Lines Matching refs:ntlm
802 krb5_ntlm *ntlm)
804 *ntlm = calloc(1, sizeof(**ntlm));
805 if (*ntlm == NULL)
811 krb5_ntlm_free(krb5_context context, krb5_ntlm ntlm)
813 free_NTLMInit(&ntlm->init);
814 free_NTLMInitReply(&ntlm->initReply);
815 free_NTLMRequest(&ntlm->request);
816 free_NTLMResponse(&ntlm->response);
817 memset(ntlm, 0, sizeof(*ntlm));
818 free(ntlm);
825 krb5_ntlm ntlm,
839 ntlm->init.flags = flags;
841 ALLOC(ntlm->init.hostname, 1);
842 *ntlm->init.hostname = strdup(hostname);
845 ALLOC(ntlm->init.domain, 1);
846 *ntlm->init.domain = strdup(domainname);
850 ireq.u.ntlmInit = ntlm->init;
867 N_("ntlm reply not an initReply", ""));
871 ret = copy_NTLMInitReply(&irep.u.ntlmInitReply, &ntlm->initReply);
886 krb5_ntlm ntlm,
889 *flags = ntlm->initReply.flags;
895 krb5_ntlm ntlm,
900 ret = der_copy_octet_string(&ntlm->initReply.challenge, challenge);
909 krb5_ntlm ntlm,
914 ret = der_copy_octet_string(&ntlm->initReply.opaque, opaque);
923 krb5_ntlm ntlm,
926 *name = strdup(ntlm->initReply.targetname);
934 krb5_ntlm ntlm,
939 if (ntlm->initReply.targetinfo == NULL) {
945 ntlm->initReply.targetinfo->data,
946 ntlm->initReply.targetinfo->length);
957 krb5_ntlm ntlm,
969 ireq.u.ntlmRequest = ntlm->request;
979 N_("NTLM response error: %s", ""),
987 N_("NTLM reply not an NTLMResponse", ""));
991 ret = copy_NTLMResponse(&irep.u.ntlmResponse, &ntlm->response);
1006 krb5_ntlm ntlm,
1009 ntlm->request.flags = flags;
1015 krb5_ntlm ntlm,
1018 ntlm->request.username = strdup(username);
1019 if (ntlm->request.username == NULL)
1026 krb5_ntlm ntlm,
1029 ntlm->request.targetname = strdup(targetname);
1030 if (ntlm->request.targetname == NULL)
1037 krb5_ntlm ntlm,
1040 ntlm->request.lm.data = malloc(len);
1041 if (ntlm->request.lm.data == NULL && len != 0)
1043 ntlm->request.lm.length = len;
1044 memcpy(ntlm->request.lm.data, hash, len);
1050 krb5_ntlm ntlm,
1053 ntlm->request.ntlm.data = malloc(len);
1054 if (ntlm->request.ntlm.data == NULL && len != 0)
1056 ntlm->request.ntlm.length = len;
1057 memcpy(ntlm->request.ntlm.data, hash, len);
1063 krb5_ntlm ntlm,
1066 ntlm->request.opaque.data = malloc(opaque->length);
1067 if (ntlm->request.opaque.data == NULL && opaque->length != 0)
1069 ntlm->request.opaque.length = opaque->length;
1070 memcpy(ntlm->request.opaque.data, opaque->data, opaque->length);
1076 krb5_ntlm ntlm,
1079 ntlm->request.sessionkey = calloc(1, sizeof(*ntlm->request.sessionkey));
1080 if (ntlm->request.sessionkey == NULL)
1082 ntlm->request.sessionkey->data = malloc(length);
1083 if (ntlm->request.sessionkey->data == NULL && length != 0)
1085 memcpy(ntlm->request.sessionkey->data, sessionkey, length);
1086 ntlm->request.sessionkey->length = length;
1092 krb5_ntlm ntlm)
1094 return ntlm->response.success ? TRUE : FALSE;
1099 krb5_ntlm ntlm,
1102 if (ntlm->response.sessionkey == NULL) {
1104 N_("no ntlm session key", ""));
1109 ntlm->response.sessionkey->data,
1110 ntlm->response.sessionkey->length);