79 findSessionInfo( sessionInfoPtr->attributeList,
89 if( fingerprintPtr != NULL )
100 "Server certificate doesn't match key fingerprint" ) );
116 ( void ) addSessionInfoS( &sessionInfoPtr->attributeList,
118 certFingerprint, msgData.
length );
135 findSessionInfo( sessionInfoPtr->attributeList,
185 strlen( messageType ) );
230 &msgData, CRYPT_IATTRIBUTE_RANDOM_NONCE );
237 protocolInfo->nonceSize );
240 &msgData, isInitiator ? \
248 *iScepAttributes = iCmsAttributes;
279 &msgData, attributeType );
282 status = strGetNumeric( buffer, msgData.
length, &numericValue, 0, 20 );
305 assert(
isReadPtr( data,
sizeof(
int ) ) );
311 if( !checkAttributesConsistent( sessionInfoPtr, type ) )
322 sessionInfoPtr->privKeyset = privKeyset;
357 sessionInfoPtr->iAuthInContext = cryptCert;
358 status = processKeyFingerprint( sessionInfoPtr );
361 sessionInfoPtr->iCertRequest = cryptCert;
374 assert(
isReadPtr( data,
sizeof(
int ) ) );
388 const int userNameLength = ( (
MESSAGE_DATA * ) data )->length;
395 if( userNameLength == 12 && !memcmp( userName,
"[Autodetect]", 12 ) )
398 BYTE nonce[ 16 + 8 ];
408 CRYPT_IATTRIBUTE_RANDOM_NONCE );
411 &transIDlength, nonce, 16,
414 status = addSessionInfoEx( &sessionInfoPtr->attributeList,
431 for( index = 0; index < userNameLength; index++ )
433 static const char allowedChars[] =
"'\"()+,-./:=? \x00\x00";
440 for( i = 0; allowedChars[ i ] !=
'\0' && \
443 if( allowedChars[ i ] == ch )
483 if( !checkAttributesConsistent( sessionInfoPtr, type ) )
518 SESSION_NEEDS_PRIVATEKEY | \
519 SESSION_NEEDS_PRIVKEYSIGN | \
520 SESSION_NEEDS_PRIVKEYCRYPT | \
521 SESSION_NEEDS_REQUEST,
524 SESSION_NEEDS_PRIVKEYCRYPT | \
525 SESSION_NEEDS_PRIVKEYCERT | \
526 SESSION_NEEDS_PRIVKEYCACERT | \
527 SESSION_NEEDS_CERTSTORE,
536 initSCEPserverProcessing( sessionInfoPtr );
538 initSCEPclientProcessing( sessionInfoPtr );
539 sessionInfoPtr->setAttributeFunction = setAttributeFunction;
540 sessionInfoPtr->checkAttributeFunction = checkAttributeFunction;