Home
last modified time | relevance | path

Searched refs:ntlm (Results 1 – 25 of 65) sorted by relevance

123

/external/curl/lib/vauth/
Dntlm_sspi.c83 struct ntlmdata *ntlm, in Curl_auth_create_ntlm_type1_message() argument
94 Curl_auth_ntlm_cleanup(ntlm); in Curl_auth_create_ntlm_type1_message()
102 ntlm->token_max = SecurityPackage->cbMaxToken; in Curl_auth_create_ntlm_type1_message()
108 ntlm->output_token = malloc(ntlm->token_max); in Curl_auth_create_ntlm_type1_message()
109 if(!ntlm->output_token) in Curl_auth_create_ntlm_type1_message()
116 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_auth_create_ntlm_type1_message()
121 ntlm->p_identity = &ntlm->identity; in Curl_auth_create_ntlm_type1_message()
125 ntlm->p_identity = NULL; in Curl_auth_create_ntlm_type1_message()
128 ntlm->credentials = malloc(sizeof(CredHandle)); in Curl_auth_create_ntlm_type1_message()
129 if(!ntlm->credentials) in Curl_auth_create_ntlm_type1_message()
[all …]
Dntlm.c172 struct ntlmdata *ntlm) in ntlm_decode_type2_target() argument
192 ntlm->target_info = malloc(target_info_len); in ntlm_decode_type2_target()
193 if(!ntlm->target_info) in ntlm_decode_type2_target()
196 memcpy(ntlm->target_info, &buffer[target_info_offset], target_info_len); in ntlm_decode_type2_target()
200 ntlm->target_info_len = target_info_len; in ntlm_decode_type2_target()
253 struct ntlmdata *ntlm) in Curl_auth_decode_ntlm_type2_message() argument
299 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message()
310 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_auth_decode_ntlm_type2_message()
311 memcpy(ntlm->nonce, &type2[24], 8); in Curl_auth_decode_ntlm_type2_message()
313 if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) { in Curl_auth_decode_ntlm_type2_message()
[all …]
Dvauth.h125 struct ntlmdata *ntlm,
132 struct ntlmdata *ntlm);
138 struct ntlmdata *ntlm,
142 void Curl_auth_ntlm_cleanup(struct ntlmdata *ntlm);
/external/curl/lib/
Dhttp_ntlm.c70 struct ntlmdata *ntlm; in Curl_input_ntlm() local
73 ntlm = proxy ? &conn->proxyntlm : &conn->ntlm; in Curl_input_ntlm()
82 result = Curl_auth_decode_ntlm_type2_message(conn->data, header, ntlm); in Curl_input_ntlm()
86 ntlm->state = NTLMSTATE_TYPE2; /* We got a type-2 message */ in Curl_input_ntlm()
89 if(ntlm->state == NTLMSTATE_LAST) { in Curl_input_ntlm()
93 else if(ntlm->state == NTLMSTATE_TYPE3) { in Curl_input_ntlm()
96 ntlm->state = NTLMSTATE_NONE; in Curl_input_ntlm()
99 else if(ntlm->state >= NTLMSTATE_TYPE1) { in Curl_input_ntlm()
104 ntlm->state = NTLMSTATE_TYPE1; /* We should send away a type-1 */ in Curl_input_ntlm()
129 struct ntlmdata *ntlm; in Curl_output_ntlm() local
[all …]
Dcurl_ntlm_wb.c336 struct ntlmdata *ntlm; in Curl_output_ntlm_wb() local
348 ntlm = &conn->proxyntlm; in Curl_output_ntlm_wb()
354 ntlm = &conn->ntlm; in Curl_output_ntlm_wb()
363 switch(ntlm->state) { in Curl_output_ntlm_wb()
382 res = ntlm_wb_response(conn, "YR\n", ntlm->state); in Curl_output_ntlm_wb()
398 res = ntlm_wb_response(conn, input, ntlm->state); in Curl_output_ntlm_wb()
409 ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */ in Curl_output_ntlm_wb()
Dcurl_sasl.c93 Curl_auth_ntlm_cleanup(&conn->ntlm); in Curl_sasl_cleanup()
336 &conn->ntlm, &resp, &len); in Curl_sasl_start()
499 &conn->ntlm, &resp, &len); in Curl_sasl_continue()
506 &conn->ntlm); in Curl_sasl_continue()
509 conn->passwd, &conn->ntlm, in Curl_sasl_continue()
Dcurl_ntlm_core.c144 #define NTLMv2_BLOB_LEN (44 -16 + ntlm->target_info_len + 4)
714 struct ntlmdata *ntlm, in Curl_ntlm_core_mk_ntlmv2_resp() argument
773 memcpy(ptr + 44, ntlm->target_info, ntlm->target_info_len); in Curl_ntlm_core_mk_ntlmv2_resp()
776 memcpy(ptr + 8, &ntlm->nonce[0], 8); in Curl_ntlm_core_mk_ntlmv2_resp()
Dcurl_ntlm_core.h90 struct ntlmdata *ntlm,
/external/curl/docs/cmdline-opts/
Dntlm-wb.d1 Long: ntlm-wb
4 See-also: ntlm proxy-ntlm
6 Enables NTLM much in the style --ntlm does, but hand over the authentication
Dntlm.d1 Long: ntlm
4 See-also: proxy-ntlm
16 --proxy-ntlm.
Dproxy-ntlm.d1 Long: proxy-ntlm
6 proxy. Use --ntlm for enabling NTLM with a remote host.
