Searched refs:negTokenTarg (Results 1 - 25 of 30) sorted by relevance

12

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/
H A Dspnego.h62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/
H A Dspnego.h62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
H A Dspnego_parse.c296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
329 write_negTokenTarg(asn1, &spnego->negTokenTarg);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
365 data_blob_free(&spnego->negTokenTarg.responseToken);
366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/
H A Dspnego.h62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/
H A Dspnego.h62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
H A Dspnego_parse.c296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
329 write_negTokenTarg(asn1, &spnego->negTokenTarg);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
365 data_blob_free(&spnego->negTokenTarg.responseToken);
366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/
H A Dspnego.h62 negTokenTarg_t negTokenTarg; member in struct:spnego_spnego
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/
H A Dspnego.h62 struct spnego_negTokenTarg negTokenTarg; member in struct:spnego_data
H A Dspnego_parse.c296 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
329 write_negTokenTarg(asn1, &spnego->negTokenTarg);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
365 data_blob_free(&spnego->negTokenTarg.responseToken);
366 data_blob_free(&spnego->negTokenTarg.mechListMIC);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c672 /** create a server negTokenTarg
690 spnego_out.negTokenTarg.responseToken = unwrapped_out;
691 spnego_out.negTokenTarg.mechListMIC = null_data_blob;
692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic;
706 spnego_out.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c672 /** create a server negTokenTarg
690 spnego_out.negTokenTarg.responseToken = unwrapped_out;
691 spnego_out.negTokenTarg.mechListMIC = null_data_blob;
692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic;
706 spnego_out.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c672 /** create a server negTokenTarg
690 spnego_out.negTokenTarg.responseToken = unwrapped_out;
691 spnego_out.negTokenTarg.mechListMIC = null_data_blob;
692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
696 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_INCOMPLETE;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
702 spnego_out.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
703 spnego_out.negTokenTarg.mechListMIC = mech_list_mic;
706 spnego_out.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) {
299 write_negTokenTarg(&asn1, &spnego->negTokenTarg);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
337 data_blob_free(&spnego->negTokenTarg.responseToken);
338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
H A Dcliconnect.c608 DATA_BLOB negTokenTarg; local
615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL);
624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length);
627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) {
628 data_blob_free(&negTokenTarg);
635 data_blob_free(&negTokenTarg);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) {
299 write_negTokenTarg(&asn1, &spnego->negTokenTarg);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
337 data_blob_free(&spnego->negTokenTarg.responseToken);
338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
H A Dcliconnect.c608 DATA_BLOB negTokenTarg; local
615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL);
624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length);
627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) {
628 data_blob_free(&negTokenTarg);
635 data_blob_free(&negTokenTarg);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c270 if (read_negTokenTarg(&asn1, &token->negTokenTarg)) {
299 write_negTokenTarg(&asn1, &spnego->negTokenTarg);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
337 data_blob_free(&spnego->negTokenTarg.responseToken);
338 data_blob_free(&spnego->negTokenTarg.mechListMIC);
H A Dcliconnect.c608 DATA_BLOB negTokenTarg; local
615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL);
624 file_save("negTokenTarg.dat", negTokenTarg.data, negTokenTarg.length);
627 if (!cli_session_setup_blob(cli, negTokenTarg, session_key_krb5)) {
628 data_blob_free(&negTokenTarg);
635 data_blob_free(&negTokenTarg);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1147 &response.negTokenTarg.responseToken);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1167 response.negTokenTarg.responseToken = data_blob(NULL, 0);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1147 &response.negTokenTarg.responseToken);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1167 response.negTokenTarg.responseToken = data_blob(NULL, 0);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1085 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1143 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1147 &response.negTokenTarg.responseToken);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1166 response.negTokenTarg.mechListMIC = data_blob(NULL, 0);
1167 response.negTokenTarg.responseToken = data_blob(NULL, 0);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1205 /* Kerberos should never send a negTokenTarg, OID_NTLMSS
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without "
1447 if ((request.negTokenTarg.supportedMech != NULL) &&
1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) {
1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n",
1450 request.negTokenTarg.supportedMech,
1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n");
1457 raw_in_token = request.negTokenTarg.responseToken;
1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
1543 response.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without "
1447 if ((request.negTokenTarg.supportedMech != NULL) &&
1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) {
1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n",
1450 request.negTokenTarg.supportedMech,
1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n");
1457 raw_in_token = request.negTokenTarg.responseToken;
1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
1543 response.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1285 /* All subsequent requests have a blob. This might be negTokenInit or negTokenTarg */
1442 x_fprintf(x_stdout, "BH Got a negTokenTarg without "
1447 if ((request.negTokenTarg.supportedMech != NULL) &&
1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) {
1449 DEBUG(1, ("Got a negTokenTarg with mech[%s] while [%s] was already negotiated\n",
1450 request.negTokenTarg.supportedMech,
1452 x_fprintf(x_stdout, "BH Got a negTokenTarg with speficied mech\n");
1457 raw_in_token = request.negTokenTarg.responseToken;
1542 response.negTokenTarg.negResult = SPNEGO_ACCEPT_COMPLETED;
1543 response.negTokenTarg
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libsmb/
H A Dclispnego.c234 generate a negTokenTarg packet given a list of OIDs and a security blob
270 DEBUG(1,("Failed to build negTokenTarg at offset %d\n", (int)data->ofs));
280 parse a negTokenTarg packet giving a list of OIDs and a security blob
336 DEBUG(1,("Failed to parse negTokenTarg at offset %d\n", (int)data->ofs));
419 generate a SPNEGO negTokenTarg packet, ready for a EXTENDED_SECURITY
557 token.negTokenTarg.responseToken.data,
558 token.negTokenTarg.responseToken.length);

Completed in 299 milliseconds

12