Searched refs:HA2 (Results 1 - 7 of 7) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dhttpdigest.c113 HASH HA2; local
130 md_ctx_final(&md5_ctx, HA2);
131 CvtHex(HA2, HA2Hex);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dhttpda.c686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification
718 char HA2[16], HA2hex[33], responseHA[16]; local
729 md5_handler(soap, context, MD5_FINAL, HA2, 0);
731 soap_s2hex(soap, (unsigned char*)HA2, HA2hex, 16);
H A Dwsse2api.c1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1089 /* get HA2 = supplied digest from base64 Password */
1090 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL);
1091 /* compare HA1 to HA2 */
1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1093 { /* authorize if HA1 and HA2 identical and not replay attack */
H A Dwsseapi.c1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1154 /* get HA2 = supplied digest from base64 Password */
1155 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL);
1156 /* compare HA1 to HA2 */
1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1158 { /* authorize if HA1 and HA2 identical and not replay attack */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dhttpda.c686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification
718 char HA2[16], HA2hex[33], responseHA[16]; local
729 md5_handler(soap, context, MD5_FINAL, HA2, 0);
731 soap_s2hex(soap, (unsigned char*)HA2, HA2hex, 16);
H A Dwsse2api.c1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1089 /* get HA2 = supplied digest from base64 Password */
1090 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL);
1091 /* compare HA1 to HA2 */
1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1093 { /* authorize if HA1 and HA2 identical and not replay attack */
H A Dwsseapi.c1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local
1154 /* get HA2 = supplied digest from base64 Password */
1155 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL);
1156 /* compare HA1 to HA2 */
1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE))
1158 { /* authorize if HA1 and HA2 identical and not replay attack */

Completed in 135 milliseconds