Home
last modified time | relevance | path

Searched refs:ntlm (Results 1 – 25 of 45) sorted by relevance

12

/external/curl/lib/
Dcurl_ntlm.c68 struct ntlmdata *ntlm; in Curl_input_ntlm() local
71 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm()
80 result = Curl_sasl_decode_ntlm_type2_message(conn->data, header, ntlm); in Curl_input_ntlm()
84 ntlm->state = NTLMSTATE_TYPE2; /* We got a type-2 message */ in Curl_input_ntlm()
87 if(ntlm->state == NTLMSTATE_TYPE3) { in Curl_input_ntlm()
90 ntlm->state = NTLMSTATE_NONE; in Curl_input_ntlm()
93 else if(ntlm->state >= NTLMSTATE_TYPE1) { in Curl_input_ntlm()
98 ntlm->state = NTLMSTATE_TYPE1; /* We should send away a type-1 */ in Curl_input_ntlm()
123 struct ntlmdata *ntlm; in Curl_output_ntlm() local
138 ntlm = &conn->proxyntlm; in Curl_output_ntlm()
[all …]
Dcurl_sasl_sspi.c581 struct ntlmdata *ntlm, in Curl_sasl_create_ntlm_type1_message() argument
592 Curl_sasl_ntlm_cleanup(ntlm); in Curl_sasl_create_ntlm_type1_message()
600 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_sasl_create_ntlm_type1_message()
606 ntlm->output_token = malloc(ntlm->token_max); in Curl_sasl_create_ntlm_type1_message()
607 if(!ntlm->output_token) in Curl_sasl_create_ntlm_type1_message()
614 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_sasl_create_ntlm_type1_message()
619 ntlm->p_identity = &ntlm->identity; in Curl_sasl_create_ntlm_type1_message()
623 ntlm->p_identity = NULL; in Curl_sasl_create_ntlm_type1_message()
626 ntlm->credentials = malloc(sizeof(CredHandle)); in Curl_sasl_create_ntlm_type1_message()
627 if(!ntlm->credentials) in Curl_sasl_create_ntlm_type1_message()
[all …]
Dcurl_ntlm_msgs.c168 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument
184 ntlm->target_info = malloc(target_info_len); in ntlm_decode_type2_target()
185 if(!ntlm->target_info) in ntlm_decode_type2_target()
188 memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len); in ntlm_decode_type2_target()
192 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target()
231 struct ntlmdata *ntlm) in Curl_sasl_decode_ntlm_type2_message() argument
277 ntlm->flags = 0; in Curl_sasl_decode_ntlm_type2_message()
288 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_sasl_decode_ntlm_type2_message()
289 memcpy(ntlm->nonce, &type2[24], 8); in Curl_sasl_decode_ntlm_type2_message()
291 if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) { in Curl_sasl_decode_ntlm_type2_message()
[all …]
Dcurl_ntlm_wb.c342 struct ntlmdata *ntlm; in Curl_output_ntlm_wb() local
354 ntlm = &conn->proxyntlm; in Curl_output_ntlm_wb()
360 ntlm = &conn->ntlm; in Curl_output_ntlm_wb()
369 switch(ntlm->state) { in Curl_output_ntlm_wb()
388 res = ntlm_wb_response(conn, "YR\n", ntlm->state); in Curl_output_ntlm_wb()
404 res = ntlm_wb_response(conn, input, ntlm->state); in Curl_output_ntlm_wb()
415 ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */ in Curl_output_ntlm_wb()
Dcurl_sasl.h183 struct ntlmdata *ntlm,
190 struct ntlmdata *ntlm);
196 struct ntlmdata *ntlm,
200 void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm);
Dcurl_ntlm_core.c118 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4)
645 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument
701 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp()
704 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
Dcurl_sasl.c1145 void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm) in Curl_sasl_ntlm_cleanup() argument
1148 Curl_safefree(ntlm->target_info); in Curl_sasl_ntlm_cleanup()
1151 ntlm->target_info_len = 0; in Curl_sasl_ntlm_cleanup()
1216 Curl_sasl_ntlm_cleanup(&conn->ntlm); in Curl_sasl_cleanup()
1442 &conn->ntlm, &resp, &len); in Curl_sasl_start()
1578 &conn->ntlm, &resp, &len); in Curl_sasl_continue()
1585 &conn->ntlm); in Curl_sasl_continue()
1588 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
Dcurl_ntlm_core.h89 struct ntlmdata *ntlm,
/external/curl/tests/data/
Dtest17025 HTTP POST with --proxy-ntlm and no SSL with no response
28 http://a.galaxy.far.far.away/170 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm
Dtest16236 HTTP GET asking for --proxy-ntlm when some other authentication is required
39 http://%HOSTIP:%HTTPPORT/162 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --f…
Dtest17657 HTTP POST --ntlm to server not requiring any auth at all
60 http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
Dtest109753 HTTP POST using CONNECT with --proxy-ntlm but no auth is required
56 …TTPPORT/1097 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
Dtest15962 http://%HOSTIP:%HTTPPORT/159 -u testuser:testpass --ntlm -0
Dtest2031256 http://%HOSTIP:%HTTPPORT/2031 ntlm ntlm
Dtest6874 http://%HOSTIP:%HTTPPORT/68 -u testuser:testpass --ntlm
Dtest6775 http://%HOSTIP:%HTTPPORT/67 -u testuser:testpass --ntlm
Dtest8174 http://%HOSTIP:%HTTPPORT/81 --proxy-user testuser:testpass -x http://%HOSTIP:%HTTPPORT --proxy-ntlm
Dtest15076 http://%HOSTIP:%HTTPPORT/150 -u testuser:testpass --ntlm --fail
Dtest23968 …TPPORT/239 --proxy http://%HOSTIP:%HTTPPORT --proxy-user testuser:testpass --proxy-ntlm -d "postit"
Dtest121577 http://%HOSTIP:%HTTPPORT/1215 -u testuser:testpass --ntlm --proxy http://%HOSTIP:%HTTPPORT
/external/curl/packages/vms/
Dgnv_curl_configure.sh44 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
/external/curl/
Dandroidconfigure34 LDFLAGS="-L${ANDROID_PRODUCT_OUT}/obj/lib/" --disable-ntlm-wb --enable-ipv6 \
/external/curl/tests/server/
Drtspd.c106 bool ntlm; /* Authorization ntlm header found */ member
648 else if(!req->ntlm && in ProcessRequest()
652 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
658 else if(!req->ntlm && in ProcessRequest()
662 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
798 req->ntlm = FALSE; in get_request()
Dsws.c108 bool ntlm; /* Authorization ntlm header found */ member
757 else if(!req->ntlm && in ProcessRequest()
761 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
767 else if(!req->ntlm && in ProcessRequest()
771 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
907 req->ntlm = FALSE; in init_httprequest()
/external/curl/m4/
Dcurl-confopts.m4536 dnl --enable-ntlm-wb or --disable-ntlm-wb, and set
543 AC_ARG_ENABLE(ntlm-wb,
544 AC_HELP_STRING([--enable-ntlm-wb@<:@=FILE@:>@],[Enable NTLM delegation to winbind's ntlm_auth helpe…
545 AC_HELP_STRING([--disable-ntlm-wb],[Disable NTLM delegation to winbind's ntlm_auth helper]),
550 dnl --disable-ntlm-wb option used
558 dnl --enable-ntlm-wb option used

12