Lines Matching refs:answer
1017 unsigned char *answer)
1034 EVP_Cipher(&ctx, answer, challenge, 8);
1091 * @param answer calculated answer, should be freed with heim_ntlm_free_buf().
1102 struct ntlm_buf *answer)
1112 answer->data = malloc(24);
1113 if (answer->data == NULL)
1115 answer->length = 24;
1117 splitandenc(&res[0], challenge, ((unsigned char *)answer->data) + 0);
1118 splitandenc(&res[7], challenge, ((unsigned char *)answer->data) + 8);
1119 splitandenc(&res[14], challenge, ((unsigned char *)answer->data) + 16);
1420 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1434 struct ntlm_buf *answer)
1445 answer->data = malloc(24);
1446 if (answer->data == NULL)
1448 answer->length = 24;
1451 serverchallenge, answer->data);
1453 memcpy(((uint8_t *)answer->data) + 16, clientchallenge, 8);
1469 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1484 struct ntlm_buf *answer)
1502 /* calculate and build ntlmv2 answer */
1542 answer->data = data.data;
1543 answer->length = data.length;
1563 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1579 const struct ntlm_buf *answer,
1595 if (answer->length < 16)
1605 /* calculate and build ntlmv2 answer */
1607 sp = krb5_storage_from_readonly_mem(answer->data, answer->length);
1637 infotarget->length = answer->length - krb5_storage_seek(sp, 0, SEEK_CUR);
1649 if (answer->length < 16) {
1655 ((unsigned char *)answer->data) + 16, answer->length - 16,