Searched refs:proposal (Results 1 - 13 of 13) sorted by relevance

/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
253 "in proposal");
327 os_memcpy(&data->proposal, &prop, sizeof(prop));
341 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
345 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
H A Deap_ikev2.c121 data->ikev2.proposal.prf, &data->ikev2.keys,
164 integ = ikev2_get_integ(data->ikev2.proposal.integ);
190 ikev2_integ_hash(data->ikev2.proposal.integ,
251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Dikev2.h33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
H A Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
160 integ = ikev2_get_integ(data->ikev2.proposal.integ);
186 ikev2_integ_hash(data->ikev2.proposal.integ,
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
337 data->ikev2.proposal.prf, &data->ikev2.keys,
/freebsd-11-stable/crypto/openssh/
H A Dssh_api.h34 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
H A Dmatch.c301 match_filter_list(const char *proposal, const char *filter) argument
303 size_t len = strlen(proposal) + 1;
305 char *orig_prop = strdup(proposal);
H A Dkex.c243 /* put algorithm proposal into buffer */
245 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) argument
261 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0)
270 /* parse buffer and return algorithm proposal */
277 char **proposal = NULL; local
281 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL)
289 /* extract kex init proposal strings */
291 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0)
293 debug2("%s: %s", proposal_names[i], proposal[i]);
304 *propp = proposal;
313 kex_prop_free(char **proposal) argument
531 kex_new(struct ssh *ssh, char *proposal[PROPOSAL_MAX], struct kex **kexp) argument
617 kex_setup(struct ssh *ssh, char *proposal[PROPOSAL_MAX]) argument
[all...]
H A Dssh_api.c77 char **proposal; local
94 proposal = kex_params ? kex_params->proposal : myproposal;
95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) {
488 char **proposal; local
493 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0)
495 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS];
524 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace;
525 replace = NULL; /* owned by proposal */
526 r = kex_prop2buf(ssh->kex->my, proposal);
[all...]
H A Dkex.h180 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
/freebsd-11-stable/crypto/openssh/regress/unittests/kex/
H A Dtest_kex.c99 memcpy(kex_params.proposal, myproposal, sizeof(myproposal));
101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex;
104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
/freebsd-11-stable/crypto/openssh/regress/misc/kexfuzz/
H A Dkexfuzz.c216 memcpy(kex_params.proposal, myproposal, sizeof(myproposal));
218 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex);
221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;

Completed in 122 milliseconds