• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/heimdal/lib/krb5/

Lines Matching defs:ntlm

842 		krb5_ntlm *ntlm)
844 *ntlm = calloc(1, sizeof(**ntlm));
845 if (*ntlm == NULL) {
853 krb5_ntlm_free(krb5_context context, krb5_ntlm ntlm)
855 free_NTLMInit(&ntlm->init);
856 free_NTLMInitReply(&ntlm->initReply);
857 free_NTLMRequest(&ntlm->request);
858 free_NTLMResponse(&ntlm->response);
859 memset(ntlm, 0, sizeof(*ntlm));
860 free(ntlm);
867 krb5_ntlm ntlm,
881 ntlm->init.flags = flags;
883 ALLOC(ntlm->init.hostname, 1);
884 *ntlm->init.hostname = strdup(hostname);
887 ALLOC(ntlm->init.domain, 1);
888 *ntlm->init.domain = strdup(domainname);
892 ireq.u.ntlmInit = ntlm->init;
909 N_("ntlm reply not an initReply", ""));
913 ret = copy_NTLMInitReply(&irep.u.ntlmInitReply, &ntlm->initReply);
928 krb5_ntlm ntlm,
931 *flags = ntlm->initReply.flags;
937 krb5_ntlm ntlm,
942 ret = der_copy_octet_string(&ntlm->initReply.challange, challange);
951 krb5_ntlm ntlm,
956 ret = der_copy_octet_string(&ntlm->initReply.opaque, opaque);
965 krb5_ntlm ntlm,
968 *name = strdup(ntlm->initReply.targetname);
978 krb5_ntlm ntlm,
983 if (ntlm->initReply.targetinfo == NULL) {
989 ntlm->initReply.targetinfo->data,
990 ntlm->initReply.targetinfo->length);
1001 krb5_ntlm ntlm,
1013 ireq.u.ntlmRequest = ntlm->request;
1035 ret = copy_NTLMResponse(&irep.u.ntlmResponse, &ntlm->response);
1050 krb5_ntlm ntlm,
1053 ntlm->request.flags = flags;
1059 krb5_ntlm ntlm,
1062 ntlm->request.username = strdup(username);
1063 if (ntlm->request.username == NULL) {
1072 krb5_ntlm ntlm,
1075 ntlm->request.targetname = strdup(targetname);
1076 if (ntlm->request.targetname == NULL) {
1085 krb5_ntlm ntlm,
1088 ntlm->request.lm.data = malloc(len);
1089 if (ntlm->request.lm.data == NULL && len != 0) {
1093 ntlm->request.lm.length = len;
1094 memcpy(ntlm->request.lm.data, hash, len);
1100 krb5_ntlm ntlm,
1103 ntlm->request.ntlm.data = malloc(len);
1104 if (ntlm->request.ntlm.data == NULL && len != 0) {
1108 ntlm->request.ntlm.length = len;
1109 memcpy(ntlm->request.ntlm.data, hash, len);
1115 krb5_ntlm ntlm,
1118 ntlm->request.opaque.data = malloc(opaque->length);
1119 if (ntlm->request.opaque.data == NULL && opaque->length != 0) {
1123 ntlm->request.opaque.length = opaque->length;
1124 memcpy(ntlm->request.opaque.data, opaque->data, opaque->length);
1130 krb5_ntlm ntlm,
1133 ntlm->request.sessionkey = calloc(1, sizeof(*ntlm->request.sessionkey));
1134 if (ntlm->request.sessionkey == NULL) {
1138 ntlm->request.sessionkey->data = malloc(length);
1139 if (ntlm->request.sessionkey->data == NULL && length != 0) {
1143 memcpy(ntlm->request.sessionkey->data, sessionkey, length);
1144 ntlm->request.sessionkey->length = length;
1150 krb5_ntlm ntlm)
1152 return ntlm->response.success ? TRUE : FALSE;
1157 krb5_ntlm ntlm,
1160 if (ntlm->response.sessionkey == NULL) {
1162 N_("no ntlm session key", ""));
1167 ntlm->response.sessionkey->data,
1168 ntlm->response.sessionkey->length);