Lines Matching defs:ireq

212     DigestReqInner ireq;
234 memset(&ireq, 0, sizeof(ireq));
359 ret = decode_DigestReqInner(buf.data, buf.length, &ireq, NULL);
373 switch (ireq.element) {
400 ret = krb5_store_stringz(sp, ireq.u.init.type);
406 if (ireq.u.init.channel) {
410 ireq.u.init.channel->cb_type,
411 ireq.u.init.channel->cb_binding);
428 if (strcasecmp(ireq.u.init.type, "CHAP") == 0) {
447 if (ireq.u.init.hostname) {
448 ret = krb5_store_stringz(sp, *ireq.u.init.hostname);
497 ireq.u.init.type, from);
508 ret = krb5_store_stringz(sp, ireq.u.digestRequest.type);
514 krb5_store_stringz(sp, ireq.u.digestRequest.serverNonce);
516 if (ireq.u.digestRequest.hostname) {
517 ret = krb5_store_stringz(sp, *ireq.u.digestRequest.hostname);
524 buf.length = strlen(ireq.u.digestRequest.opaque);
532 ret = hex_decode(ireq.u.digestRequest.opaque, buf.data, buf.length);
553 serverNonce.length = strlen(ireq.u.digestRequest.serverNonce);
568 ssize = hex_decode(ireq.u.digestRequest.serverNonce,
609 if (strcasecmp(ireq.u.digestRequest.type, "CHAP") == 0) {
620 if (ireq.u.digestRequest.identifier == NULL) {
627 if (hex_decode(*ireq.u.digestRequest.identifier, &id, 1) != 1) {
634 ireq.u.digestRequest.username,
654 ret = strcasecmp(mdx, ireq.u.digestRequest.responseData);
661 ireq.u.digestRequest.username);
665 } else if (strcasecmp(ireq.u.digestRequest.type, "SASL-DIGEST-MD5") == 0) {
676 if (ireq.u.digestRequest.nonceCount == NULL)
678 if (ireq.u.digestRequest.clientNonce == NULL)
680 if (ireq.u.digestRequest.qop == NULL)
682 if (ireq.u.digestRequest.realm == NULL)
686 ireq.u.digestRequest.username,
692 MD5_Update(&ctx, ireq.u.digestRequest.username,
693 strlen(ireq.u.digestRequest.username));
695 MD5_Update(&ctx, *ireq.u.digestRequest.realm,
696 strlen(*ireq.u.digestRequest.realm));
704 MD5_Update(&ctx, ireq.u.digestRequest.serverNonce,
705 strlen(ireq.u.digestRequest.serverNonce));
707 MD5_Update(&ctx, *ireq.u.digestRequest.nonceCount,
708 strlen(*ireq.u.digestRequest.nonceCount));
709 if (ireq.u.digestRequest.authid) {
711 MD5_Update(&ctx, *ireq.u.digestRequest.authid,
712 strlen(*ireq.u.digestRequest.authid));
724 MD5_Update(&ctx, *ireq.u.digestRequest.uri,
725 strlen(*ireq.u.digestRequest.uri));
728 if (strcmp(ireq.u.digestRequest.digest, "clear") != 0) {
745 MD5_Update(&ctx, ireq.u.digestRequest.serverNonce,
746 strlen(ireq.u.digestRequest.serverNonce));
748 MD5_Update(&ctx, *ireq.u.digestRequest.nonceCount,
749 strlen(*ireq.u.digestRequest.nonceCount));
751 MD5_Update(&ctx, *ireq.u.digestRequest.clientNonce,
752 strlen(*ireq.u.digestRequest.clientNonce));
754 MD5_Update(&ctx, *ireq.u.digestRequest.qop,
755 strlen(*ireq.u.digestRequest.qop));
772 ret = strcasecmp(mdx, ireq.u.digestRequest.responseData);
779 ireq.u.digestRequest.username);
783 } else if (strcasecmp(ireq.u.digestRequest.type, "MS-CHAP-V2") == 0) {
797 if (ireq.u.digestRequest.clientNonce == NULL) {
811 username = strchr(ireq.u.digestRequest.username, '\\');
813 username = ireq.u.digestRequest.username;
823 clientNonce.length = strlen(*ireq.u.digestRequest.clientNonce);
831 ssize = hex_decode(*ireq.u.digestRequest.clientNonce,
888 ret = strcasecmp(mdx, ireq.u.digestRequest.responseData);
894 ireq.u.digestRequest.username);
968 ireq.u.digestRequest.type);
978 ireq.u.digestRequest.type, ireq.u.digestRequest.username);
993 if ((ireq.u.ntlmInit.flags & NTLM_NEG_UNICODE) == 0) {
998 if (ireq.u.ntlmInit.flags & NTLM_NEG_NTLM)
1017 r.u.ntlmInitReply.flags |= (ireq.u.ntlmInit.flags & (ALL));
1121 ireq.u.ntlmRequest.username,
1131 ireq.u.ntlmRequest.username);
1140 ireq.u.ntlmRequest.opaque.data,
1141 ireq.u.ntlmRequest.opaque.length, &buf);
1184 if (ireq.u.ntlmRequest.ntlm.length != 24) {
1202 answer.length = ireq.u.ntlmRequest.ntlm.length;
1203 answer.data = ireq.u.ntlmRequest.ntlm.data;
1207 ireq.u.ntlmRequest.username,
1240 if (ireq.u.ntlmRequest.lm.length != 24) {
1249 MD5_Update(&md5ctx, ireq.u.ntlmRequest.lm.data, 8);
1267 if (ireq.u.ntlmRequest.ntlm.length != answer.length ||
1268 memcmp(ireq.u.ntlmRequest.ntlm.data, answer.data, answer.length) != 0)
1287 if (ireq.u.ntlmRequest.sessionkey) {
1300 len = ireq.u.ntlmRequest.sessionkey->length;
1311 ireq.u.ntlmRequest.sessionkey->data,
1332 version, ireq.u.ntlmRequest.username);
1453 free_DigestReqInner(&ireq);