Searched refs:proposal (Results 1 - 8 of 8) sorted by relevance

/freebsd-10.1-release/contrib/wpa/src/eap_peer/
H A Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
279 "in proposal");
353 os_memcpy(&data->proposal, &prop, sizeof(prop));
367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
H A Deap_ikev2.c118 data->ikev2.proposal.prf, &data->ikev2.keys,
167 integ = ikev2_get_integ(data->ikev2.proposal.integ);
193 ikev2_integ_hash(data->ikev2.proposal.integ,
253 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/freebsd-10.1-release/contrib/wpa/src/eap_server/
H A Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
158 integ = ikev2_get_integ(data->ikev2.proposal.integ);
184 ikev2_integ_hash(data->ikev2.proposal.integ,
260 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
328 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/freebsd-10.1-release/crypto/openssh/
H A Dkex.c149 /* put algorithm proposal into buffer. */
156 kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) argument
168 buffer_put_cstring(b, proposal[i]);
173 /* parse buffer and return algorithm proposal */
179 char **proposal; local
181 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *));
188 /* extract kex init proposal strings */
190 proposal[i] = buffer_get_cstring(&b,NULL);
191 debug2("kex_parse_kexinit: %s", proposal[i]);
201 return proposal;
205 kex_prop_free(char **proposal) argument
324 kex_setup(char *proposal[PROPOSAL_MAX]) argument
[all...]
H A Dcompat.c227 * Filters a proposal string, excluding any algorithm matching the 'filter'
231 filter_proposal(char *proposal, const char *filter) argument
238 tmp = orig_prop = xstrdup(proposal);
260 debug2("%s: original cipher proposal: %s", __func__, cipher_prop);
262 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop);
273 debug2("%s: original public key proposal: %s", __func__, pkalg_prop);
275 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop);
286 debug2("%s: original KEX proposal: %s", __func__, kex_prop);
288 debug2("%s: compat KEX proposal: %s", __func__, kex_prop);

Completed in 121 milliseconds