supportedMech 70 source3/include/spnego.h char *supportedMech; supportedMech 193 source3/libsmb/spnego.c token->supportedMech = CONST_DISCARD(char *, mech); supportedMech 227 source3/libsmb/spnego.c if (token->supportedMech) { supportedMech 229 source3/libsmb/spnego.c asn1_write_OID(asn1, token->supportedMech); supportedMech 344 source3/libsmb/spnego.c if (spnego->negTokenTarg.supportedMech) { supportedMech 345 source3/libsmb/spnego.c talloc_free(spnego->negTokenTarg.supportedMech); supportedMech 1220 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); supportedMech 1245 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_KERBEROS5_OLD); supportedMech 1283 source3/utils/ntlm_auth.c if ( (request.negTokenTarg.supportedMech == NULL) || supportedMech 1284 source3/utils/ntlm_auth.c ( strcmp(request.negTokenTarg.supportedMech, OID_NTLMSSP) != 0 ) ) { supportedMech 1288 source3/utils/ntlm_auth.c request.negTokenTarg.supportedMech)); supportedMech 1306 source3/utils/ntlm_auth.c response.negTokenTarg.supportedMech = SMB_STRDUP(OID_NTLMSSP); supportedMech 1470 source3/utils/ntlm_auth.c spnego.negTokenTarg.supportedMech = (char *)OID_NTLMSSP; supportedMech 1689 source3/utils/ntlm_auth.c if (spnego.negTokenTarg.supportedMech == NULL) { supportedMech 1714 source3/utils/ntlm_auth.c if (strcmp(spnego.negTokenTarg.supportedMech, supportedMech 1721 source3/utils/ntlm_auth.c if (strcmp(spnego.negTokenTarg.supportedMech, supportedMech 691 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = NULL; supportedMech 694 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; supportedMech 699 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = spnego_state->neg_oid; supportedMech 974 source4/auth/gensec/spnego.c spnego.negTokenTarg.supportedMech && supportedMech 975 source4/auth/gensec/spnego.c strcmp(spnego.negTokenTarg.supportedMech, spnego_state->neg_oid) != 0) { supportedMech 977 source4/auth/gensec/spnego.c gensec_get_name_by_oid(gensec_security, spnego.negTokenTarg.supportedMech), supportedMech 990 source4/auth/gensec/spnego.c spnego.negTokenTarg.supportedMech); supportedMech 1000 source4/auth/gensec/spnego.c spnego_state->neg_oid = talloc_strdup(spnego_state, spnego.negTokenTarg.supportedMech); supportedMech 1068 source4/auth/gensec/spnego.c spnego_out.negTokenTarg.supportedMech = NULL; supportedMech 49 source4/auth/gensec/spnego.h const char *supportedMech; supportedMech 203 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, mem_ctx, &token->supportedMech); supportedMech 239 source4/auth/gensec/spnego_parse.c if (token->supportedMech) { supportedMech 241 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->supportedMech); supportedMech 362 source4/auth/gensec/spnego_parse.c if (spnego->negTokenTarg.supportedMech) { supportedMech 363 source4/auth/gensec/spnego_parse.c talloc_free(discard_const(spnego->negTokenTarg.supportedMech)); supportedMech 53 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech = NULL; supportedMech 250 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c ALLOC(nt.u.negTokenResp.supportedMech, 1); supportedMech 251 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c if (nt.u.negTokenResp.supportedMech == NULL) { supportedMech 259 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech, supportedMech 267 source4/heimdal/lib/gssapi/spnego/accept_sec_context.c nt.u.negTokenResp.supportedMech = NULL; supportedMech 109 source4/heimdal/lib/gssapi/spnego/init_sec_context.c nt.u.negTokenResp.supportedMech = NULL; supportedMech 448 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.supportedMech) { supportedMech 457 source4/heimdal/lib/gssapi/spnego/init_sec_context.c resp.supportedMech,