Lines Matching refs:clientsig

709   uint8_t clientbuf[RTMP_SIG_SIZE + 4], *clientsig=clientbuf+4;  in HandShake()  local
723 clientsig[-1] = 0x06; /* 0x08 is RTMPE as well */ in HandShake()
727 clientsig[-1] = 0x03; in HandShake()
730 memcpy(clientsig, &uptime, 4); in HandShake()
737 clientsig[4] = 128; in HandShake()
738 clientsig[6] = 3; in HandShake()
742 clientsig[4] = 10; in HandShake()
743 clientsig[6] = 45; in HandShake()
745 clientsig[5] = 0; in HandShake()
746 clientsig[7] = 2; in HandShake()
748 RTMP_Log(RTMP_LOGDEBUG, "%s: Client type: %02X", __FUNCTION__, clientsig[-1]); in HandShake()
754 memset(&clientsig[4], 0, 4); in HandShake()
759 memset(clientsig+8, 0, RTMP_SIG_SIZE-8); in HandShake()
761 ip = (int32_t *)(clientsig+8); in HandShake()
780 dhposClient = getdh(clientsig, RTMP_SIG_SIZE); in HandShake()
790 if (!DHGetPublicKey(r->Link.dh, &clientsig[dhposClient], 128)) in HandShake()
797 digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); /* reuse this value in verification */ in HandShake()
801 CalculateDigest(digestPosClient, clientsig, GenuineFPKey, 30, in HandShake()
802 &clientsig[digestPosClient]); in HandShake()
805 RTMP_LogHex(RTMP_LOGDEBUG, clientsig + digestPosClient, in HandShake()
811 RTMP_LogHex(RTMP_LOGDEBUG, clientsig, RTMP_SIG_SIZE); in HandShake()
814 if (!WriteN(r, (char *)clientsig-1, RTMP_SIG_SIZE + 1)) in HandShake()
822 if (type != clientsig[-1]) in HandShake()
824 __FUNCTION__, clientsig[-1], type); in HandShake()
906 (uint8_t *) & clientsig[dhposClient], in HandShake()
997 HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH, in HandShake()
1060 if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0) in HandShake()
1083 uint8_t clientsig[RTMP_SIG_SIZE]; in SHandShake() local
1092 if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) in SHandShake()
1096 RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); in SHandShake()
1109 if (clientsig[4] == 128) in SHandShake()
1119 if (!FP9HandShake && clientsig[4]) in SHandShake()
1205 memcpy(&uptime, clientsig, 4); in SHandShake()
1209 RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__, clientsig[4], in SHandShake()
1210 clientsig[5], clientsig[6], clientsig[7]); in SHandShake()
1218 int digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); in SHandShake()
1220 if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30)) in SHandShake()
1227 digestPosClient = getdig(clientsig, RTMP_SIG_SIZE); in SHandShake()
1229 if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30)) in SHandShake()
1258 dhposClient = getdh(clientsig, RTMP_SIG_SIZE); in SHandShake()
1263 (uint8_t *) &clientsig[dhposClient], 128, in SHandShake()
1275 (uint8_t *) &clientsig[dhposClient], in SHandShake()
1282 signatureResp = clientsig+RTMP_SIG_SIZE-SHA256_DIGEST_LENGTH; in SHandShake()
1284 HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH, in SHandShake()
1286 HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digestResp, in SHandShake()
1320 memcpy(clientsig+4, &uptime, 4); in SHandShake()
1326 RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); in SHandShake()
1328 if (!WriteN(r, (char *)clientsig, RTMP_SIG_SIZE)) in SHandShake()
1332 if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE) in SHandShake()
1336 RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE); in SHandShake()
1344 RTMP_LogHex(RTMP_LOGDEBUG, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], in SHandShake()
1350 HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digest, in SHandShake()
1378 (signature, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH], in SHandShake()
1410 if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0) in SHandShake()