/external/curl/lib/vauth/ |
D | ntlm_sspi.c | 83 struct ntlmdata *ntlm, in Curl_auth_create_ntlm_type1_message() argument 94 Curl_auth_ntlm_cleanup(ntlm); in Curl_auth_create_ntlm_type1_message() 102 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_auth_create_ntlm_type1_message() 108 ntlm->output_token = malloc(ntlm->token_max); in Curl_auth_create_ntlm_type1_message() 109 if(!ntlm->output_token) in Curl_auth_create_ntlm_type1_message() 116 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_auth_create_ntlm_type1_message() 121 ntlm->p_identity = &ntlm->identity; in Curl_auth_create_ntlm_type1_message() 125 ntlm->p_identity = NULL; in Curl_auth_create_ntlm_type1_message() 128 ntlm->credentials = malloc(sizeof(CredHandle)); in Curl_auth_create_ntlm_type1_message() 129 if(!ntlm->credentials) in Curl_auth_create_ntlm_type1_message() [all …]
|
D | ntlm.c | 172 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument 192 ntlm->target_info = malloc(target_info_len); in ntlm_decode_type2_target() 193 if(!ntlm->target_info) in ntlm_decode_type2_target() 196 memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len); in ntlm_decode_type2_target() 200 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target() 253 struct ntlmdata *ntlm) in Curl_auth_decode_ntlm_type2_message() argument 299 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message() 310 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_auth_decode_ntlm_type2_message() 311 memcpy(ntlm->nonce, &type2[24], 8); in Curl_auth_decode_ntlm_type2_message() 313 if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) { in Curl_auth_decode_ntlm_type2_message() [all …]
|
D | vauth.h | 125 struct ntlmdata *ntlm, 132 struct ntlmdata *ntlm); 138 struct ntlmdata *ntlm, 142 void Curl_auth_ntlm_cleanup(struct ntlmdata *ntlm);
|
/external/curl/lib/ |
D | http_ntlm.c | 70 struct ntlmdata *ntlm; in Curl_input_ntlm() local 73 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm() 82 result = Curl_auth_decode_ntlm_type2_message(conn->data, header, ntlm); in Curl_input_ntlm() 86 ntlm->state = NTLMSTATE_TYPE2; /* We got a type-2 message */ in Curl_input_ntlm() 89 if(ntlm->state == NTLMSTATE_LAST) { in Curl_input_ntlm() 93 else if(ntlm->state == NTLMSTATE_TYPE3) { in Curl_input_ntlm() 96 ntlm->state = NTLMSTATE_NONE; in Curl_input_ntlm() 99 else if(ntlm->state >= NTLMSTATE_TYPE1) { in Curl_input_ntlm() 104 ntlm->state = NTLMSTATE_TYPE1; /* We should send away a type-1 */ in Curl_input_ntlm() 129 struct ntlmdata *ntlm; in Curl_output_ntlm() local [all …]
|
D | curl_ntlm_wb.c | 336 struct ntlmdata *ntlm; in Curl_output_ntlm_wb() local 348 ntlm = &conn->proxyntlm; in Curl_output_ntlm_wb() 354 ntlm = &conn->ntlm; in Curl_output_ntlm_wb() 363 switch(ntlm->state) { in Curl_output_ntlm_wb() 382 res = ntlm_wb_response(conn, "YR\n", ntlm->state); in Curl_output_ntlm_wb() 398 res = ntlm_wb_response(conn, input, ntlm->state); in Curl_output_ntlm_wb() 409 ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */ in Curl_output_ntlm_wb()
|
D | curl_sasl.c | 93 Curl_auth_ntlm_cleanup(&conn->ntlm); in Curl_sasl_cleanup() 336 &conn->ntlm, &resp, &len); in Curl_sasl_start() 499 &conn->ntlm, &resp, &len); in Curl_sasl_continue() 506 &conn->ntlm); in Curl_sasl_continue() 509 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
|
D | curl_ntlm_core.c | 144 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4) 714 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument 773 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp() 776 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
|
D | curl_ntlm_core.h | 90 struct ntlmdata *ntlm,
|
/external/curl/docs/cmdline-opts/ |
D | ntlm-wb.d | 1 Long: ntlm-wb 4 See-also: ntlm proxy-ntlm 6 Enables NTLM much in the style --ntlm does, but hand over the authentication
|
D | ntlm.d | 1 Long: ntlm 4 See-also: proxy-ntlm 16 --proxy-ntlm.
