/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/ntlm/ |
H A D | ntlm_buffer_reader_unittest.cc | 348 std::vector<AvPair> av_pairs; in TEST() local 357 std::vector<AvPair> av_pairs; in TEST() local 371 std::vector<AvPair> av_pairs; in TEST() local 389 std::vector<AvPair> av_pairs; in TEST() local 406 std::vector<AvPair> av_pairs; in TEST() local 418 std::vector<AvPair> av_pairs; in TEST() local 429 std::vector<AvPair> av_pairs; in TEST() local 441 std::vector<AvPair> av_pairs; in TEST() local 459 std::vector<AvPair> av_pairs; in TEST() local 472 std::vector<AvPair> av_pairs; in TEST() local [all …]
|
H A D | ntlm_buffer_reader.cc | 112 std::vector<AvPair>* av_pairs) { in ReadTargetInfo() argument 113 DCHECK(av_pairs->empty()); in ReadTargetInfo() 177 av_pairs->push_back(std::move(pair)); in ReadTargetInfo() 188 bool NtlmBufferReader::ReadTargetInfoPayload(std::vector<AvPair>* av_pairs) { in ReadTargetInfoPayload() argument 189 DCHECK(av_pairs->empty()); in ReadTargetInfoPayload() 201 if (!payload_reader.ReadTargetInfo(sec_buf.length, av_pairs)) in ReadTargetInfoPayload()
|
H A D | ntlm.cc | 45 std::vector<AvPair>* av_pairs, in UpdateTargetInfoAvPairs() argument 54 for (AvPair& pair : *av_pairs) { in UpdateTargetInfoAvPairs() 90 av_pairs->push_back(flags_pair); in UpdateTargetInfoAvPairs() 104 av_pairs->emplace_back(TargetInfoAvId::kChannelBindings, in UpdateTargetInfoAvPairs() 114 av_pairs->emplace_back(TargetInfoAvId::kTargetName, spn_writer.Pass()); in UpdateTargetInfoAvPairs() 125 std::vector<uint8_t> WriteUpdatedTargetInfo(const std::vector<AvPair>& av_pairs, in WriteUpdatedTargetInfo() argument 129 for (const AvPair& pair : av_pairs) { in WriteUpdatedTargetInfo() 394 const std::vector<AvPair>& av_pairs, in GenerateUpdatedTargetInfo() argument 397 std::vector<AvPair> updated_av_pairs(av_pairs); in GenerateUpdatedTargetInfo()
|
H A D | ntlm_client.cc | 41 std::vector<AvPair>* av_pairs) { in ParseChallengeMessageV2() argument 52 ? challenge_reader.ReadTargetInfoPayload(av_pairs) in ParseChallengeMessageV2() 205 std::vector<AvPair> av_pairs; in GenerateAuthenticateMessage() local 207 server_challenge, &av_pairs)) { in GenerateAuthenticateMessage() 214 channel_bindings, spn, av_pairs, ×tamp); in GenerateAuthenticateMessage()
|
H A D | ntlm_buffer_reader.h | 143 std::vector<AvPair>* av_pairs) WARN_UNUSED_RESULT; 153 bool ReadTargetInfoPayload(std::vector<AvPair>* av_pairs) WARN_UNUSED_RESULT;
|
H A D | ntlm.h | 225 const std::vector<AvPair>& av_pairs,
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/ntlm/ |
H A D | ntlm_buffer_reader_unittest.cc | 348 std::vector<AvPair> av_pairs; in TEST() local 357 std::vector<AvPair> av_pairs; in TEST() local 371 std::vector<AvPair> av_pairs; in TEST() local 389 std::vector<AvPair> av_pairs; in TEST() local 406 std::vector<AvPair> av_pairs; in TEST() local 418 std::vector<AvPair> av_pairs; in TEST() local 429 std::vector<AvPair> av_pairs; in TEST() local 441 std::vector<AvPair> av_pairs; in TEST() local 459 std::vector<AvPair> av_pairs; in TEST() local 472 std::vector<AvPair> av_pairs; in TEST() local [all …]
|
H A D | ntlm_buffer_reader.cc | 112 std::vector<AvPair>* av_pairs) { in ReadTargetInfo() argument 113 DCHECK(av_pairs->empty()); in ReadTargetInfo() 177 av_pairs->push_back(std::move(pair)); in ReadTargetInfo() 188 bool NtlmBufferReader::ReadTargetInfoPayload(std::vector<AvPair>* av_pairs) { in ReadTargetInfoPayload() argument 189 DCHECK(av_pairs->empty()); in ReadTargetInfoPayload() 201 if (!payload_reader.ReadTargetInfo(sec_buf.length, av_pairs)) in ReadTargetInfoPayload()
|
