/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
|
H A D | spnego_parse.c | 296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) { 329 write_negTokenTarg(asn1, &spnego->negTokenTarg); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech)); 365 data_blob_free(&spnego->negTokenTarg.responseToken); 366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
|
H A D | spnego_parse.c | 296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) { 329 write_negTokenTarg(asn1, &spnego->negTokenTarg); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech)); 365 data_blob_free(&spnego->negTokenTarg.responseToken); 366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
|
H A D | spnego_parse.c | 296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) { 329 write_negTokenTarg(asn1, &spnego->negTokenTarg); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech)); 365 data_blob_free(&spnego->negTokenTarg.responseToken); 366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 672 /** create a server negTokenTarg 690 spnego_out.negTokenTarg.responseToken = unwrapped_out; 691 spnego_out.negTokenTarg.mechListMIC = null_data_blob; 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic; 706 spnego_out.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 672 /** create a server negTokenTarg 690 spnego_out.negTokenTarg.responseToken = unwrapped_out; 691 spnego_out.negTokenTarg.mechListMIC = null_data_blob; 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic; 706 spnego_out.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 672 /** create a server negTokenTarg 690 spnego_out.negTokenTarg.responseToken = unwrapped_out; 691 spnego_out.negTokenTarg.mechListMIC = null_data_blob; 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic; 706 spnego_out.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) { 299 write_negTokenTarg(&asn1, &spnego->negTokenTarg); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech); 337 data_blob_free(&spnego->negTokenTarg.responseToken); 338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
H A D | cliconnect.c | 608 DATA_BLOB negTokenTarg; local 615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL); 624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length); 627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) { 628 data_blob_free(&negTokenTarg); 635 data_blob_free(&negTokenTarg);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) { 299 write_negTokenTarg(&asn1, &spnego->negTokenTarg); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech); 337 data_blob_free(&spnego->negTokenTarg.responseToken); 338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
H A D | cliconnect.c | 608 DATA_BLOB negTokenTarg; local 615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL); 624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length); 627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) { 628 data_blob_free(&negTokenTarg); 635 data_blob_free(&negTokenTarg);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) { 299 write_negTokenTarg(&asn1, &spnego->negTokenTarg); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech); 337 data_blob_free(&spnego->negTokenTarg.responseToken); 338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
|
H A D | cliconnect.c | 608 DATA_BLOB negTokenTarg; local 615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL); 624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length); 627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) { 628 data_blob_free(&negTokenTarg); 635 data_blob_free(&negTokenTarg);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1147 &response.negTokenTarg.responseToken); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1167 response.negTokenTarg.responseToken = data_blob(NULL, 0); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1147 &response.negTokenTarg.responseToken); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1167 response.negTokenTarg.responseToken = data_blob(NULL, 0); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1147 &response.negTokenTarg.responseToken); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0); 1167 response.negTokenTarg.responseToken = data_blob(NULL, 0); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without " 1447 if ((request.negTokenTarg.supportedMech != NULL) && 1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) { 1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n", 1450 request.negTokenTarg.supportedMech, 1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n"); 1457 raw_in_token = request.negTokenTarg.responseToken; 1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 1543 response.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without " 1447 if ((request.negTokenTarg.supportedMech != NULL) && 1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) { 1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n", 1450 request.negTokenTarg.supportedMech, 1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n"); 1457 raw_in_token = request.negTokenTarg.responseToken; 1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 1543 response.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */ 1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without " 1447 if ((request.negTokenTarg.supportedMech != NULL) && 1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) { 1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n", 1450 request.negTokenTarg.supportedMech, 1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n"); 1457 raw_in_token = request.negTokenTarg.responseToken; 1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED; 1543 response.negTokenTarg [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libsmb/ |
H A D | clispnego.c | 234 generate a negTokenTarg packet given a list of OIDs and a security blob 270 DEBUG(1,("Failed to build negTokenTarg at offset %d\n", (int)data->ofs)); 280 parse a negTokenTarg packet giving a list of OIDs and a security blob 336 DEBUG(1,("Failed to parse negTokenTarg at offset %d\n", (int)data->ofs)); 419 generate a SPNEGO negTokenTarg packet, ready for a EXTENDED_SECURITY 557 token.negTokenTarg.responseToken.data, 558 token.negTokenTarg.responseToken.length);
|