Lines Matching refs:val
1160 rand_hash(ssnkey.val, ssnkey.len, rc4key, sizeof (rc4key));
1163 bcopy(ssnkey.val, ntlm_usrsesskey, ssnkey.len);
1194 authreq->au_lmpasswd.val, sizeof (netr_owf_password_t));
1197 authreq->au_ntpasswd.val, sizeof (netr_owf_password_t));
1230 md5input.val = calloc(1, md5input.len);
1231 if (md5input.val == NULL)
1234 bcopy(authreq->au_challenge_key.val, md5input.val,
1236 bcopy(authreq->au_lmpasswd.val,
1237 md5input.val + authreq->au_challenge_key.len, 8);
1238 if (smb_auth_md5(md5digest, md5input.val, md5input.len)
1240 free(md5input.val);
1245 free(md5input.val);
1247 bcopy(authreq->au_challenge_key.val, info2->lm_challenge.data,
1255 ndr_heap_mkvcb(heap, authreq->au_ntpasswd.val, ntpasswd_len,
1262 ndr_heap_mkvcb(heap, authreq->au_lmpasswd.val, lmpasswd_len,
1335 * server challenge is au_challenge_key.val, and
1336 * client nonce is the first 8 bytes of au_lmpasswd.val.
1350 bcopy(authreq->au_challenge_key.val, sess_nonce,
1352 bcopy(authreq->au_lmpasswd.val, sess_nonce +
1358 SMBAUTH_SESSION_KEY_SZ, ntlm2_usrsesskey->val);
1455 if ((ssnkey->val = calloc(1, len)) == NULL)
1459 bcopy(buf, ssnkey->val, ssnkey->len);
1468 free(ssnkey->val);