/external/curl/lib/ |
D | curl_ntlm.c | 68 struct ntlmdata *ntlm; in Curl_input_ntlm() local 71 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm() 80 result = Curl_sasl_decode_ntlm_type2_message(conn->data, header, ntlm); in Curl_input_ntlm() 84 ntlm->state = NTLMSTATE_TYPE2; /* We got a type-2 message */ in Curl_input_ntlm() 87 if(ntlm->state == NTLMSTATE_TYPE3) { in Curl_input_ntlm() 90 ntlm->state = NTLMSTATE_NONE; in Curl_input_ntlm() 93 else if(ntlm->state >= NTLMSTATE_TYPE1) { in Curl_input_ntlm() 98 ntlm->state = NTLMSTATE_TYPE1; /* We should send away a type-1 */ in Curl_input_ntlm() 123 struct ntlmdata *ntlm; in Curl_output_ntlm() local 138 ntlm = &conn->proxyntlm; in Curl_output_ntlm() [all …]
|
D | curl_sasl_sspi.c | 581 struct ntlmdata *ntlm, in Curl_sasl_create_ntlm_type1_message() argument 592 Curl_sasl_ntlm_cleanup(ntlm); in Curl_sasl_create_ntlm_type1_message() 600 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_sasl_create_ntlm_type1_message() 606 ntlm->output_token = malloc(ntlm->token_max); in Curl_sasl_create_ntlm_type1_message() 607 if(!ntlm->output_token) in Curl_sasl_create_ntlm_type1_message() 614 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_sasl_create_ntlm_type1_message() 619 ntlm->p_identity = &ntlm->identity; in Curl_sasl_create_ntlm_type1_message() 623 ntlm->p_identity = NULL; in Curl_sasl_create_ntlm_type1_message() 626 ntlm->credentials = malloc(sizeof(CredHandle)); in Curl_sasl_create_ntlm_type1_message() 627 if(!ntlm->credentials) in Curl_sasl_create_ntlm_type1_message() [all …]
|
D | curl_ntlm_msgs.c | 168 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument 184 ntlm->target_info = malloc(target_info_len); in ntlm_decode_type2_target() 185 if(!ntlm->target_info) in ntlm_decode_type2_target() 188 memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len); in ntlm_decode_type2_target() 192 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target() 231 struct ntlmdata *ntlm) in Curl_sasl_decode_ntlm_type2_message() argument 277 ntlm->flags = 0; in Curl_sasl_decode_ntlm_type2_message() 288 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_sasl_decode_ntlm_type2_message() 289 memcpy(ntlm->nonce, &type2[24], 8); in Curl_sasl_decode_ntlm_type2_message() 291 if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) { in Curl_sasl_decode_ntlm_type2_message() [all …]
|
D | curl_ntlm_wb.c | 342 struct ntlmdata *ntlm; in Curl_output_ntlm_wb() local 354 ntlm = &conn->proxyntlm; in Curl_output_ntlm_wb() 360 ntlm = &conn->ntlm; in Curl_output_ntlm_wb() 369 switch(ntlm->state) { in Curl_output_ntlm_wb() 388 res = ntlm_wb_response(conn, "YR\n", ntlm->state); in Curl_output_ntlm_wb() 404 res = ntlm_wb_response(conn, input, ntlm->state); in Curl_output_ntlm_wb() 415 ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */ in Curl_output_ntlm_wb()
|
D | curl_sasl.h | 183 struct ntlmdata *ntlm, 190 struct ntlmdata *ntlm); 196 struct ntlmdata *ntlm, 200 void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm);
|
D | curl_ntlm_core.c | 118 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4) 645 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument 701 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp() 704 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
|
D | curl_sasl.c | 1145 void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm) in Curl_sasl_ntlm_cleanup() argument 1148 Curl_safefree(ntlm->target_info); in Curl_sasl_ntlm_cleanup() 1151 ntlm->target_info_len = 0; in Curl_sasl_ntlm_cleanup() 1216 Curl_sasl_ntlm_cleanup(&conn->ntlm); in Curl_sasl_cleanup() 1442 &conn->ntlm, &resp, &len); in Curl_sasl_start() 1578 &conn->ntlm, &resp, &len); in Curl_sasl_continue() 1585 &conn->ntlm); in Curl_sasl_continue() 1588 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
|
D | curl_ntlm_core.h | 89 struct ntlmdata *ntlm,
|
/external/curl/tests/data/ |
D | test170 | 25 HTTP POST with --proxy-ntlm and no SSL with no response 28 http://a.galaxy.far.far.away/170 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm…
|
D | test162 | 36 HTTP GET asking for --proxy-ntlm when some other authentication is required 39 http://%HOSTIP:%HTTPPORT/162 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --f…
|
D | test176 | 57 HTTP POST --ntlm to server not requiring any auth at all 60 http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
|
D | test1097 | 53 HTTP POST using CONNECT with --proxy-ntlm but no auth is required 56 …TTPPORT/1097 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
|
D | test159 | 62 http://%HOSTIP:%HTTPPORT/159 -u testuser:testpass --ntlm -0
|
D | test2031 | 256 http://%HOSTIP:%HTTPPORT/2031 ntlm ntlm
|
D | test68 | 74 http://%HOSTIP:%HTTPPORT/68 -u testuser:testpass --ntlm
|
D | test67 | 75 http://%HOSTIP:%HTTPPORT/67 -u testuser:testpass --ntlm
|
D | test81 | 74 http://%HOSTIP:%HTTPPORT/81 --proxy-user testuser:testpass -x http://%HOSTIP:%HTTPPORT --proxy-ntlm
|
D | test150 | 76 http://%HOSTIP:%HTTPPORT/150 -u testuser:testpass --ntlm --fail
|
D | test239 | 68 …TPPORT/239 --proxy http://%HOSTIP:%HTTPPORT --proxy-user testuser:testpass --proxy-ntlm -d "postit"
|
D | test1215 | 77 http://%HOSTIP:%HTTPPORT/1215 -u testuser:testpass --ntlm --proxy http://%HOSTIP:%HTTPPORT
|
/external/curl/packages/vms/ |
D | gnv_curl_configure.sh | 44 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
|
/external/curl/ |
D | androidconfigure | 34 LDFLAGS="-L${ANDROID_PRODUCT_OUT}/obj/lib/" --disable-ntlm-wb --enable-ipv6 \
|
/external/curl/tests/server/ |
D | rtspd.c | 106 bool ntlm; /* Authorization ntlm header found */ member 648 else if(!req->ntlm && in ProcessRequest() 652 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 658 else if(!req->ntlm && in ProcessRequest() 662 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 798 req->ntlm = FALSE; in get_request()
|
D | sws.c | 108 bool ntlm; /* Authorization ntlm header found */ member 757 else if(!req->ntlm && in ProcessRequest() 761 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 767 else if(!req->ntlm && in ProcessRequest() 771 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 907 req->ntlm = FALSE; in init_httprequest()
|
/external/curl/m4/ |
D | curl-confopts.m4 | 536 dnl --enable-ntlm-wb or --disable-ntlm-wb, and set 543 AC_ARG_ENABLE(ntlm-wb, 544 AC_HELP_STRING([--enable-ntlm-wb@<:@=FILE@:>@],[Enable NTLM delegation to winbind's ntlm_auth helpe… 545 AC_HELP_STRING([--disable-ntlm-wb],[Disable NTLM delegation to winbind's ntlm_auth helper]), 550 dnl --disable-ntlm-wb option used 558 dnl --enable-ntlm-wb option used
|