H A D | ntlm.cc | 48 std::vector<AvPair>* av_pairs, in UpdateTargetInfoAvPairs() argument 57 for (AvPair& pair : *av_pairs) { in UpdateTargetInfoAvPairs() 93 av_pairs->push_back(flags_pair); in UpdateTargetInfoAvPairs() 107 av_pairs->emplace_back(TargetInfoAvId::kChannelBindings, in UpdateTargetInfoAvPairs() 117 av_pairs->emplace_back(TargetInfoAvId::kTargetName, spn_writer.Pass()); in UpdateTargetInfoAvPairs() 128 std::vector<uint8_t> WriteUpdatedTargetInfo(const std::vector<AvPair>& av_pairs, in WriteUpdatedTargetInfo() argument 132 for (const AvPair& pair : av_pairs) { in WriteUpdatedTargetInfo() 406 const std::vector<AvPair>& av_pairs, in GenerateUpdatedTargetInfo() argument 409 std::vector<AvPair> updated_av_pairs(av_pairs); in GenerateUpdatedTargetInfo()
|
H A D | ntlm_client.cc | 41 std::vector<AvPair>* av_pairs) { in ParseChallengeMessageV2() argument 52 ? challenge_reader.ReadTargetInfoPayload(av_pairs) in ParseChallengeMessageV2() 205 std::vector<AvPair> av_pairs; in GenerateAuthenticateMessage() local 207 server_challenge, &av_pairs)) { in GenerateAuthenticateMessage() 214 channel_bindings, spn, av_pairs, ×tamp); in GenerateAuthenticateMessage()
|
H A D | ntlm_buffer_reader.h | 143 std::vector<AvPair>* av_pairs) WARN_UNUSED_RESULT; 153 bool ReadTargetInfoPayload(std::vector<AvPair>* av_pairs) WARN_UNUSED_RESULT;
|
H A D | ntlm.h | 225 const std::vector<AvPair>& av_pairs,
|
/dports/security/py-pyspnego/pyspnego-0.3.1/src/spnego/_ntlm_raw/ |
H A D | crypto.py | 142 av_pairs: TargetInfo, 190 … temp = NTClientChallengeV2(time_stamp=time, client_challenge=client_challenge, av_pairs=av_pairs)
|
H A D | messages.py | 778 av_pairs: typing.Optional["TargetInfo"] = None, 789 av_pairs = av_pairs or TargetInfo() 794 b_data.extend(av_pairs.pack()) 840 def av_pairs(self) -> "TargetInfo": member in NTClientChallengeV2
|
/dports/audio/lewton/lewton-0.10.2/cargo-crates/curl-sys-0.4.25/curl/tests/python_dependencies/impacket/ |
H A D | ntlm.py | 902 av_pairs = AV_PAIRS(serverName) 905 av_pairs[NTLMSSP_AV_TARGET_NAME] = 'cifs/'.encode('utf-16le') + av_pairs[NTLMSSP_AV_HOSTNAME][1] 906 if av_pairs[NTLMSSP_AV_TIME] is not None: 907 aTime = av_pairs[NTLMSSP_AV_TIME][1] 911 av_pairs[NTLMSSP_AV_TIME] = aTime 912 serverName = av_pairs.getData()
|
H A D | smb3.py | 709 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']]) 710 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None: 712 … self._Session['ServerName'] = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le') 716 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None: 718 … if self._Session['ServerName'] != av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le'): 719 … self._Session['ServerDomain'] = av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le') 723 if av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] is not None: 725 …self._Session['ServerDNSDomainName'] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME][1].decode('utf-16l…
|
H A D | smbserver.py | 2290 av_pairs = ntlm.AV_PAIRS() 2292 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2293 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2303 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2305 challengeMessage['TargetInfoFields'] = av_pairs 2633 av_pairs = ntlm.AV_PAIRS() 2635 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2636 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2646 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2647 challengeMessage['TargetInfoFields_max_len'] = len(av_pairs) [all …]
|
/dports/net/py-impacket/impacket-0.9.17/impacket/ |
H A D | ntlm.py | 900 av_pairs = AV_PAIRS(serverName) 906 … av_pairs[NTLMSSP_AV_TARGET_NAME] = 'cifs/'.encode('utf-16le') + av_pairs[NTLMSSP_AV_HOSTNAME][1] 907 if av_pairs[NTLMSSP_AV_TIME] is not None: 908 aTime = av_pairs[NTLMSSP_AV_TIME][1] 911 av_pairs[NTLMSSP_AV_TIME] = aTime 912 serverName = av_pairs.getData()
|
