Lines Matching defs:s
189 } s; /* server stuff */
563 static char *skip_lws (char *s)
565 if(!s) return NULL;
568 while (s[0] == ' ' || s[0] == HT || s[0] == CR || s[0] == LF) {
569 if (s[0]=='\0') break;
570 s++;
573 return s;
577 static char *skip_token (char *s, int caseinsensitive __attribute__((unused)))
579 static char *skip_token (char *s, int caseinsensitive)
582 if(!s) return NULL;
585 while (((unsigned char *)s)[0]>SP) {
587 while (s[0]>SP) {
589 if (s[0]==DEL || s[0]=='(' || s[0]==')' || s[0]=='<' || s[0]=='>' ||
590 s[0]=='@' || s[0]==',' || s[0]==';' || s[0]==':' || s[0]=='\\' ||
591 s[0]=='\'' || s[0]=='/' || s[0]=='[' || s[0]==']' || s[0]== '?' ||
592 s[0]=='=' || s[0]== '{' || s[0]== '}') {
598 if (!isupper((unsigned char) s[0]))
605 s++;
607 return s;
1770 /* We can just use the output buffer because it's big enough */
2621 that's close enough */
2661 sprintf(text->out_buf, "nonce=\"%s\"", nonce);
2955 /* make sure it's the service that we're expecting */
3024 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
3084 stext->timestamp = text->reauth->e[val].u.s.timestamp;
3271 /* We're done with sec now. Let's get rid of it */
3308 /* find the cipher requested & make sure it's one we're happy
3498 sprintf(text->out_buf, "rspauth=%s", text->response_value);
3534 text->reauth->e[val].u.s.timestamp = time(0);
3622 /* here's where we attempt fast reauth if possible */
4037 sprintf(text->out_buf, "username=\"%s\"", oparams->authid);
4315 "Server supports unknown layer: %s\n",
4355 "Server supports unknown cipher: %s\n",
4403 " (too small: %s)", value);
4406 "Invalid maxbuf parameter received from server (too small: %s)", value);
4456 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
4511 /* let's find an encryption scheme that we like */
4686 sprintf(realm_chal, "{%s}", params->serverFQDN);
4997 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
5067 /* here's where we attempt fast reauth if possible */