/curl/lib/ |
H A D | curl_sspi.c | 155 memset(identity, 0, sizeof(*identity)); in Curl_create_sspi_identity() 182 identity->User = dup_user.tbyte_ptr; in Curl_create_sspi_identity() 194 identity->Domain = dup_domain.tbyte_ptr; in Curl_create_sspi_identity() 195 identity->DomainLength = curlx_uztoul(domlen); in Curl_create_sspi_identity() 209 identity->Password = dup_passwd.tbyte_ptr; in Curl_create_sspi_identity() 216 identity->Flags = SECFLAG_WINNT_AUTH_IDENTITY; in Curl_create_sspi_identity() 230 void Curl_sspi_free_identity(SEC_WINNT_AUTH_IDENTITY *identity) in Curl_sspi_free_identity() argument 232 if(identity) { in Curl_sspi_free_identity() 233 Curl_safefree(identity->User); in Curl_sspi_free_identity() 234 Curl_safefree(identity->Password); in Curl_sspi_free_identity() [all …]
|
H A D | curl_sspi.h | 50 SEC_WINNT_AUTH_IDENTITY *identity); 54 SEC_WINNT_AUTH_IDENTITY *identity); 57 void Curl_sspi_free_identity(SEC_WINNT_AUTH_IDENTITY *identity);
|
H A D | curl_ntlm_core.c | 516 unsigned char *identity; in Curl_ntlm_core_mk_ntlmv2_hash() local 523 identity = malloc(identity_len + 1); in Curl_ntlm_core_mk_ntlmv2_hash() 525 if(!identity) in Curl_ntlm_core_mk_ntlmv2_hash() 528 ascii_uppercase_to_unicode_le(identity, user, userlen); in Curl_ntlm_core_mk_ntlmv2_hash() 529 ascii_to_unicode_le(identity + (userlen << 1), domain, domlen); in Curl_ntlm_core_mk_ntlmv2_hash() 531 result = Curl_hmacit(&Curl_HMAC_MD5, ntlmhash, 16, identity, identity_len, in Curl_ntlm_core_mk_ntlmv2_hash() 533 free(identity); in Curl_ntlm_core_mk_ntlmv2_hash()
|
/curl/docs/cmdline-opts/ |
H A D | sasl-authzid.md | 5 Arg: <identity> 18 Use this authorization identity (**authzid**), during SASL PLAIN 19 authentication, in addition to the authentication identity (**authcid**) as
|
H A D | mail-auth.md | 21 (identity) of a submitted message that is being relayed to another server.
|
H A D | proxy-pinnedpubkey.md | 27 indicating its identity. A public key is extracted from this certificate and
|
H A D | pinnedpubkey.md | 26 indicating its identity. A public key is extracted from this certificate and
|
/curl/lib/vauth/ |
H A D | digest_sspi.c | 106 SEC_WINNT_AUTH_IDENTITY identity; in Curl_auth_create_digest_md5_message() local 150 result = Curl_create_sspi_identity(userp, passwdp, &identity); in Curl_auth_create_digest_md5_message() 158 p_identity = &identity; in Curl_auth_create_digest_md5_message() 255 SEC_WINNT_AUTH_IDENTITY *identity) in Curl_override_sspi_http_realm() argument 260 if(!identity->Domain || !identity->DomainLength) { in Curl_override_sspi_http_realm() 284 free(identity->Domain); in Curl_override_sspi_http_realm() 285 identity->Domain = dup_domain.tbyte_ptr; in Curl_override_sspi_http_realm() 483 SEC_WINNT_AUTH_IDENTITY identity; in Curl_auth_create_digest_http_message() local 497 if(Curl_create_sspi_identity(userp, passwdp, &identity)) { in Curl_auth_create_digest_http_message() 504 &identity)) { in Curl_auth_create_digest_http_message() [all …]
|
H A D | ntlm_sspi.c | 127 result = Curl_create_sspi_identity(userp, passwdp, &ntlm->identity); in Curl_auth_create_ntlm_type1_message() 132 ntlm->p_identity = &ntlm->identity; in Curl_auth_create_ntlm_type1_message()
|
H A D | spnego_sspi.c | 154 result = Curl_create_sspi_identity(user, password, &nego->identity); in Curl_auth_decode_spnego_message() 159 nego->p_identity = &nego->identity; in Curl_auth_decode_spnego_message()
|
H A D | krb5_sspi.c | 144 result = Curl_create_sspi_identity(userp, passwdp, &krb5->identity); in Curl_auth_create_gssapi_user_message() 149 krb5->p_identity = &krb5->identity; in Curl_auth_create_gssapi_user_message()
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SASL_AUTHZID.md | 18 CURLOPT_SASL_AUTHZID - authorization identity (identity to act as) 31 null-terminated authorization identity (*authzid*) for the transfer. Only 34 When not specified only the authentication identity (*authcid*) as specified
|
H A D | CURLOPT_SSL_VERIFYHOST.md | 36 its identity. 50 This option controls checking the server's certificate's claimed identity. The
|
H A D | CURLOPT_MAIL_AUTH.md | 30 specify the authentication address (identity) of a submitted message that is
|
H A D | CURLOPT_PROXY_SSL_VERIFYPEER.md | 42 indicating its identity. Curl verifies whether the certificate is authentic,
|
H A D | CURLOPT_DOH_SSL_VERIFYPEER.md | 47 indicating its identity. Curl verifies whether the certificate is authentic,
|
H A D | CURLOPT_SSL_VERIFYPEER.md | 41 indicating its identity. Curl verifies whether the certificate is authentic,
|
/curl/tests/data/ |
H A D | test848 | 37 IMAP plain authentication with alternative authorization identity
|
H A D | test892 | 39 POP3 plain authentication with alternative authorization identity
|
H A D | test849 | 28 IMAP plain authentication with alternative authorization identity (Not authorized)
|
H A D | test893 | 30 POP3 plain authentication with alternative authorization identity (Not authorized)
|
H A D | test953 | 29 SMTP plain authentication with alternative authorization identity
|
H A D | test954 | 29 SMTP plain authentication with alternative authorization identity (Not authorized)
|
/curl/tests/ |
H A D | sshserver.pl | 103 my $identity = 'curl_client_key'; # default identity file 868 $identity_config = pathhelp::sys_native_abs_path(pp($identity)); 873 $identity_config = pathhelp::build_sys_abs_path(pp($identity)); 877 $identity_config = abs_path(pp($identity));
|
/curl/lib/vtls/ |
H A D | sectransp.c | 538 SecIdentityRef identity = in CopyIdentityWithLabel() local 540 err = SecIdentityCopyCertificate(identity, &cert); in CopyIdentityWithLabel() 553 CFRetain(identity); in CopyIdentityWithLabel() 554 *out_cert_and_key = identity; in CopyIdentityWithLabel() 672 CFTypeRef identity = (CFTypeRef) CFDictionaryGetValue( in CopyIdentityFromPKCS12File() local 675 CFRetain(identity); in CopyIdentityFromPKCS12File() 676 *out_cert_and_key = (SecIdentityRef) identity; in CopyIdentityFromPKCS12File()
|