/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 54 char *supportedMech; member in struct:spnego_negTokenTarg
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 54 const char *supportedMech; member in struct:spnego_negTokenTarg
|
H A D | spnego_parse.c | 202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech); 238 if (token->supportedMech) { 240 asn1_write_OID(asn1, token->supportedMech); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 54 char *supportedMech; member in struct:spnego_negTokenTarg
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 54 const char *supportedMech; member in struct:spnego_negTokenTarg
|
H A D | spnego_parse.c | 202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech); 238 if (token->supportedMech) { 240 asn1_write_OID(asn1, token->supportedMech); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/include/ |
H A D | spnego.h | 54 char *supportedMech; member in struct:spnego_negTokenTarg
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/libcli/auth/ |
H A D | spnego.h | 54 const char *supportedMech; member in struct:spnego_negTokenTarg
|
H A D | spnego_parse.c | 202 asn1_read_OID(asn1, mem_ctx, &token->supportedMech); 238 if (token->supportedMech) { 240 asn1_write_OID(asn1, token->supportedMech); 362 if (spnego->negTokenTarg.supportedMech) { 363 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 191 asn1_read_OID(asn1, &token->supportedMech); 225 if (token->supportedMech) { 227 asn1_write_OID(asn1, token->supportedMech); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 191 asn1_read_OID(asn1, &token->supportedMech); 225 if (token->supportedMech) { 227 asn1_write_OID(asn1, token->supportedMech); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libsmb/ |
H A D | spnego.c | 191 asn1_read_OID(asn1, &token->supportedMech); 225 if (token->supportedMech) { 227 asn1_write_OID(asn1, token->supportedMech); 334 if (spnego->negTokenTarg.supportedMech) { 335 free(spnego->negTokenTarg.supportedMech);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 976 spnego.negTokenTarg.supportedMech && 977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) { 979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech), 992 spnego.negTokenTarg.supportedMech); 1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech); 1071 spnego_out.negTokenTarg.supportedMech = NULL;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 976 spnego.negTokenTarg.supportedMech && 977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) { 979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech), 992 spnego.negTokenTarg.supportedMech); 1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech); 1071 spnego_out.negTokenTarg.supportedMech = NULL;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/auth/gensec/ |
H A D | spnego.c | 692 spnego_out.negTokenTarg.supportedMech = NULL; 695 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 700 spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; 976 spnego.negTokenTarg.supportedMech && 977 strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) { 979 gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech), 992 spnego.negTokenTarg.supportedMech); 1002 spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech); 1071 spnego_out.negTokenTarg.supportedMech = NULL;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1208 request.negTokenTarg.supportedMech)); 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1597 if (spnego.negTokenTarg.supportedMech == NULL) { 1620 if (strcmp(spnego.negTokenTarg.supportedMech, 1627 if (strcmp(spnego.negTokenTarg.supportedMech, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1208 request.negTokenTarg.supportedMech)); 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1597 if (spnego.negTokenTarg.supportedMech == NULL) { 1620 if (strcmp(spnego.negTokenTarg.supportedMech, 1627 if (strcmp(spnego.negTokenTarg.supportedMech, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 1142 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1165 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); 1203 if ( (request.negTokenTarg.supportedMech == NULL) || 1204 ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { 1208 request.negTokenTarg.supportedMech)); 1224 response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); 1381 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1597 if (spnego.negTokenTarg.supportedMech == NULL) { 1620 if (strcmp(spnego.negTokenTarg.supportedMech, 1627 if (strcmp(spnego.negTokenTarg.supportedMech, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 53 nt.u.negTokenResp.supportedMech = NULL; 190 ALLOC(nt.u.negTokenResp.supportedMech, 1); 191 if (nt.u.negTokenResp.supportedMech == NULL) { 199 nt.u.negTokenResp.supportedMech, 207 nt.u.negTokenResp.supportedMech = NULL;
|
H A D | init_sec_context.c | 109 nt.u.negTokenResp.supportedMech = NULL; 429 /* || resp.u.negTokenResp.supportedMech == NULL */ 443 if (resp.u.negTokenResp.supportedMech) { 452 resp.u.negTokenResp.supportedMech,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 53 nt.u.negTokenResp.supportedMech = NULL; 190 ALLOC(nt.u.negTokenResp.supportedMech, 1); 191 if (nt.u.negTokenResp.supportedMech == NULL) { 199 nt.u.negTokenResp.supportedMech, 207 nt.u.negTokenResp.supportedMech = NULL;
|
H A D | init_sec_context.c | 109 nt.u.negTokenResp.supportedMech = NULL; 429 /* || resp.u.negTokenResp.supportedMech == NULL */ 443 if (resp.u.negTokenResp.supportedMech) { 452 resp.u.negTokenResp.supportedMech,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 53 nt.u.negTokenResp.supportedMech = NULL; 190 ALLOC(nt.u.negTokenResp.supportedMech, 1); 191 if (nt.u.negTokenResp.supportedMech == NULL) { 199 nt.u.negTokenResp.supportedMech, 207 nt.u.negTokenResp.supportedMech = NULL;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1255 char *supportedMech = NULL; local 1425 supportedMech = talloc_strdup(ctx, state->spnego_mech_oid); 1426 if (supportedMech == NULL) { 1447 if ((request.negTokenTarg.supportedMech != NULL) && 1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) { 1450 request.negTokenTarg.supportedMech, 1548 response.negTokenTarg.supportedMech = supportedMech; 1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1922 if (spnego.negTokenTarg.supportedMech [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/utils/ |
H A D | ntlm_auth.c | 1255 char *supportedMech = NULL; local 1425 supportedMech = talloc_strdup(ctx, state->spnego_mech_oid); 1426 if (supportedMech == NULL) { 1447 if ((request.negTokenTarg.supportedMech != NULL) && 1448 (strcmp(request.negTokenTarg.supportedMech, state->spnego_mech_oid) != 0 ) ) { 1450 request.negTokenTarg.supportedMech, 1548 response.negTokenTarg.supportedMech = supportedMech; 1700 spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; 1922 if (spnego.negTokenTarg.supportedMech [all...] |