Searched refs:HA2 (Results 1 - 7 of 7) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | httpdigest.c | 113 HASH HA2; local 130 md_ctx_final(&md5_ctx, HA2); 131 CvtHex(HA2, HA2Hex);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.c | 686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification 718 char HA2[16], HA2hex[33], responseHA[16]; local 729 md5_handler(soap, context, MD5_FINAL, HA2, 0); 731 soap_s2hex(soap, (unsigned char*)HA2, HA2hex, 16);
|
H A D | wsse2api.c | 1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1089 /* get HA2 = supplied digest from base64 Password */ 1090 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL); 1091 /* compare HA1 to HA2 */ 1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1093 { /* authorize if HA1 and HA2 identical and not replay attack */
|
H A D | wsseapi.c | 1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1154 /* get HA2 = supplied digest from base64 Password */ 1155 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL); 1156 /* compare HA1 to HA2 */ 1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1158 { /* authorize if HA1 and HA2 identical and not replay attack */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.c | 686 * Calculate HA1, HA2, and response digest as per RFC 2617 specification 718 char HA2[16], HA2hex[33], responseHA[16]; local 729 md5_handler(soap, context, MD5_FINAL, HA2, 0); 731 soap_s2hex(soap, (unsigned char*)HA2, HA2hex, 16);
|
H A D | wsse2api.c | 1080 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1089 /* get HA2 = supplied digest from base64 Password */ 1090 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL); 1091 /* compare HA1 to HA2 */ 1092 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1093 { /* authorize if HA1 and HA2 identical and not replay attack */
|
H A D | wsseapi.c | 1145 { char HA1[SOAP_SMD_SHA1_SIZE], HA2[SOAP_SMD_SHA1_SIZE]; local 1154 /* get HA2 = supplied digest from base64 Password */ 1155 soap_base642s(soap, token->Password->__item, HA2, SOAP_SMD_SHA1_SIZE, NULL); 1156 /* compare HA1 to HA2 */ 1157 if (!memcmp(HA1, HA2, SOAP_SMD_SHA1_SIZE)) 1158 { /* authorize if HA1 and HA2 identical and not replay attack */
|
Completed in 196 milliseconds