Searched refs:supportedMech (Results 1 - 25 of 27) sorted by relevance

12

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/
H A Dspnego.h54 char *supportedMech; member in struct:spnego_negTokenTarg
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/
H A Dspnego.h54 const char *supportedMech; member in struct:spnego_negTokenTarg
H A Dspnego_parse.c202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
238 if (token->supportedMech) {
240 asn1_write_OID(asn1, token->supportedMech);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/
H A Dspnego.h54 char *supportedMech; member in struct:spnego_negTokenTarg
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/
H A Dspnego.h54 const char *supportedMech; member in struct:spnego_negTokenTarg
H A Dspnego_parse.c202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
238 if (token->supportedMech) {
240 asn1_write_OID(asn1, token->supportedMech);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/
H A Dspnego.h54 char *supportedMech; member in struct:spnego_negTokenTarg
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/
H A Dspnego.h54 const char *supportedMech; member in struct:spnego_negTokenTarg
H A Dspnego_parse.c202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
238 if (token->supportedMech) {
240 asn1_write_OID(asn1, token->supportedMech);
362 if (spnego->negTokenTarg.supportedMech) {
363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c191 asn1_read_OID(asn1, &token->supportedMech);
225 if (token->supportedMech) {
227 asn1_write_OID(asn1, token->supportedMech);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c191 asn1_read_OID(asn1, &token->supportedMech);
225 if (token->supportedMech) {
227 asn1_write_OID(asn1, token->supportedMech);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/
H A Dspnego.c191 asn1_read_OID(asn1, &token->supportedMech);
225 if (token->supportedMech) {
227 asn1_write_OID(asn1, token->supportedMech);
334 if (spnego->negTokenTarg.supportedMech) {
335 free(spnego->negTokenTarg.supportedMech);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
976 spnego.negTokenTarg.supportedMech &&
977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) {
979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech),
992 spnego.negTokenTarg.supportedMech);
1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech);
1071 spnego_out.negTokenTarg.supportedMech = NULL;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
976 spnego.negTokenTarg.supportedMech &&
977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) {
979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech),
992 spnego.negTokenTarg.supportedMech);
1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech);
1071 spnego_out.negTokenTarg.supportedMech = NULL;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/auth/gensec/
H A Dspnego.c692 spnego_out.negTokenTarg.supportedMech = NULL;
695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
976 spnego.negTokenTarg.supportedMech &&
977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) {
979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech),
992 spnego.negTokenTarg.supportedMech);
1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech);
1071 spnego_out.negTokenTarg.supportedMech = NULL;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1208 request.negTokenTarg.supportedMech));
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1597 if (spnego.negTokenTarg.supportedMech == NULL) {
1620 if (strcmp(spnego.negTokenTarg.supportedMech,
1627 if (strcmp(spnego.negTokenTarg.supportedMech,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1208 request.negTokenTarg.supportedMech));
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1597 if (spnego.negTokenTarg.supportedMech == NULL) {
1620 if (strcmp(spnego.negTokenTarg.supportedMech,
1627 if (strcmp(spnego.negTokenTarg.supportedMech,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/
H A Dntlm_auth.c1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
1203 if ( (request.negTokenTarg.supportedMech == NULL) ||
1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
1208 request.negTokenTarg.supportedMech));
1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1597 if (spnego.negTokenTarg.supportedMech == NULL) {
1620 if (strcmp(spnego.negTokenTarg.supportedMech,
1627 if (strcmp(spnego.negTokenTarg.supportedMech,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/
H A Daccept_sec_context.c53 nt.u.negTokenResp.supportedMech = NULL;
190 ALLOC(nt.u.negTokenResp.supportedMech, 1);
191 if (nt.u.negTokenResp.supportedMech == NULL) {
199 nt.u.negTokenResp.supportedMech,
207 nt.u.negTokenResp.supportedMech = NULL;
H A Dinit_sec_context.c109 nt.u.negTokenResp.supportedMech = NULL;
429 /* || resp.u.negTokenResp.supportedMech == NULL */
443 if (resp.u.negTokenResp.supportedMech) {
452 resp.u.negTokenResp.supportedMech,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/
H A Daccept_sec_context.c53 nt.u.negTokenResp.supportedMech = NULL;
190 ALLOC(nt.u.negTokenResp.supportedMech, 1);
191 if (nt.u.negTokenResp.supportedMech == NULL) {
199 nt.u.negTokenResp.supportedMech,
207 nt.u.negTokenResp.supportedMech = NULL;
H A Dinit_sec_context.c109 nt.u.negTokenResp.supportedMech = NULL;
429 /* || resp.u.negTokenResp.supportedMech == NULL */
443 if (resp.u.negTokenResp.supportedMech) {
452 resp.u.negTokenResp.supportedMech,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/
H A Daccept_sec_context.c53 nt.u.negTokenResp.supportedMech = NULL;
190 ALLOC(nt.u.negTokenResp.supportedMech, 1);
191 if (nt.u.negTokenResp.supportedMech == NULL) {
199 nt.u.negTokenResp.supportedMech,
207 nt.u.negTokenResp.supportedMech = NULL;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1255 char *supportedMech = NULL; local
1425 supportedMech = talloc_strdup(ctx, state->spnego_mech_oid);
1426 if (supportedMech == NULL) {
1447 if ((request.negTokenTarg.supportedMech != NULL) &&
1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) {
1450 request.negTokenTarg.supportedMech,
1548 response.negTokenTarg.supportedMech = supportedMech;
1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1922 if (spnego.negTokenTarg.supportedMech
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/utils/
H A Dntlm_auth.c1255 char *supportedMech = NULL; local
1425 supportedMech = talloc_strdup(ctx, state->spnego_mech_oid);
1426 if (supportedMech == NULL) {
1447 if ((request.negTokenTarg.supportedMech != NULL) &&
1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) {
1450 request.negTokenTarg.supportedMech,
1548 response.negTokenTarg.supportedMech = supportedMech;
1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
1922 if (spnego.negTokenTarg.supportedMech
[all...]

Completed in 371 milliseconds

12