Lines Matching refs:type2

680 heim_ntlm_decode_type2(const struct ntlm_buf *buf, struct ntlm_type2 *type2)
689 memset(type2, 0, sizeof(*type2));
704 CHECK(krb5_ret_uint32(in, &type2->flags), 0);
705 if (type2->flags & NTLM_NEG_UNICODE)
707 CHECK(krb5_storage_read(in, type2->challenge, sizeof(type2->challenge)),
708 sizeof(type2->challenge));
713 if (type2->flags & NTLM_NEG_VERSION) {
714 CHECK(krb5_ret_uint32(in, &type2->os[0]), 0);
715 CHECK(krb5_ret_uint32(in, &type2->os[1]), 0);
718 CHECK(ret_sec_string(in, ucs2, &targetname, &type2->targetname), 0);
719 CHECK(ret_buf(in, &targetinfo, &type2->targetinfo), 0);
726 heim_ntlm_free_type2(type2);
734 * @param type2 the ntlm_type2 message to encode.
745 heim_ntlm_encode_type2(const struct ntlm_type2 *type2, struct ntlm_buf *data)
755 if (type2->flags & NTLM_NEG_VERSION)
758 if (type2->flags & NTLM_NEG_UNICODE)
762 targetname.length = len_string(ucs2, type2->targetname);
766 targetinfo.length = type2->targetinfo.length;
767 targetinfo.allocated = type2->targetinfo.length;
778 CHECK(krb5_store_uint32(out, type2->flags), 0);
779 CHECK(krb5_storage_write(out, type2->challenge, sizeof(type2->challenge)),
780 sizeof(type2->challenge));
785 if (type2->flags & NTLM_NEG_VERSION) {
786 CHECK(krb5_store_uint32(out, type2->os[0]), 0);
787 CHECK(krb5_store_uint32(out, type2->os[1]), 0);
789 CHECK(put_string(out, ucs2, type2->targetname), 0);
790 CHECK(krb5_storage_write(out, type2->targetinfo.data,
791 type2->targetinfo.length),
792 type2->targetinfo.length);
1418 * @param serverchallenge challenge as sent by the server in the type2 message.
1466 * @param serverchallenge challenge as sent by the server in the type2 message.
1467 * @param infotarget infotarget as sent by the server in the type2 message.
1562 * @param serverchallenge challenge as sent by the server in the type2 message.
1564 * @param infotarget infotarget as sent by the server in the type2 message.