H A D | smb3.py | 753 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']]) 754 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None: 756 … self._Session['ServerName'] = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le') 760 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None: 762 … if self._Session['ServerName'] != av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le'): 763 … self._Session['ServerDomain'] = av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le') 767 if av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] is not None: 769 …self._Session['ServerDNSDomainName'] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME][1].decode('utf-16l…
|
H A D | smbserver.py | 2353 av_pairs = ntlm.AV_PAIRS() 2355 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2356 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2366 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2368 challengeMessage['TargetInfoFields'] = av_pairs 2722 av_pairs = ntlm.AV_PAIRS() 2724 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2725 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2735 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2736 challengeMessage['TargetInfoFields_max_len'] = len(av_pairs) [all …]
|
/dports/graphics/mupdf/mupdf-1.18.0-source/thirdparty/curl/tests/python_dependencies/impacket/ |
H A D | ntlm.py | 902 av_pairs = AV_PAIRS(serverName) 905 av_pairs[NTLMSSP_AV_TARGET_NAME] = 'cifs/'.encode('utf-16le') + av_pairs[NTLMSSP_AV_HOSTNAME][1] 906 if av_pairs[NTLMSSP_AV_TIME] is not None: 907 aTime = av_pairs[NTLMSSP_AV_TIME][1] 911 av_pairs[NTLMSSP_AV_TIME] = aTime 912 serverName = av_pairs.getData()
|
H A D | smb3.py | 709 …av_pairs = ntlm.AV_PAIRS(ntlmChallenge['TargetInfoFields'][:ntlmChallenge['TargetInfoFields_len']]) 710 if av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] is not None: 712 … self._Session['ServerName'] = av_pairs[ntlm.NTLMSSP_AV_HOSTNAME][1].decode('utf-16le') 716 if av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] is not None: 718 … if self._Session['ServerName'] != av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le'): 719 … self._Session['ServerDomain'] = av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME][1].decode('utf-16le') 723 if av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] is not None: 725 …self._Session['ServerDNSDomainName'] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME][1].decode('utf-16l…
|
H A D | smbserver.py | 2290 av_pairs = ntlm.AV_PAIRS() 2292 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2293 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2303 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2305 challengeMessage['TargetInfoFields'] = av_pairs 2633 av_pairs = ntlm.AV_PAIRS() 2635 …av_pairs[ntlm.NTLMSSP_AV_HOSTNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_HOSTNAME] = smbServer.getServerN… 2636 …av_pairs[ntlm.NTLMSSP_AV_DOMAINNAME] = av_pairs[ntlm.NTLMSSP_AV_DNS_DOMAINNAME] = smbServer.getSer… 2646 challengeMessage['TargetInfoFields_len'] = len(av_pairs) 2647 challengeMessage['TargetInfoFields_max_len'] = len(av_pairs) [all …]
|
/dports/security/py-pyspnego/pyspnego-0.3.1/tests/_ntlm_raw/ |
H A D | test_crypto.py | 154 av_pairs = TargetInfo.unpack(b"\x02\x00\x0C\x00\x44\x00\x6F\x00\x6D\x00\x61\x00\x69\x00\x6E\x00" 160 TEST_CLIENT_CHALLENGE, time, av_pairs)
|
H A D | test_messages.py | 1047 assert len(challenge.av_pairs) == 1 1068 actual = messages.NTClientChallengeV2(time_stamp=ft, client_challenge=b"\x11" * 8, av_pairs=av) 1074 assert len(actual.av_pairs) == 2 1075 assert actual.av_pairs[messages.AvId.dns_domain_name] == "test" 1104 assert isinstance(challenge.av_pairs, messages.TargetInfo) 1105 assert challenge.av_pairs.pack() == b"\x00\x00\x00\x00"
|