Lines Matching defs:cipher
156 /* function definitions for cipher encode/decode */
194 struct digest_cipher *cipher;
2567 struct digest_cipher *cipher;
2592 cipher = available_ciphers1;
2594 cipher = available_ciphers;
2596 while (cipher->name) {
2597 /* do we allow this particular cipher? */
2598 if (stext->requiressf <= cipher->ssf &&
2599 stext->limitssf >= cipher->ssf) {
2606 if(strlen(cipheropts) + strlen(cipher->name) + 1 >=
2614 strcat(cipheropts, cipher->name);
2616 cipher++;
2627 * charset | cipher-opts | auth-param )
2704 /* add cipher-opts to challenge; only add if there are some */
2709 "cipher", (unsigned char *) cipheropts,
2863 char *cipher = NULL;
2906 * cipher | auth-param )
2974 } else if (strcasecmp(name, "cipher") == 0) {
2975 _plug_strdup(sparams->utils, value, &cipher, NULL);
3039 * "6" | "7" | "8" | "9" | "a" | "b" | "c" | "d" | "e" | "f" cipher =
3040 * "cipher" "=" cipher-value
3297 /* check which layer/cipher to use */
3298 if ((!strcasecmp(qop, "auth-conf")) && (cipher != NULL)) {
3299 /* see what cipher was requested */
3308 /* find the cipher requested & make sure it's one we're happy
3310 if (!strcasecmp(cipher, cptr->name) &&
3329 "protocol violation: client requested invalid cipher");
3331 SETERROR(sparams->utils, "client requested invalid cipher");
3452 /* initialize cipher if need be */
3459 "couldn't init cipher");
3467 "couldn't init cipher");
3566 if (cipher != NULL)
3567 sparams->utils->free (cipher);
3794 struct digest_cipher *cipher;
3962 oparams->mech_ssf = ctext->cipher->ssf;
3964 nbits = ctext->cipher->n;
3965 text->cipher_enc = ctext->cipher->cipher_enc;
3966 text->cipher_dec = ctext->cipher->cipher_dec;
3967 text->cipher_free = ctext->cipher->cipher_free;
3968 text->cipher_init = ctext->cipher->cipher_init;
4084 if (ctext->cipher != NULL) {
4087 "cipher",
4088 (unsigned char *) ctext->cipher->name,
4182 /* initialize cipher if need be */
4189 "couldn't init cipher");
4333 } else if (strcasecmp(name, "cipher") == 0) {
4337 struct digest_cipher *cipher = available_ciphers1;
4339 struct digest_cipher *cipher = available_ciphers;
4346 /* do we support this cipher? */
4347 while (cipher->name) {
4348 if (!strcasecmp(value, cipher->name)) break;
4349 cipher++;
4351 if (cipher->name) {
4352 ciphers |= cipher->flag;
4355 "Server supports unknown cipher: %s\n",
4509 struct digest_cipher *cipher;
4513 cipher = available_ciphers1;
4515 cipher = available_ciphers;
4517 while (cipher->name) {
4518 /* examine each cipher we support, see if it meets our security
4521 if ((limit >= cipher->ssf) && (musthave <= cipher->ssf) &&
4522 (ciphers & cipher->flag) &&
4523 (!ctext->cipher || (cipher->ssf > ctext->cipher->ssf))) {
4524 ctext->cipher = cipher;
4526 cipher++;
4529 if (ctext->cipher) {
4530 /* we found a cipher we like */
4544 if (ctext->cipher == NULL) {
4837 ctext->cipher = text->reauth->e[val].u.c.cipher;
5020 text->reauth->e[val].u.c.cipher = ctext->cipher;
5122 ctext->cipher = NULL;