/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/ |
H A D | asn_1.h | 57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/ |
H A D | asn_1.h | 57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/ |
H A D | asn_1.h | 57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/ |
H A D | clispnego.c | 351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL}; 395 asn1_check_OID(&data, OID_NTLMSSP); 546 asn1_check_OID(&data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/ |
H A D | clispnego.c | 351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL}; 395 asn1_check_OID(&data, OID_NTLMSSP); 546 asn1_check_OID(&data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/ |
H A D | clispnego.c | 351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL}; 395 asn1_check_OID(&data, OID_NTLMSSP); 546 asn1_check_OID(&data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP); 1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP); 1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) { 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1282 const char *my_mechs[] = {OID_NTLMSSP, NULL}; 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1582 if (strcmp(*mechType, OID_NTLMSSP) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP); 1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP); 1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) { 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1282 const char *my_mechs[] = {OID_NTLMSSP, NULL}; 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1582 if (strcmp(*mechType, OID_NTLMSSP) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP); 1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP); 1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) { 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1282 const char *my_mechs[] = {OID_NTLMSSP, NULL}; 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1582 if (strcmp(*mechType, OID_NTLMSSP) [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/smbd/ |
H A D | negprot.c | 183 OID_NTLMSSP, 185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/smbd/ |
H A D | negprot.c | 183 OID_NTLMSSP, 185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/smbd/ |
H A D | negprot.c | 183 OID_NTLMSSP, 185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libsmb/ |
H A D | clispnego.c | 429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL}; 478 asn1_check_OID(data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/smbd/ |
H A D | negprot.c | 192 OID_NTLMSSP, 194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libsmb/ |
H A D | clispnego.c | 429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL}; 478 asn1_check_OID(data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/smbd/ |
H A D | negprot.c | 192 OID_NTLMSSP, 194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libsmb/ |
H A D | clispnego.c | 429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL}; 478 asn1_check_OID(data, OID_NTLMSSP);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/smbd/ |
H A D | negprot.c | 192 OID_NTLMSSP, 194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libads/ |
H A D | sasl.c | 184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out); 233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, 380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libads/ |
H A D | sasl.c | 184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out); 233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, 380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libads/ |
H A D | sasl.c | 184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out); 233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, 380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1170 spnego.negTokenInit.mechTypes[2] = talloc_strdup(ctx, OID_NTLMSSP); 1173 spnego.negTokenInit.mechTypes[0] = talloc_strdup(ctx, OID_NTLMSSP); 1372 if (strcmp(request.negTokenInit.mechTypes[i], OID_NTLMSSP) == 0) { 1597 const char *my_mechs[] = {OID_NTLMSSP, NULL}; 1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1907 if (strcmp(*mechType, OID_NTLMSSP) == 0) { 1948 OID_NTLMSSP) == 0) {
|