DMakefile.inc23 no-keepalive.d no-npn.d noproxy.d no-sessionid.d ntlm.d ntlm-wb.d \
30 proxy-ntlm.d proxy-pass.d proxy-service-name.d \
Dbasic.d9 --ntlm, --digest, or --negotiate).
Ddigest.d4 Mutexed: basic ntlm negotiate
/external/curl/tests/python_dependencies/impacket/
Dsmbserver.py44 from impacket import smb, nmb, ntlm, uuid, LOG
2259 negotiateMessage = ntlm.NTLMAuthNegotiate()
2268 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_56:
2269 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_56
2270 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_128:
2271 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_128
2272 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_KEY_EXCH:
2273 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_KEY_EXCH
2274 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY:
2275 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
[all …]
Dsmb3.py36 from impacket import nmb, ntlm, uuid, crypto, LOG
677 auth = ntlm.getNTLMSSPType1('','', self._Connection['RequireSigning'])
706 ntlmChallenge = ntlm.NTLMAuthChallenge(respToken['ResponseToken'])
708 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']])
709 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None:
711 … self._Session['ServerName'] = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le')
715 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None:
717 … if self._Session['ServerName'] != av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le'):
718 … self._Session['ServerDomain'] = av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le')
722 if av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] is not None:
[all …]
Dsmb.py50 from impacket import nmb, ntlm, nt_errors, LOG
2619 password = self.get_ntlmv1_response(ntlm.compute_lmhash(password))
2655 password = self.get_ntlmv1_response(ntlm.compute_lmhash(password))
2998 return ntlm.get_ntlmv1_response(key, challenge)
3192 auth = ntlm.getNTLMSSPType1('','',self._SignatureRequired, use_ntlmv2 = use_ntlmv2)
3220 ntlmChallenge = ntlm.NTLMAuthChallenge(respToken['ResponseToken'])
3222 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']])
3223 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None:
3225 self.__server_name = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le')
3229 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None:
[all …]
/external/curl/tests/data/
Dtest20576 HTTP Negotiate auth (stub ntlm)
21 <!-- Second request, expect 401 (ntlm challenge) -->
70 HTTP Negotiate authentication (stub ntlm)
Dtest17025 HTTP POST with --proxy-ntlm and no SSL with no response
28 http://a.galaxy.far.far.away/170 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm
Dtest16236 HTTP GET asking for --proxy-ntlm when some other authentication is required
39 http://%HOSTIP:%HTTPPORT/162 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm --f…
Dtest17657 HTTP POST --ntlm to server not requiring any auth at all
60 http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
Dtest109751 HTTP POST using CONNECT with --proxy-ntlm but no auth is required
54 …TTPPORT/1097 --proxy http://%HOSTIP:%HTTPPORT --proxy-user foo:bar --proxy-ntlm -d "dummy=value" -p
/external/curl/packages/vms/
Dgnv_curl_configure.sh44 --disable-libtool-lock --with-gssapi --disable-ntlm-wb \
/external/curl/tests/server/
Drtspd.c109 bool ntlm; /* Authorization ntlm header found */ member
662 else if(!req->ntlm && in ProcessRequest()
666 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
672 else if(!req->ntlm && in ProcessRequest()
676 req->ntlm = TRUE; /* NTLM found */ in ProcessRequest()
813 req->ntlm = FALSE; in get_request()
/external/curl/m4/
Dcurl-confopts.m4568 dnl --enable-ntlm-wb or --disable-ntlm-wb, and set
575 AC_ARG_ENABLE(ntlm-wb,
576 AC_HELP_STRING([--enable-ntlm-wb@<:@=FILE@:>@],[Enable NTLM delegation to winbind's ntlm_auth helpe…
577 AC_HELP_STRING([--disable-ntlm-wb],[Disable NTLM delegation to winbind's ntlm_auth helper]),
582 dnl --disable-ntlm-wb option used
590 dnl --enable-ntlm-wb option used

123