Searched refs:proposal (Results 1 - 8 of 8) sorted by relevance
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 279 "in proposal"); 353 os_memcpy(&data->proposal, &prop, sizeof(prop)); 367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 118 data->ikev2.proposal.prf, &data->ikev2.keys, 167 integ = ikev2_get_integ(data->ikev2.proposal.integ); 193 ikev2_integ_hash(data->ikev2.proposal.integ, 253 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 158 integ = ikev2_get_integ(data->ikev2.proposal.integ); 184 ikev2_integ_hash(data->ikev2.proposal.integ, 260 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | kex.c | 149 /* put algorithm proposal into buffer. */ 156 kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) argument 168 buffer_put_cstring(b, proposal[i]); 173 /* parse buffer and return algorithm proposal */ 179 char **proposal; local 181 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *)); 188 /* extract kex init proposal strings */ 190 proposal[i] = buffer_get_cstring(&b,NULL); 191 debug2("kex_parse_kexinit: %s", proposal[i]); 201 return proposal; 205 kex_prop_free(char **proposal) argument 324 kex_setup(char *proposal[PROPOSAL_MAX]) argument [all...] |
H A D | compat.c | 227 * Filters a proposal string, excluding any algorithm matching the 'filter' 231 filter_proposal(char *proposal, const char *filter) argument 238 tmp = orig_prop = xstrdup(proposal); 260 debug2("%s: original cipher proposal: %s", __func__, cipher_prop); 262 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop); 273 debug2("%s: original public key proposal: %s", __func__, pkalg_prop); 275 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop); 286 debug2("%s: original KEX proposal: %s", __func__, kex_prop); 288 debug2("%s: compat KEX proposal: %s", __func__, kex_prop);
|
Completed in 123 milliseconds