/third_party/curl/lib/vauth/ |
D | ntlm_sspi.c | 92 struct ntlmdata *ntlm, in Curl_auth_create_ntlm_type1_message() argument 103 Curl_auth_cleanup_ntlm(ntlm); in Curl_auth_create_ntlm_type1_message() 113 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_auth_create_ntlm_type1_message() 119 ntlm->output_token = malloc(ntlm->token_max); in Curl_auth_create_ntlm_type1_message() 120 if(!ntlm->output_token) in Curl_auth_create_ntlm_type1_message() 127 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_auth_create_ntlm_type1_message() 132 ntlm->p_identity = &ntlm->identity; in Curl_auth_create_ntlm_type1_message() 136 ntlm->p_identity = NULL; in Curl_auth_create_ntlm_type1_message() 139 ntlm->credentials = calloc(1, sizeof(CredHandle)); in Curl_auth_create_ntlm_type1_message() 140 if(!ntlm->credentials) in Curl_auth_create_ntlm_type1_message() [all …]
|
D | ntlm.c | 164 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument 187 free(ntlm->target_info); /* replace any previous data */ in ntlm_decode_type2_target() 188 ntlm->target_info = Curl_memdup(&type2[target_info_offset], in ntlm_decode_type2_target() 190 if(!ntlm->target_info) in ntlm_decode_type2_target() 195 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target() 247 struct ntlmdata *ntlm) in Curl_auth_decode_ntlm_type2_message() argument 275 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message() 285 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_auth_decode_ntlm_type2_message() 286 memcpy(ntlm->nonce, &type2[24], 8); in Curl_auth_decode_ntlm_type2_message() 288 if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) { in Curl_auth_decode_ntlm_type2_message() [all …]
|
D | vauth.h | 155 struct ntlmdata *ntlm, 161 struct ntlmdata *ntlm); 167 struct ntlmdata *ntlm, 171 void Curl_auth_cleanup_ntlm(struct ntlmdata *ntlm);
|
/third_party/curl/lib/ |
D | curl_ntlm_wb.c | 81 static void ntlm_wb_cleanup(struct ntlmdata *ntlm) in ntlm_wb_cleanup() argument 83 if(ntlm->ntlm_auth_hlpr_socket != CURL_SOCKET_BAD) { in ntlm_wb_cleanup() 84 sclose(ntlm->ntlm_auth_hlpr_socket); in ntlm_wb_cleanup() 85 ntlm->ntlm_auth_hlpr_socket = CURL_SOCKET_BAD; in ntlm_wb_cleanup() 88 if(ntlm->ntlm_auth_hlpr_pid) { in ntlm_wb_cleanup() 91 pid_t ret = waitpid(ntlm->ntlm_auth_hlpr_pid, NULL, WNOHANG); in ntlm_wb_cleanup() 92 if(ret == ntlm->ntlm_auth_hlpr_pid || errno == ECHILD) in ntlm_wb_cleanup() 96 kill(ntlm->ntlm_auth_hlpr_pid, SIGTERM); in ntlm_wb_cleanup() 104 kill(ntlm->ntlm_auth_hlpr_pid, SIGKILL); in ntlm_wb_cleanup() 110 ntlm->ntlm_auth_hlpr_pid = 0; in ntlm_wb_cleanup() [all …]
|
D | http_ntlm.c | 71 struct ntlmdata *ntlm; in Curl_input_ntlm() local 76 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm() 95 result = Curl_auth_decode_ntlm_type2_message(data, &hdrbuf, ntlm); in Curl_input_ntlm() 147 struct ntlmdata *ntlm; in Curl_output_ntlm() local 163 ntlm = &conn->proxyntlm; in Curl_output_ntlm() 177 ntlm = &conn->ntlm; in Curl_output_ntlm() 198 ntlm->sslContext = conn->sslContext; in Curl_output_ntlm() 215 ntlm, &ntlmmsg); in Curl_output_ntlm() 235 ntlm, &ntlmmsg); in Curl_output_ntlm() 267 Curl_auth_cleanup_ntlm(&conn->ntlm); in Curl_http_auth_cleanup_ntlm()
|
D | curl_ntlm_core.c | 132 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4) 553 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument 607 if(ntlm->target_info_len) in Curl_ntlm_core_mk_ntlmv2_resp() 608 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp() 611 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
|
D | curl_sasl.c | 113 Curl_auth_cleanup_ntlm(&conn->ntlm); in Curl_sasl_cleanup() 457 &conn->ntlm, &resp); in Curl_sasl_start() 624 &conn->ntlm, &resp); in Curl_sasl_continue() 632 &conn->ntlm); in Curl_sasl_continue() 635 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
|
D | curl_ntlm_core.h | 66 struct ntlmdata *ntlm,
|
/third_party/curl/docs/cmdline-opts/ |
D | ntlm-wb.md | 4 Long: ntlm-wb 11 - ntlm 12 - proxy-ntlm 14 - --ntlm-wb -u user:password $URL 17 # `--ntlm-wb` 19 Enables NTLM much in the style --ntlm does, but hand over the authentication
|
D | ntlm.md | 4 Long: ntlm 13 - proxy-ntlm 15 - --ntlm -u user:password $URL 18 # `--ntlm` 28 --proxy-ntlm.
