Searched refs:type2 (Results 1 – 3 of 3) sorted by relevance
/curl/lib/vauth/ |
H A D | ntlm.c | 164 const unsigned char *type2 = Curl_bufref_ptr(type2ref); in ntlm_decode_type2_target() local 172 target_info_len = Curl_read16_le(&type2[40]); in ntlm_decode_type2_target() 173 target_info_offset = Curl_read32_le(&type2[44]); in ntlm_decode_type2_target() 184 ntlm->target_info = Curl_memdup(&type2[target_info_offset], in ntlm_decode_type2_target() 264 const unsigned char *type2 = Curl_bufref_ptr(type2ref); in Curl_auth_decode_ntlm_type2_message() local 274 (memcmp(type2, NTLMSSP_SIGNATURE, 8) != 0) || in Curl_auth_decode_ntlm_type2_message() 275 (memcmp(type2 + 8, type2_marker, sizeof(type2_marker)) != 0)) { in Curl_auth_decode_ntlm_type2_message() 281 ntlm->flags = Curl_read32_le(&type2[20]); in Curl_auth_decode_ntlm_type2_message() 282 memcpy(ntlm->nonce, &type2[24], 8); in Curl_auth_decode_ntlm_type2_message()
|
H A D | ntlm_sspi.c | 203 const struct bufref *type2, in Curl_auth_decode_ntlm_type2_message() argument 211 if(!Curl_bufref_len(type2)) { in Curl_auth_decode_ntlm_type2_message() 217 ntlm->input_token = Curl_memdup0((const char *)Curl_bufref_ptr(type2), in Curl_auth_decode_ntlm_type2_message() 218 Curl_bufref_len(type2)); in Curl_auth_decode_ntlm_type2_message() 221 ntlm->input_token_len = Curl_bufref_len(type2); in Curl_auth_decode_ntlm_type2_message()
|
H A D | vauth.h | 158 const struct bufref *type2,
|
Completed in 6 milliseconds