/external/curl/lib/vauth/ |
D | ntlm_sspi.c | 92 struct ntlmdata *ntlm, in Curl_auth_create_ntlm_type1_message() argument 103 Curl_auth_cleanup_ntlm(ntlm); in Curl_auth_create_ntlm_type1_message() 113 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_auth_create_ntlm_type1_message() 119 ntlm->output_token = malloc(ntlm->token_max); in Curl_auth_create_ntlm_type1_message() 120 if(!ntlm->output_token) in Curl_auth_create_ntlm_type1_message() 127 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_auth_create_ntlm_type1_message() 132 ntlm->p_identity = &ntlm->identity; in Curl_auth_create_ntlm_type1_message() 136 ntlm->p_identity = NULL; in Curl_auth_create_ntlm_type1_message() 139 ntlm->credentials = calloc(1, sizeof(CredHandle)); in Curl_auth_create_ntlm_type1_message() 140 if(!ntlm->credentials) in Curl_auth_create_ntlm_type1_message() [all …]
|
D | ntlm.c | 173 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument 194 free(ntlm->target_info); /* replace any previous data */ in ntlm_decode_type2_target() 195 ntlm->target_info = malloc(target_info_len); in ntlm_decode_type2_target() 196 if(!ntlm->target_info) in ntlm_decode_type2_target() 199 memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len); in ntlm_decode_type2_target() 203 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target() 256 struct ntlmdata *ntlm) in Curl_auth_decode_ntlm_type2_message() argument 302 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message() 313 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_auth_decode_ntlm_type2_message() 314 memcpy(ntlm->nonce, &type2[24], 8); in Curl_auth_decode_ntlm_type2_message() [all …]
|
D | vauth.h | 128 struct ntlmdata *ntlm, 135 struct ntlmdata *ntlm); 141 struct ntlmdata *ntlm, 145 void Curl_auth_cleanup_ntlm(struct ntlmdata *ntlm);
|
/external/curl/lib/ |
D | curl_ntlm_wb.c | 79 static void ntlm_wb_cleanup(struct ntlmdata *ntlm) in ntlm_wb_cleanup() argument 81 if(ntlm->ntlm_auth_hlpr_socket != CURL_SOCKET_BAD) { in ntlm_wb_cleanup() 82 sclose(ntlm->ntlm_auth_hlpr_socket); in ntlm_wb_cleanup() 83 ntlm->ntlm_auth_hlpr_socket = CURL_SOCKET_BAD; in ntlm_wb_cleanup() 86 if(ntlm->ntlm_auth_hlpr_pid) { in ntlm_wb_cleanup() 89 pid_t ret = waitpid(ntlm->ntlm_auth_hlpr_pid, NULL, WNOHANG); in ntlm_wb_cleanup() 90 if(ret == ntlm->ntlm_auth_hlpr_pid || errno == ECHILD) in ntlm_wb_cleanup() 94 kill(ntlm->ntlm_auth_hlpr_pid, SIGTERM); in ntlm_wb_cleanup() 102 kill(ntlm->ntlm_auth_hlpr_pid, SIGKILL); in ntlm_wb_cleanup() 108 ntlm->ntlm_auth_hlpr_pid = 0; in ntlm_wb_cleanup() [all …]
|
D | http_ntlm.c | 68 struct ntlmdata *ntlm; in Curl_input_ntlm() local 72 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm() 82 result = Curl_auth_decode_ntlm_type2_message(conn->data, header, ntlm); in Curl_input_ntlm() 131 struct ntlmdata *ntlm; in Curl_output_ntlm() local 148 ntlm = &conn->proxyntlm; in Curl_output_ntlm() 162 ntlm = &conn->ntlm; in Curl_output_ntlm() 183 ntlm->sslContext = conn->sslContext; in Curl_output_ntlm() 193 ntlm, &base64, in Curl_output_ntlm() 214 ntlm, &base64, &len); in Curl_output_ntlm() 250 Curl_auth_cleanup_ntlm(&conn->ntlm); in Curl_http_auth_cleanup_ntlm()
|
D | curl_ntlm_core.c | 125 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4) 625 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument 682 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp() 685 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
|
D | curl_sasl.c | 96 Curl_auth_cleanup_ntlm(&conn->ntlm); in Curl_sasl_cleanup() 345 &conn->ntlm, &resp, in Curl_sasl_start() 514 &conn->ntlm, &resp, &len); in Curl_sasl_continue() 521 &conn->ntlm); in Curl_sasl_continue() 524 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
|
D | curl_ntlm_core.h | 90 struct ntlmdata *ntlm,
|
/external/curl/docs/cmdline-opts/ |
D | ntlm-wb.d | 1 Long: ntlm-wb 4 See-also: ntlm proxy-ntlm 7 Enables NTLM much in the style --ntlm does, but hand over the authentication
|
D | ntlm.d | 1 Long: ntlm 4 See-also: proxy-ntlm 17 --proxy-ntlm.
|
D | proxy-ntlm.d | 1 Long: proxy-ntlm 7 proxy. Use --ntlm for enabling NTLM with a remote host.
|
D | Makefile.inc | 128 ntlm.d ntlm-wb.d \ 160 proxy-ntlm.d \
|
D | basic.d | 10 --ntlm, --digest, or --negotiate).
|
D | digest.d | 4 Mutexed: basic ntlm negotiate
|
D | negotiate.d | 4 See-also: basic ntlm anyauth proxy-negotiate
|
D | anyauth.d | 11 method, which you can do with --basic, --digest, --ntlm, and --negotiate.
|
/external/curl/tests/data/ |
D | test2057 | 6 HTTP Negotiate auth (stub ntlm) 11 <!-- First request, expect 401 (ntlm challenge) --> 54 HTTP Negotiate authentication (stub ntlm)
|
D | test170 | 27 HTTP POST with --proxy-ntlm and no SSL with no response 30 http://a.galaxy.far.far.away/170 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm…
|
D | test162 | 38 HTTP GET asking for --proxy-ntlm when some other authentication is required 41 http://%HOSTIP:%HTTPPORT/162 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --f…
|
D | test1097 | 53 HTTP POST using CONNECT with --proxy-ntlm but no auth is required 56 …TTPPORT/1097 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
|
D | test176 | 58 HTTP POST --ntlm to server not requiring any auth at all 61 http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
|
/external/curl/docs/ |
D | options-in-versions | 127 --ntlm 7.10.6 128 --ntlm-wb 7.22.0 161 --proxy-ntlm 7.10.7
|
/external/curl/packages/vms/ |
D | gnv_curl_configure.sh | 44 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
|
/external/curl/tests/server/ |
D | rtspd.c | 109 bool ntlm; /* Authorization ntlm header found */ member 524 else if(!req->ntlm && in ProcessRequest() 528 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 534 else if(!req->ntlm && in ProcessRequest() 538 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 675 req->ntlm = FALSE; in get_request()
|
/external/curl/ |
D | androidconfigure | 48 --disable-ntlm-wb
|