/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | httpdigest.c | 74 HASH HA1; local 84 md_ctx_final(&md5_ctx, HA1); 88 md_ctx_update(&md5_ctx, HA1, HASHLEN); 93 md_ctx_final(&md5_ctx, HA1); 96 CvtHex(HA1, SessionKey); 102 IN HASHHEX HA1, /* H(A1) */ 135 md_ctx_update(&md5_ctx, HA1, HASHHEXLEN); 101 DigestCalcResponse( IN HASHHEX HA1, IN char * pszNonce, IN char * pszNonceCount, IN char * pszCNonce, IN char * pszQop, IN char * pszMethod, IN char * pszDigestUri, IN HASHHEX HEntity, OUT HASHHEX Response ) argument
|
H A D | httpdigest.h | 49 IN HASHHEX HA1, /* H(A1) */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.c | 220 char HA1[33], entityHAhex[33], response[33]; local 228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1); 247 http_da_calc_response(soap, &data->context, HA1, data->nonce, ncount, cnonce, qop, method, soap->path, entityHAhex, response); 520 char HA1[33], entityHAhex[33], response[33]; local 538 http_da_calc_HA1(soap, &data->context, NULL, soap->userid, soap->authrealm, passwd, data->nonce, data->cnonce, HA1); 543 http_da_calc_response(soap, &data->context, HA1, data->nonce, data->ncount, data->cnonce, data->qop, method, soap->path, entityHAhex, response); 686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification 692 char HA1[16]; local 700 md5_handler(soap, context, MD5_FINAL, HA1, 0); 705 md5_handler(soap, context, MD5_UPDATE, HA1, 1 [all...] |
H A D | wsse2api.c | 1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1084 /* compute HA1 = SHA1(created, nonce, password) */ 1085 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1); 1087 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1); 1091 /* compare HA1 to HA2 */ 1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1093 { /* authorize if HA1 and HA2 identical and not replay attack */ 1094 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
|
H A D | wsseapi.c | 1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1149 /* compute HA1 = SHA1(created, nonce, password) */ 1150 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1); 1152 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1); 1156 /* compare HA1 to HA2 */ 1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1158 { /* authorize if HA1 and HA2 identical and not replay attack */ 1159 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.c | 220 char HA1[33], entityHAhex[33], response[33]; local 228 http_da_calc_HA1(soap, &data->context, data->alg, soap->userid, soap->authrealm, soap->passwd, data->nonce, cnonce, HA1); 247 http_da_calc_response(soap, &data->context, HA1, data->nonce, ncount, cnonce, qop, method, soap->path, entityHAhex, response); 520 char HA1[33], entityHAhex[33], response[33]; local 538 http_da_calc_HA1(soap, &data->context, NULL, soap->userid, soap->authrealm, passwd, data->nonce, data->cnonce, HA1); 543 http_da_calc_response(soap, &data->context, HA1, data->nonce, data->ncount, data->cnonce, data->qop, method, soap->path, entityHAhex, response); 686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification 692 char HA1[16]; local 700 md5_handler(soap, context, MD5_FINAL, HA1, 0); 705 md5_handler(soap, context, MD5_UPDATE, HA1, 1 [all...] |
H A D | wsse2api.c | 1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1084 /* compute HA1 = SHA1(created, nonce, password) */ 1085 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1); 1087 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1); 1091 /* compare HA1 to HA2 */ 1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1093 { /* authorize if HA1 and HA2 identical and not replay attack */ 1094 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
|
H A D | wsseapi.c | 1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1149 /* compute HA1 = SHA1(created, nonce, password) */ 1150 calc_digest(soap, token->wsu__Created, nonce, noncelen, password, HA1); 1152 calc_digest(soap, token->wsu__Created, token->Nonce, strlen(token->Nonce), password, HA1); 1156 /* compare HA1 to HA2 */ 1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1158 { /* authorize if HA1 and HA2 identical and not replay attack */ 1159 if (!soap_wsse_session_verify(soap, HA1, token->wsu__Created, token->Nonce))
|