Searched refs:HA1 (Results 1 - 8 of 8) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dhttpdigest.c74 HASH HA1; local
84 md_ctx_final(&md5_ctx, HA1);
88 md_ctx_update(&md5_ctx, HA1, HASHLEN);
93 md_ctx_final(&md5_ctx, HA1);
96 CvtHex(HA1, SessionKey);
102 IN HASHHEX HA1, /* H(A1) */
135 md_ctx_update(&md5_ctx, HA1, HASHHEXLEN);
101 DigestCalcResponse( IN HASHHEX HA1, IN char * pszNonce, IN char * pszNonceCount, IN char * pszCNonce, IN char * pszQop, IN char * pszMethod, IN char * pszDigestUri, IN HASHHEX HEntity, OUT HASHHEX Response ) argument
H A Dhttpdigest.h49 IN HASHHEX HA1, /* H(A1) */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dhttpda.c220 char HA1[33], entityHAhex[33], response[33]; local
228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1);
247 http_da_calc_response(soap, &data->context, HA1, data->nonce, ncount, cnonce, qop, method, soap->path, entityHAhex, response);
520 char HA1[33], entityHAhex[33], response[33]; local
538 http_da_calc_HA1(soap, &data->context, NULL, soap->userid, soap->authrealm, passwd, data->nonce, data->cnonce, HA1);
543 http_da_calc_response(soap, &data->context, HA1, data->nonce, data->ncount, data->cnonce, data->qop, method, soap->path, entityHAhex, response);
686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification
692 char HA1[16]; local
700 md5_handler(soap, context, MD5_FINAL, HA1, 0);
705 md5_handler(soap, context, MD5_UPDATE, HA1, 1
[all...]
H A Dwsse2api.c1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1084 /* compute HA1 = SHA1(created, nonce, password) */
1085 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1);
1087 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1);
1091 /* compare HA1 to HA2 */
1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1093 { /* authorize if HA1 and HA2 identical and not replay attack */
1094 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
H A Dwsseapi.c1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1149 /* compute HA1 = SHA1(created, nonce, password) */
1150 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1);
1152 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1);
1156 /* compare HA1 to HA2 */
1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1158 { /* authorize if HA1 and HA2 identical and not replay attack */
1159 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dhttpda.c220 char HA1[33], entityHAhex[33], response[33]; local
228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1);
247 http_da_calc_response(soap, &data->context, HA1, data->nonce, ncount, cnonce, qop, method, soap->path, entityHAhex, response);
520 char HA1[33], entityHAhex[33], response[33]; local
538 http_da_calc_HA1(soap, &data->context, NULL, soap->userid, soap->authrealm, passwd, data->nonce, data->cnonce, HA1);
543 http_da_calc_response(soap, &data->context, HA1, data->nonce, data->ncount, data->cnonce, data->qop, method, soap->path, entityHAhex, response);
686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification
692 char HA1[16]; local
700 md5_handler(soap, context, MD5_FINAL, HA1, 0);
705 md5_handler(soap, context, MD5_UPDATE, HA1, 1
[all...]
H A Dwsse2api.c1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1084 /* compute HA1 = SHA1(created, nonce, password) */
1085 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1);
1087 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1);
1091 /* compare HA1 to HA2 */
1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1093 { /* authorize if HA1 and HA2 identical and not replay attack */
1094 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
H A Dwsseapi.c1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1149 /* compute HA1 = SHA1(created, nonce, password) */
1150 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1);
1152 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1);
1156 /* compare HA1 to HA2 */
1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1158 { /* authorize if HA1 and HA2 identical and not replay attack */
1159 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))

Completed in 144 milliseconds