CtxtHandle sspi_context;
PCtxtHandle context_handle = NULL;
SecPkgCredentials_Names names;
- TimeStamp expiry;
char *service_name = NULL;
unsigned short us_length;
unsigned long qop;
(TCHAR *)CURL_UNCONST(TEXT("Kerberos")),
SECPKG_CRED_OUTBOUND,
NULL, NULL, NULL, NULL,
- &cred_handle, &expiry);
+ &cred_handle, NULL);
if(check_sspi_err(data, status, "AcquireCredentialsHandle")) {
failf(data, "Failed to acquire credentials.");
&input_desc, 0,
&sspi_context,
&output_desc,
- &sspi_ret_flags,
- &expiry);
+ &sspi_ret_flags, NULL);
curlx_unicodefree(sname);
SecBufferDesc resp_desc;
SECURITY_STATUS status;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
/* Ensure we have a valid challenge message */
if(!Curl_bufref_len(chlg)) {
(TCHAR *)CURL_UNCONST(TEXT(SP_NAME_DIGEST)),
SECPKG_CRED_OUTBOUND, NULL,
p_identity, NULL, NULL,
- &credentials, &expiry);
+ &credentials, NULL);
if(status != SEC_E_OK) {
Curl_sspi_free_identity(p_identity);
status = Curl_pSecFn->InitializeSecurityContext(&credentials, NULL, spn,
0, 0, 0, &chlg_desc, 0,
&context, &resp_desc, &attrs,
- &expiry);
+ NULL);
if(status == SEC_I_COMPLETE_NEEDED ||
status == SEC_I_COMPLETE_AND_CONTINUE)
SecBuffer resp_buf;
SecBufferDesc resp_desc;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
TCHAR *spn;
/* free the copy of user/passwd used to make the previous identity */
(TCHAR *)CURL_UNCONST(TEXT(SP_NAME_DIGEST)),
SECPKG_CRED_OUTBOUND, NULL,
p_identity, NULL, NULL,
- &credentials, &expiry);
+ &credentials, NULL);
if(status != SEC_E_OK) {
Curl_sspi_free_identity(p_identity);
free(output_token);
ISC_REQ_USE_HTTP_STYLE, 0, 0,
&chlg_desc, 0,
digest->http_context,
- &resp_desc, &attrs, &expiry);
+ &resp_desc, &attrs, NULL);
curlx_unicodefree(spn);
if(status == SEC_I_COMPLETE_NEEDED ||
SecBufferDesc resp_desc;
SECURITY_STATUS status;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
if(!krb5->spn) {
/* Generate our SPN */
(TCHAR *)CURL_UNCONST(TEXT(SP_NAME_KERBEROS)),
SECPKG_CRED_OUTBOUND, NULL,
krb5->p_identity, NULL, NULL,
- krb5->credentials, &expiry);
+ krb5->credentials, NULL);
if(status != SEC_E_OK)
return CURLE_LOGIN_DENIED;
0, SECURITY_NATIVE_DREP,
chlg ? &chlg_desc : NULL, 0,
&context,
- &resp_desc, &attrs,
- &expiry);
+ &resp_desc, &attrs, NULL);
if(status == SEC_E_INSUFFICIENT_MEMORY)
return CURLE_OUT_OF_MEMORY;
SecBufferDesc type_1_desc;
SECURITY_STATUS status;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
/* Clean up any former leftovers and initialise to defaults */
Curl_auth_cleanup_ntlm(ntlm);
(TCHAR *)CURL_UNCONST(TEXT(SP_NAME_NTLM)),
SECPKG_CRED_OUTBOUND, NULL,
ntlm->p_identity, NULL, NULL,
- ntlm->credentials, &expiry);
+ ntlm->credentials, NULL);
if(status != SEC_E_OK)
return CURLE_LOGIN_DENIED;
0, 0, SECURITY_NETWORK_DREP,