|
D | proxy-ntlm.d | 1 Long: proxy-ntlm 6 proxy. Use --ntlm for enabling NTLM with a remote host.
|
D | Makefile.inc | 23 no-keepalive.d no-npn.d noproxy.d no-sessionid.d ntlm.d ntlm-wb.d \ 30 proxy-ntlm.d proxy-pass.d proxy-service-name.d \
|
D | basic.d | 9 --ntlm, --digest, or --negotiate).
|
D | digest.d | 4 Mutexed: basic ntlm negotiate
|
/external/curl/tests/python_dependencies/impacket/ |
D | smbserver.py | 44 from impacket import smb, nmb, ntlm, uuid, LOG 2259 negotiateMessage = ntlm.NTLMAuthNegotiate() 2268 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_56: 2269 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_56 2270 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_128: 2271 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_128 2272 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_KEY_EXCH: 2273 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_KEY_EXCH 2274 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY: 2275 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY [all …]
|
D | smb3.py | 36 from impacket import nmb, ntlm, uuid, crypto, LOG 677 auth = ntlm.getNTLMSSPType1('','', self._Connection['RequireSigning']) 706 ntlmChallenge = ntlm.NTLMAuthChallenge(respToken['ResponseToken']) 708 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']]) 709 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None: 711 … self._Session['ServerName'] = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le') 715 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None: 717 … if self._Session['ServerName'] != av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le'): 718 … self._Session['ServerDomain'] = av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le') 722 if av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] is not None: [all …]
|
D | smb.py | 50 from impacket import nmb, ntlm, nt_errors, LOG 2619 password = self.get_ntlmv1_response(ntlm.compute_lmhash(password)) 2655 password = self.get_ntlmv1_response(ntlm.compute_lmhash(password)) 2998 return ntlm.get_ntlmv1_response(key, challenge) 3192 auth = ntlm.getNTLMSSPType1('','',self._SignatureRequired, use_ntlmv2 = use_ntlmv2) 3220 ntlmChallenge = ntlm.NTLMAuthChallenge(respToken['ResponseToken']) 3222 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']]) 3223 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None: 3225 self.__server_name = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le') 3229 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None: [all …]
|
/external/curl/tests/data/ |
D | test2057 | 6 HTTP Negotiate auth (stub ntlm) 21 <!-- Second request, expect 401 (ntlm challenge) --> 70 HTTP Negotiate authentication (stub ntlm)
|
D | test170 | 25 HTTP POST with --proxy-ntlm and no SSL with no response 28 http://a.galaxy.far.far.away/170 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm…
|
D | test162 | 36 HTTP GET asking for --proxy-ntlm when some other authentication is required 39 http://%HOSTIP:%HTTPPORT/162 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --f…
|
D | test176 | 57 HTTP POST --ntlm to server not requiring any auth at all 60 http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
|
D | test1097 | 51 HTTP POST using CONNECT with --proxy-ntlm but no auth is required 54 …TTPPORT/1097 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
|
/external/curl/packages/vms/ |
D | gnv_curl_configure.sh | 44 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
|
/external/curl/tests/server/ |
D | rtspd.c | 109 bool ntlm; /* Authorization ntlm header found */ member 662 else if(!req->ntlm && in ProcessRequest() 666 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 672 else if(!req->ntlm && in ProcessRequest() 676 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest() 813 req->ntlm = FALSE; in get_request()
|
/external/curl/m4/ |
D | curl-confopts.m4 | 568 dnl --enable-ntlm-wb or --disable-ntlm-wb, and set 575 AC_ARG_ENABLE(ntlm-wb, 576 AC_HELP_STRING([--enable-ntlm-wb@<:@=FILE@:>@],[Enable NTLM delegation to winbind's ntlm_auth helpe… 577 AC_HELP_STRING([--disable-ntlm-wb],[Disable NTLM delegation to winbind's ntlm_auth helper]), 582 dnl --disable-ntlm-wb option used 590 dnl --enable-ntlm-wb option used
|