Lines Matching +refs:val +refs:digest
292 unsigned val = 0;
297 val ^= i;
298 val <<= 1;
302 return val;
326 * calculate request-digest/response-digest as per HTTP Digest spec
339 HASHHEX Response /* request-digest or response-digest */
754 unsigned char digest[16],
785 /* copy in the HMAC to digest */
786 memcpy(digest, output + inputlen - 10, 10);
794 unsigned char digest[16],
808 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */
875 unsigned char digest[16],
909 /* copy in the HMAC to digest */
910 memcpy(digest, output + inputlen - 10, 10);
918 unsigned char digest[16],
932 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */
1146 unsigned char digest[16],
1156 input+(inputlen-10), (char *) digest, 10);
1167 unsigned char digest[16],
1182 (const char *) digest,
1478 unsigned char digest[16],
1500 (CK_BYTE_PTR)input+(inputlen-MAC_SIZE), MAC_SIZE, (CK_BYTE_PTR)digest,
1518 unsigned char digest[16],
1539 rv = C_EncryptUpdate(enc_context->hSession, (CK_BYTE_PTR)digest, MAC_SIZE,
1559 unsigned char digest[16],
1603 /* copy in the HMAC to digest */
1604 memcpy(digest, output + inputlen - MAC_SIZE, MAC_SIZE);
1613 unsigned char digest[16],
1629 memcpy(output+inputlen+paddinglen, digest, MAC_SIZE); /* hmac */
1741 unsigned char digest[16];
1783 text->Ki_send, HASHLEN, digest);
1787 digest, out, outputlen);
1826 unsigned char digest[16];
1907 result=text->cipher_dec(text,text->buffer,text->size-6,digest,
1953 if (checkdigest[lup]!=digest[lup])
2413 Response /* request-digest or response-digest */
2437 Response /* request-digest or response-digest */
2631 * digest-challenge = 1#( realm | nonce | qop-options | stale | maxbuf |
2811 * The size of a digest-challenge MUST be less than 2048 bytes!!!
2850 /* verify digest */
2909 * digest-response = 1#( username | realm | nonce | cnonce |
2910 * nonce-count | qop | digest-uri | response | maxbuf | charset |
2949 } else if (strcasecmp(name, "digest-uri") == 0) {
2953 * digest-uri-value = serv-type "/" host [ "/" serv-name ]
2958 /* verify digest-uri format */
2967 "bad digest-uri: doesn't match service");
2970 "bad digest-uri: doesn't match service");
3036 * username-value = qdstr-val cnonce = "cnonce" "=" <">
3037 * cnonce-value <"> cnonce-value = qdstr-val nonce-count = "nc"
3039 * qop-value digest-uri = "digest-uri" "=" digest-uri-value
3040 * digest-uri-value = serv-type "/" host [ "/" serv-name ] serv-type
3065 unsigned val = hash(username) % text->reauth->size;
3069 if (text->reauth->e[val].authid &&
3070 !strcmp(username, text->reauth->e[val].authid)) {
3072 _plug_strdup(sparams->utils, text->reauth->e[val].realm,
3075 _plug_strdup(sparams->utils, (char *)text->reauth->e[val].nonce,
3078 _plug_strdup(sparams->utils, text->reauth->e[val].nonce,
3081 text->nonce_count = ++text->reauth->e[val].nonce_count;
3083 _plug_strdup(sparams->utils, (char *)text->reauth->e[val].cnonce,
3086 _plug_strdup(sparams->utils, text->reauth->e[val].cnonce,
3089 stext->timestamp = text->reauth->e[val].u.s.timestamp;
3478 * The server receives and validates the "digest-response". The server
3520 unsigned val = hash(username) % text->reauth->size;
3527 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3528 text->reauth->e[val].authid = username; username = NULL;
3529 text->reauth->e[val].realm = text->realm; text->realm = NULL;
3530 text->reauth->e[val].nonce = text->nonce; text->nonce = NULL;
3531 text->reauth->e[val].cnonce = cnonce; cnonce = NULL;
3533 if (text->nonce_count <= text->reauth->e[val].nonce_count) {
3535 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3538 text->reauth->e[val].nonce_count = text->nonce_count;
3539 text->reauth->e[val].u.s.timestamp = time(0);
3545 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3913 Response /* request-digest or response-digest */
3935 Response /* request-digest or response-digest */
4136 "digest-uri", digesturi, TRUE) != SASL_OK) {
4810 unsigned val;
4819 val = hash(params->serverFQDN) % text->reauth->size;
4821 if (text->reauth->e[val].u.c.serverFQDN &&
4822 !strcasecmp(text->reauth->e[val].u.c.serverFQDN,
4824 !strcmp(text->reauth->e[val].authid, oparams->authid)) {
4832 _plug_strdup(params->utils, text->reauth->e[val].realm,
4835 _plug_strdup(params->utils, (char *)text->reauth->e[val].nonce,
4838 _plug_strdup(params->utils, text->reauth->e[val].nonce,
4841 text->nonce_count = ++text->reauth->e[val].nonce_count;
4843 _plug_strdup(params->utils, (char *)text->reauth->e[val].cnonce,
4846 _plug_strdup(params->utils, text->reauth->e[val].cnonce,
4849 ctext->protection = text->reauth->e[val].u.c.protection;
4850 ctext->cipher = text->reauth->e[val].u.c.cipher;
4851 ctext->server_maxbuf = text->reauth->e[val].u.c.server_maxbuf;
4864 * (username | realm | nonce | cnonce | nonce-count | qop digest-uri |
4921 * (username | realm | nonce | cnonce | nonce-count | qop digest-uri |
5018 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5023 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5025 &text->reauth->e[val].authid, NULL);
5026 text->reauth->e[val].realm = text->realm; text->realm = NULL;
5027 text->reauth->e[val].nonce = text->nonce; text->nonce = NULL;
5028 text->reauth->e[val].nonce_count = text->nonce_count;
5029 text->reauth->e[val].cnonce = text->cnonce; text->cnonce = NULL;
5031 &text->reauth->e[val].u.c.serverFQDN, NULL);
5032 text->reauth->e[val].u.c.protection = ctext->protection;
5033 text->reauth->e[val].u.c.cipher = ctext->cipher;
5034 text->reauth->e[val].u.c.server_maxbuf = ctext->server_maxbuf;
5045 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5069 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5085 reauth = text->reauth->e[val].u.c.serverFQDN &&
5086 !strcasecmp(text->reauth->e[val].u.c.serverFQDN,
5121 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);