count
88 - name: get result of add logon count
92 - name: assert add logon count
98 - name: change auto logon (check mode)
110 - name: assert change auto logon (check mode)
116 - name: change auto logon
123 - name: get reuslt of change auto logon
[all …]
/dports/misc/amanda-server/amanda-3.3.9/ndmp-src/
H A DThingsToTry14 % ndmjob -q -Dmyhost,logon,passwd
18 % ndmjob -q -Dmyhost/2,logon,passwd
22 % ndmjob -q -Dmyhost/3,logon,passwd
31 % ndmjob -q -Tmyhost,logon,passwd
39 % ndmjob -q -Dmyhost,logon,passwd -L log-file
43 % ndmjob -q -Dmyhost,logon,passwd -L log-file -d5
88 -Tmyhost,logon,passwd -f /dev/whatever
97 -Tmyhost,logon,passwd -f /dev/whatever
108 -Tmyhost,logon,passwd -f /dev/whatever
188 -Tmyhost,logon,passwd -f /dev/whatever \
[all …]
/dports/misc/amanda-client/amanda-3.3.9/ndmp-src/
H A DThingsToTry14 % ndmjob -q -Dmyhost,logon,passwd
18 % ndmjob -q -Dmyhost/2,logon,passwd
22 % ndmjob -q -Dmyhost/3,logon,passwd
31 % ndmjob -q -Tmyhost,logon,passwd
39 % ndmjob -q -Dmyhost,logon,passwd -L log-file
43 % ndmjob -q -Dmyhost,logon,passwd -L log-file -d5
88 -Tmyhost,logon,passwd -f /dev/whatever
97 -Tmyhost,logon,passwd -f /dev/whatever
108 -Tmyhost,logon,passwd -f /dev/whatever
188 -Tmyhost,logon,passwd -f /dev/whatever \
[all …]
/dports/net/samba412/samba-4.12.15/source4/torture/ndr/
H A Dnbt.c124 torture_assert_int_equal(tctx, r->req.logon.request_count, 0, "request_count");
125 torture_assert_str_equal(tctx, r->req.logon.computer_name, "LENNY", "computer_name");
126 torture_assert_str_equal(tctx, r->req.logon.user_name, "LENNY$", "user_name");
127 …torture_assert_str_equal(tctx, r->req.logon.mailslot_name, "\\MAILSLOT\\NET\\GETDC52EAA8C0", "mail…
128 torture_assert_int_equal(tctx, r->req.logon.acct_control, 0x00000080, "acct_control");
129 torture_assert_int_equal(tctx, r->req.logon.sid_size, 24, "sid_size");
130 torture_assert_int_equal(tctx, r->req.logon._pad.length, 2, "_pad.length");
131 …torture_assert_sid_equal(tctx, &r->req.logon.sid, dom_sid_parse_talloc(tctx, "S-1-5-21-4284042908-…
132 torture_assert_int_equal(tctx, r->req.logon.nt_version, NETLOGON_NT_VERSION_1, "nt_version");
133 torture_assert_int_equal(tctx, r->req.logon.lmnt_token, 0xffff, "lmnt_token");
[all …]
H A Dnetlogon.c151 torture_assert(tctx, r->in.logon, "logon NULL pointer");
152 torture_assert(tctx, r->in.logon->password, "logon->password NULL pointer");
153 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.domain_name.length, 12, "domai…
154 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.domain_name.size, 12, "domain_…
156 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.parameter_control, 0, "paramet…
157 …torture_assert_u64_equal(tctx, r->in.logon->password->identity_info.logon_id, 0xbeef0000dead, "log…
159 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.account_name.size, 26, "accoun…
161 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.workstation.length, 20, "works…
162 …torture_assert_int_equal(tctx, r->in.logon->password->identity_info.workstation.size, 20, "worksta…
164 …torture_assert_mem_equal(tctx, r->in.logon->password->lmpassword.hash, lmpassword_expected, 16, "l…
[all …]
/dports/net/samba412/samba-4.12.15/source3/nmbd/
H A Dnmbd_processlogon.c206 user_name = state->req.req.logon.user_name; in nmbd_proxy_logon()
208 acct_control = state->req.req.logon.acct_control; in nmbd_proxy_logon()
209 if (state->req.req.logon.sid_size > 0) { in nmbd_proxy_logon()
211 &state->req.req.logon.sid); in nmbd_proxy_logon()
218 nt_version = state->req.req.logon.nt_version; in nmbd_proxy_logon()
474 request.req.logon.computer_name, in process_logon_packet()
476 request.req.logon.user_name, in process_logon_packet()
480 request.req.logon.lmnt_token)); in process_logon_packet()
482 if (!request.req.logon.user_name) { in process_logon_packet()
489 nt4.user_name = request.req.logon.user_name; in process_logon_packet()
[all …]
/dports/net/haproxy/haproxy-2.4.10/reg-tests/converter/
H A Dfix.vtc7 # Valid FIX-4.0 logon
13 # Valid FIX-4.1 logon
20 # Valid FIX-4.2 logon
27 # Valid FIX-4.3 logon
34 # Valid FIX-4.4 logon
41 # Valid FIX-5.0 logon
49 # Valid FIX-4.4 logon
105 # Valid FIX-4.0 logon
113 # Valid FIX-4.1 logon
121 # Valid FIX-4.2 logon
[all …]
/dports/net/samba412/samba-4.12.15/source3/rpc_client/
H A Dcli_netlogon.c470 union netr_LogonLevel *logon; in rpccli_netlogon_password_logon() local
483 if (logon == NULL) { in rpccli_netlogon_password_logon()
524 logon->password = password_info; in rpccli_netlogon_password_logon()
568 logon->network = network_info; in rpccli_netlogon_password_logon()
582 logon, in rpccli_netlogon_password_logon()
650 if (!logon) { in rpccli_netlogon_network_logon()
687 logon->network = network_info; in rpccli_netlogon_network_logon()
694 logon, in rpccli_netlogon_network_logon()
754 if (logon == NULL) { in rpccli_netlogon_interactive_logon()
797 logon->password = password_info; in rpccli_netlogon_interactive_logon()
[all …]
/dports/games/ldmud/ldmud-3.3.720/doc/master/
H A Dconnect11 The lfun logon() will be applied to the login object after
17 the driver will delay the call to logon() until the handshake either
22 during logon.