NULL, 0,
ntlm->context, &type_1_desc,
- &attrs, &expiry);
+ &attrs, NULL);
if(status == SEC_I_COMPLETE_NEEDED ||
status == SEC_I_COMPLETE_AND_CONTINUE)
Curl_pSecFn->CompleteAuthToken(ntlm->context, &type_1_desc);
SecBufferDesc type_3_desc;
SECURITY_STATUS status;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
#ifdef CURL_DISABLE_VERBOSE_STRINGS
(void)data;
&type_2_desc,
0, ntlm->context,
&type_3_desc,
- &attrs, &expiry);
+ &attrs, NULL);
if(status != SEC_E_OK) {
infof(data, "NTLM handshake failure (type-3 message): Status=%lx",
status);
SecBufferDesc chlg_desc;
SecBufferDesc resp_desc;
unsigned long attrs;
- TimeStamp expiry; /* For Windows 9x compatibility of SSPI calls */
#ifdef CURL_DISABLE_VERBOSE_STRINGS
(void)data;
(TCHAR *)CURL_UNCONST(TEXT(SP_NAME_NEGOTIATE)),
SECPKG_CRED_OUTBOUND, NULL,
nego->p_identity, NULL, NULL,
- nego->credentials, &expiry);
+ nego->credentials, NULL);
if(nego->status != SEC_E_OK)
return CURLE_AUTH_ERROR;
0, SECURITY_NATIVE_DREP,
chlg ? &chlg_desc : NULL,
0, nego->context,
- &resp_desc, &attrs,
- &expiry);
+ &resp_desc, &attrs, NULL);
/* Free the decoded challenge as it is not required anymore */
free(chlg);
(TCHAR *)CURL_UNCONST(UNISP_NAME),
SECPKG_CRED_OUTBOUND, NULL,
&credentials, NULL, NULL,
- &backend->cred->cred_handle,
- &backend->cred->time_stamp);
+ &backend->cred->cred_handle, NULL);
}
else {
/* Pre-Windows 10 1809 or the user set a legacy algorithm list.
(TCHAR *)CURL_UNCONST(UNISP_NAME),
SECPKG_CRED_OUTBOUND, NULL,
&schannel_cred, NULL, NULL,
- &backend->cred->cred_handle,
- &backend->cred->time_stamp);
+ &backend->cred->cred_handle, NULL);
}
if(client_certs[0])
backend->req_flags, 0, 0,
(backend->use_alpn ? &inbuf_desc : NULL),
0, &backend->ctxt->ctxt_handle,
- &outbuf_desc, &backend->ret_flags, &backend->ctxt->time_stamp);
+ &outbuf_desc, &backend->ret_flags, NULL);
if(sspi_status != SEC_I_CONTINUE_NEEDED) {
char buffer[STRERROR_LEN];
&backend->cred->cred_handle, &backend->ctxt->ctxt_handle,
backend->cred->sni_hostname, backend->req_flags,
0, 0, &inbuf_desc, 0, NULL,
- &outbuf_desc, &backend->ret_flags, &backend->ctxt->time_stamp);
+ &outbuf_desc, &backend->ret_flags, NULL);
/* free buffer for received handshake data */
Curl_safefree(inbuf[0].pvBuffer);
0,
&backend->ctxt->ctxt_handle,
&outbuf_desc,
- &backend->ret_flags,
- &backend->ctxt->time_stamp);
+ &backend->ret_flags, NULL);
if((sspi_status == SEC_E_OK) || (sspi_status == SEC_I_CONTEXT_EXPIRED)) {
/* send close message which is in output buffer */
struct Curl_schannel_cred {
CredHandle cred_handle;
- TimeStamp time_stamp;
TCHAR *sni_hostname;
HCERTSTORE client_cert_store;
int refcount;
struct Curl_schannel_ctxt {
CtxtHandle ctxt_handle;
- TimeStamp time_stamp;
};
struct schannel_ssl_backend_data {