Searched refs:OID_NTLMSSP (Results 1 - 25 of 63) sorted by relevance

123

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/
H A Dspnego.h24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/
H A Dspnego.h24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/
H A Dspnego.h24 #define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/
H A Dasn_1.h57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/
H A Dasn_1.h57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/
H A Dasn_1.h57 #define OID_NTLMSSP "1 3 6 1 4 1 311 2 2 10" macro
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/
H A Dclispnego.c351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL};
395 asn1_check_OID(&data, OID_NTLMSSP);
546 asn1_check_OID(&data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/
H A Dclispnego.c351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL};
395 asn1_check_OID(&data, OID_NTLMSSP);
546 asn1_check_OID(&data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/
H A Dclispnego.c351 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL};
395 asn1_check_OID(&data, OID_NTLMSSP);
546 asn1_check_OID(&data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP);
1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP);
1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) {
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1282 const char *my_mechs[] = {OID_NTLMSSP, NULL};
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1582 if (strcmp(*mechType, OID_NTLMSSP)
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP);
1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP);
1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) {
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1282 const char *my_mechs[] = {OID_NTLMSSP, NULL};
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1582 if (strcmp(*mechType, OID_NTLMSSP)
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1014 spnego.negTokenInit.mechTypes[1] = smb_xstrdup(OID_NTLMSSP);
1017 spnego.negTokenInit.mechTypes[0] = smb_xstrdup(OID_NTLMSSP);
1116 if (strcmp(request.negTokenInit.mechTypes[0], OID_NTLMSSP) == 0) {
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSSP
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1282 const char *my_mechs[] = {OID_NTLMSSP, NULL};
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1582 if (strcmp(*mechType, OID_NTLMSSP)
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/smbd/
H A Dnegprot.c183 OID_NTLMSSP,
185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/smbd/
H A Dnegprot.c183 OID_NTLMSSP,
185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/smbd/
H A Dnegprot.c183 OID_NTLMSSP,
185 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libsmb/
H A Dclispnego.c429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
478 asn1_check_OID(data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/smbd/
H A Dnegprot.c192 OID_NTLMSSP,
194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libsmb/
H A Dclispnego.c429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
478 asn1_check_OID(data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/smbd/
H A Dnegprot.c192 OID_NTLMSSP,
194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libsmb/
H A Dclispnego.c429 const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
478 asn1_check_OID(data, OID_NTLMSSP);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/smbd/
H A Dnegprot.c192 OID_NTLMSSP,
194 const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libads/
H A Dsasl.c184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out);
233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP,
380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libads/
H A Dsasl.c184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out);
233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP,
380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libads/
H A Dsasl.c184 msg1 = gen_negTokenInit(OID_NTLMSSP, blob_out);
233 if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP,
380 const char *spnego_mechs[] = {OID_KERBEROS5_OLD, OID_KERBEROS5, OID_NTLMSSP, NULL};
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1170 spnego.negTokenInit.mechTypes[2] = talloc_strdup(ctx, OID_NTLMSSP);
1173 spnego.negTokenInit.mechTypes[0] = talloc_strdup(ctx, OID_NTLMSSP);
1372 if (strcmp(request.negTokenInit.mechTypes[i], OID_NTLMSSP) == 0) {
1597 const char *my_mechs[] = {OID_NTLMSSP, NULL};
1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1907 if (strcmp(*mechType, OID_NTLMSSP) == 0) {
1948 OID_NTLMSSP) == 0) {

Completed in 179 milliseconds

123