• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/

Lines Matching refs:neg_ctx

44              struct negotiatedata *neg_ctx)
62 if(neg_ctx->gss)
69 if(length + 1 > sizeof(neg_ctx->server_name))
72 snprintf(neg_ctx->server_name, sizeof(neg_ctx->server_name), "%s/%s",
83 struct negotiatedata *neg_ctx = proxy?&conn->data->state.proxyneg:
113 if(neg_ctx->context) {
114 if(neg_ctx->gss != gss) {
119 neg_ctx->protocol = protocol;
120 neg_ctx->gss = gss;
123 if(neg_ctx->context && neg_ctx->status == SEC_E_OK) {
131 if(0 == strlen(neg_ctx->server_name)) {
132 ret = get_gss_name(conn, proxy, neg_ctx);
137 if(!neg_ctx->output_token) {
146 neg_ctx->max_token_length = SecurityPackage->cbMaxToken;
147 neg_ctx->output_token = malloc(neg_ctx->max_token_length);
152 header += strlen(neg_ctx->protocol);
161 neg_ctx->credentials = malloc(sizeof(CredHandle));
162 neg_ctx->context = malloc(sizeof(CtxtHandle));
164 if(!neg_ctx->credentials || !neg_ctx->context)
167 neg_ctx->status =
170 NULL, NULL, neg_ctx->credentials,
172 if(neg_ctx->status != SEC_E_OK)
176 input_token = malloc(neg_ctx->max_token_length);
192 out_sec_buff.cbBuffer = neg_ctx->max_token_length;
194 out_sec_buff.pvBuffer = neg_ctx->output_token;
207 neg_ctx->status = s_pSecFn->InitializeSecurityContext(
208 neg_ctx->credentials,
209 input_token ? neg_ctx->context : 0,
210 neg_ctx->server_name,
216 neg_ctx->context,
221 if(GSS_ERROR(neg_ctx->status))
224 if(neg_ctx->status == SEC_I_COMPLETE_NEEDED ||
225 neg_ctx->status == SEC_I_COMPLETE_AND_CONTINUE) {
226 neg_ctx->status = s_pSecFn->CompleteAuthToken(neg_ctx->context,
228 if(GSS_ERROR(neg_ctx->status))
232 neg_ctx->output_token_length = out_sec_buff.cbBuffer;
240 struct negotiatedata *neg_ctx = proxy?&conn->data->state.proxyneg:
248 (const char*)neg_ctx->output_token,
249 neg_ctx->output_token_length,
258 neg_ctx->protocol, encoded);
269 static void cleanup(struct negotiatedata *neg_ctx)
271 if(neg_ctx->context) {
272 s_pSecFn->DeleteSecurityContext(neg_ctx->context);
273 free(neg_ctx->context);
274 neg_ctx->context = 0;
277 if(neg_ctx->credentials) {
278 s_pSecFn->FreeCredentialsHandle(neg_ctx->credentials);
279 free(neg_ctx->credentials);
280 neg_ctx->credentials = 0;
283 if(neg_ctx->output_token) {
284 free(neg_ctx->output_token);
285 neg_ctx->output_token = 0;
288 neg_ctx->max_token_length = 0;