Lines Matching refs:type3

837 		       struct ntlm_type3 *type3)
846 memset(type3, 0, sizeof(*type3));
879 CHECK(krb5_ret_uint32(in, &type3->flags), 0);
882 CHECK(krb5_ret_uint32(in, &type3->os[0]), 0);
883 CHECK(krb5_ret_uint32(in, &type3->os[1]), 0);
885 CHECK(ret_buf(in, &lm, &type3->lm), 0);
886 CHECK(ret_buf(in, &ntlm, &type3->ntlm), 0);
887 CHECK(ret_sec_string(in, ucs2, &target, &type3->targetname), 0);
888 CHECK(ret_sec_string(in, ucs2, &username, &type3->username), 0);
889 CHECK(ret_sec_string(in, ucs2, &ws, &type3->ws), 0);
891 CHECK(ret_buf(in, &sessionkey, &type3->sessionkey), 0);
897 heim_ntlm_free_type3(type3);
905 * @param type3 the ntlm_type3 message to encode.
916 heim_ntlm_encode_type3(const struct ntlm_type3 *type3, struct ntlm_buf *data)
936 if (type3->os[0]) {
940 if (type3->flags & NTLM_NEG_UNICODE)
944 target.length = len_string(ucs2, type3->targetname);
948 username.length = len_string(ucs2, type3->username);
952 ws.length = len_string(ucs2, type3->ws);
956 lm.length = type3->lm.length;
957 lm.allocated = type3->lm.length;
960 ntlm.length = type3->ntlm.length;
964 sessionkey.length = type3->sessionkey.length;
965 sessionkey.allocated = type3->sessionkey.length;
982 CHECK(krb5_store_uint32(out, type3->flags), 0);
989 CHECK(put_string(out, ucs2, type3->targetname), 0);
990 CHECK(put_string(out, ucs2, type3->username), 0);
991 CHECK(put_string(out, ucs2, type3->ws), 0);
992 CHECK(put_buf(out, &type3->lm), 0);
993 CHECK(put_buf(out, &type3->ntlm), 0);
994 CHECK(put_buf(out, &type3->sessionkey), 0);
1298 * @param encryptedSession encrypted session, type3.session field.