supportedMech 70 source3/include/spnego.h char *supportedMech;
supportedMech 193 source3/libsmb/spnego.c token->supportedMech = CONST_DISCARD(char *, mech);
supportedMech 227 source3/libsmb/spnego.c if (token->supportedMech) {
supportedMech 229 source3/libsmb/spnego.c asn1_write_OID(asn1, token->supportedMech);
supportedMech 344 source3/libsmb/spnego.c if (spnego->negTokenTarg.supportedMech) {
supportedMech 345 source3/libsmb/spnego.c talloc_free(spnego->negTokenTarg.supportedMech);
supportedMech 1220 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
supportedMech 1245 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD);
supportedMech 1283 source3/utils/ntlm_auth.c if ( (request.negTokenTarg.supportedMech == NULL) ||
supportedMech 1284 source3/utils/ntlm_auth.c ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) {
supportedMech 1288 source3/utils/ntlm_auth.c request.negTokenTarg.supportedMech));
supportedMech 1306 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP);
supportedMech 1470 source3/utils/ntlm_auth.c spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP;
supportedMech 1689 source3/utils/ntlm_auth.c if (spnego.negTokenTarg.supportedMech == NULL) {
supportedMech 1714 source3/utils/ntlm_auth.c if (strcmp(spnego.negTokenTarg.supportedMech,
supportedMech 1721 source3/utils/ntlm_auth.c if (strcmp(spnego.negTokenTarg.supportedMech,
supportedMech 691 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = NULL;
supportedMech 694 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
supportedMech 699 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid;
supportedMech 974 source4/auth/gensec/spnego.c spnego.negTokenTarg.supportedMech &&
supportedMech 975 source4/auth/gensec/spnego.c strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) {
supportedMech 977 source4/auth/gensec/spnego.c gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech),
supportedMech 990 source4/auth/gensec/spnego.c spnego.negTokenTarg.supportedMech);
supportedMech 1000 source4/auth/gensec/spnego.c spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech);
supportedMech 1068 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = NULL;
supportedMech 49 source4/auth/gensec/spnego.h const char *supportedMech;
supportedMech 203 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
supportedMech 239 source4/auth/gensec/spnego_parse.c if (token->supportedMech) {
supportedMech 241 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->supportedMech);
supportedMech 362 source4/auth/gensec/spnego_parse.c if (spnego->negTokenTarg.supportedMech) {
supportedMech 363 source4/auth/gensec/spnego_parse.c talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
supportedMech 53 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech = NULL;
supportedMech 250 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c ALLOC(nt.u.negTokenResp.supportedMech, 1);
supportedMech 251 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c if (nt.u.negTokenResp.supportedMech == NULL) {
supportedMech 259 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech,
supportedMech 267 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech = NULL;
supportedMech 109 source4/heimdal/lib/gssapi/spnego/init_sec_context.c nt.u.negTokenResp.supportedMech = NULL;
supportedMech 448 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.supportedMech) {
supportedMech 457 source4/heimdal/lib/gssapi/spnego/init_sec_context.c resp.supportedMech,