Lines Matching refs:answer

1017 	    unsigned char *answer)
1036 EVP_Cipher(ctx, answer, challenge, 8);
1094 * @param answer calculated answer, should be freed with heim_ntlm_free_buf().
1105 struct ntlm_buf *answer)
1116 answer->data = malloc(24);
1117 if (answer->data == NULL)
1119 answer->length = 24;
1121 ret = splitandenc(&res[0], challenge, ((unsigned char *)answer->data) + 0);
1124 ret = splitandenc(&res[7], challenge, ((unsigned char *)answer->data) + 8);
1127 ret = splitandenc(&res[14], challenge, ((unsigned char *)answer->data) + 16);
1134 heim_ntlm_free_buf(answer);
1449 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1463 struct ntlm_buf *answer)
1475 answer->data = malloc(24);
1476 if (answer->data == NULL)
1478 answer->length = 24;
1481 serverchallenge, answer->data);
1485 memcpy(((uint8_t *)answer->data) + 16, clientchallenge, 8);
1501 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1516 struct ntlm_buf *answer)
1535 /* calculate and build ntlmv2 answer */
1579 answer->data = data.data;
1580 answer->length = data.length;
1600 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1616 const struct ntlm_buf *answer,
1633 if (answer->length < 16)
1643 /* calculate and build ntlmv2 answer */
1645 sp = krb5_storage_from_readonly_mem(answer->data, answer->length);
1675 infotarget->length = answer->length - krb5_storage_seek(sp, 0, SEEK_CUR);
1687 if (answer->length < 16) {
1693 ((unsigned char *)answer->data) + 16, answer->length - 16,