|
D | proxy-ntlm.md | 4 Long: proxy-ntlm 13 - --proxy-ntlm --proxy-user user:passwd -x http://proxy $URL 16 # `--proxy-ntlm` 19 proxy. Use --ntlm for enabling NTLM with a remote host.
|
D | Makefile.inc | 176 ntlm-wb.md \ 177 ntlm.md \ 211 proxy-ntlm.md \
|
D | digest.md | 7 Mutexed: basic ntlm negotiate
|
D | basic.md | 21 --ntlm, --digest, or --negotiate).
|
D | oauth2-bearer.md | 13 - ntlm
|
/third_party/curl/tests/data/ |
D | test2057 | 6 HTTP Negotiate auth (stub ntlm) 11 <!-- First request, expect 401 (ntlm challenge) --> 54 HTTP Negotiate authentication (stub ntlm)
|
D | test170 | 28 HTTP POST with --proxy-ntlm and no SSL with no response 31 …way/%TESTNUMBER --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -F "dummy=value"
|
D | test162 | 38 HTTP GET asking for --proxy-ntlm when some other authentication is required 41 …TIP:%HTTPPORT/%TESTNUMBER --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --fail
|
D | test1097 | 53 HTTP POST using CONNECT with --proxy-ntlm but no auth is required 56 …/%TESTNUMBER --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
|
D | test176 | 58 HTTP POST --ntlm to server not requiring any auth at all 61 http://%HOSTIP:%HTTPPORT/%TESTNUMBER -u auser:apasswd --ntlm -d "junkelijunk"
|
/third_party/curl/docs/libcurl/ |
D | libcurl-env.md | 68 User name to use when invoking the *ntlm-wb* tool, if *NTLMUSER* was 79 User name to use when invoking the *ntlm-wb* tool. 93 User name to use when invoking the *ntlm-wb* tool, if *NTLMUSER* and
|
/third_party/curl/docs/ |
D | options-in-versions | 141 --ntlm 7.10.6 142 --ntlm-wb 7.22.0 177 --proxy-ntlm 7.10.7
|
/third_party/curl/tests/server/ |
D | rtspd.c | 109 bool ntlm; /* Authorization ntlm header found */ member 530 else if(!req->ntlm && in ProcessRequest() 534 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 540 else if(!req->ntlm && in ProcessRequest() 544 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 683 req->ntlm = FALSE; in get_request()
|
/third_party/curl/packages/vms/ |
D | gnv_curl_configure.sh | 42 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
|
/third_party/curl/m4/ |
D | curl-confopts.m4 | 574 dnl --enable-ntlm-wb or --disable-ntlm-wb, and set 581 AC_ARG_ENABLE(ntlm-wb, 582 AS_HELP_STRING([--enable-ntlm-wb@<:@=FILE@:>@],[Enable NTLM delegation to winbind's ntlm_auth helpe… 583 AS_HELP_STRING([--disable-ntlm-wb],[Disable NTLM delegation to winbind's ntlm_auth helper]), 588 dnl --disable-ntlm-wb option used 596 dnl --enable-ntlm-wb option used
|