25 logon(A), disconnect(M), interactive(E), exec(E),
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/rpc_server/netlogon/
H A Ddcerpc_netlogon.c423 r->in.logon.password->lmpassword.hash, in netr_LogonSamLogon_base()
424 sizeof(r->in.logon.password->lmpassword.hash)); in netr_LogonSamLogon_base()
426 r->in.logon.password->ntpassword.hash, in netr_LogonSamLogon_base()
427 sizeof(r->in.logon.password->ntpassword.hash)); in netr_LogonSamLogon_base()
429 creds_des_decrypt(creds, &r->in.logon.password->lmpassword); in netr_LogonSamLogon_base()
430 creds_des_decrypt(creds, &r->in.logon.password->ntpassword); in netr_LogonSamLogon_base()
453 *user_info->password.hash.nt = r->in.logon.password->ntpassword; in netr_LogonSamLogon_base()
474 …password.response.lanman = data_blob_talloc(mem_ctx, r->in.logon.network->lm.data, r->in.logon.net… in netr_LogonSamLogon_base()
475 …fo->password.response.nt = data_blob_talloc(mem_ctx, r->in.logon.network->nt.data, r->in.logon.net… in netr_LogonSamLogon_base()
595 r2.in.logon = r->in.logon; in netr_LogonSamLogonWithFlags()
[all …]
/dports/mail/alpine/alpine-465e23b/web/src/cgi.tcl-1.10/example/
H A Doratcl.cgi24 set logon [oralogon [import user] [import password]]
25 set cursor [oraopen $logon]
31 oralogoff $logon
/dports/editors/pico-alpine/alpine-465e23b/web/src/cgi.tcl-1.10/example/
H A Doratcl.cgi24 set logon [oralogon [import user] [import password]]
25 set cursor [oraopen $logon]
31 oralogoff $logon
/dports/net/samba412/samba-4.12.15/libcli/auth/
H A Dcredentials.c977 if (logon == NULL) { in netlogon_creds_crypt_samlogon_logon()
986 if (logon->password == NULL) { in netlogon_creds_crypt_samlogon_logon()
1051 p = &logon->password->lmpassword; in netlogon_creds_crypt_samlogon_logon()
1062 p = &logon->password->ntpassword; in netlogon_creds_crypt_samlogon_logon()
1081 if (logon->generic == NULL) { in netlogon_creds_crypt_samlogon_logon()
1089 logon->generic->data, in netlogon_creds_crypt_samlogon_logon()
1090 logon->generic->length); in netlogon_creds_crypt_samlogon_logon()
1094 logon->generic->data, in netlogon_creds_crypt_samlogon_logon()
1095 logon->generic->length); in netlogon_creds_crypt_samlogon_logon()
1102 logon->generic->data, in netlogon_creds_crypt_samlogon_logon()
[all …]
/dports/net/samba412/samba-4.12.15/source3/rpc_server/netlogon/
H A Dsrv_netlog_nt.c1643 if (r->in.logon->network == NULL) { in _netr_LogonSamLogon_check()
1698 union netr_LogonLevel *logon = r->in.logon; in _netr_LogonSamLogon_base() local
1708 r->in.logon); in _netr_LogonSamLogon_base()
1709 if (logon == NULL) { in _netr_LogonSamLogon_base()
1710 logon = r->in.logon; in _netr_LogonSamLogon_base()
1794 logon); in _netr_LogonSamLogon_base()
1832 logon->network->lm.data, in _netr_LogonSamLogon_base()
1834 logon->network->nt.data, in _netr_LogonSamLogon_base()
1861 if (logon != r->in.logon) { in _netr_LogonSamLogon_base()
1985 r2.in.logon = r->in.logon; in _netr_LogonSamLogonWithFlags()
[all …]

12345678910>>...66