/freebsd-10.3-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 279 "in proposal"); 353 os_memcpy(&data->proposal, &prop, sizeof(prop)); 367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 118 data->ikev2.proposal.prf, &data->ikev2.keys, 167 integ = ikev2_get_integ(data->ikev2.proposal.integ); 193 ikev2_integ_hash(data->ikev2.proposal.integ, 253 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/freebsd-10.3-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 158 integ = ikev2_get_integ(data->ikev2.proposal.integ); 184 ikev2_integ_hash(data->ikev2.proposal.integ, 260 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/freebsd-10.3-release/crypto/openssh/ |
H A D | ssh_api.h | 34 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
|
H A D | ssh_api.c | 79 char **proposal; local 96 proposal = kex_params ? kex_params->proposal : myproposal; 97 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { 484 char **proposal; local 489 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) 491 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; 520 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; 521 replace = NULL; /* owned by proposal */ 522 r = kex_prop2buf(ssh->kex->my, proposal); [all...] |
H A D | kex.c | 232 /* put algorithm proposal into buffer */ 234 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) argument 250 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) 259 /* parse buffer and return algorithm proposal */ 266 char **proposal = NULL; local 270 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) 278 /* extract kex init proposal strings */ 280 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) 282 debug2("%s: %s", proposal_names[i], proposal[i]); 293 *propp = proposal; 302 kex_prop_free(char **proposal) argument 511 kex_new(struct ssh *ssh, char *proposal[PROPOSAL_MAX], struct kex **kexp) argument 596 kex_setup(struct ssh *ssh, char *proposal[PROPOSAL_MAX]) argument [all...] |
H A D | compat.c | 254 * Filters a proposal string, excluding any algorithm matching the 'filter' 258 filter_proposal(char *proposal, const char *filter) argument 265 tmp = orig_prop = xstrdup(proposal); 287 debug2("%s: original cipher proposal: %s", __func__, cipher_prop); 289 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop); 300 debug2("%s: original public key proposal: %s", __func__, pkalg_prop); 302 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop); 313 debug2("%s: original KEX proposal: %s", __func__, p); 320 debug2("%s: compat KEX proposal: %s", __func__, p);
|
H A D | kex.h | 173 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
|
/freebsd-10.3-release/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 99 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); 101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; 104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
|