/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 253 "in proposal"); 327 os_memcpy(&data->proposal, &prop, sizeof(prop)); 341 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 345 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); 190 ikev2_integ_hash(data->ikev2.proposal.integ, 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); 186 ikev2_integ_hash(data->ikev2.proposal.integ, 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 337 data->ikev2.proposal.prf, &data->ikev2.keys,
|
/freebsd-11-stable/crypto/openssh/ |
H A D | ssh_api.h | 34 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
|
H A D | match.c | 301 match_filter_list(const char *proposal, const char *filter) argument 303 size_t len = strlen(proposal) + 1; 305 char *orig_prop = strdup(proposal);
|
H A D | kex.c | 243 /* put algorithm proposal into buffer */ 245 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) argument 261 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) 270 /* parse buffer and return algorithm proposal */ 277 char **proposal = NULL; local 281 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) 289 /* extract kex init proposal strings */ 291 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) 293 debug2("%s: %s", proposal_names[i], proposal[i]); 304 *propp = proposal; 313 kex_prop_free(char **proposal) argument 531 kex_new(struct ssh *ssh, char *proposal[PROPOSAL_MAX], struct kex **kexp) argument 617 kex_setup(struct ssh *ssh, char *proposal[PROPOSAL_MAX]) argument [all...] |
H A D | ssh_api.c | 77 char **proposal; local 94 proposal = kex_params ? kex_params->proposal : myproposal; 95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { 488 char **proposal; local 493 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) 495 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; 524 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; 525 replace = NULL; /* owned by proposal */ 526 r = kex_prop2buf(ssh->kex->my, proposal); [all...] |
H A D | kex.h | 180 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
|
/freebsd-11-stable/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 99 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); 101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; 104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
|
/freebsd-11-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 216 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); 218 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex); 221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
|