/freebsd/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 329 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1() 348 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1() 349 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 350 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1() 381 if (group != data->proposal.dh) { in ikev2_process_kei() 384 group, data->proposal.dh); in ikev2_process_kei() 550 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret() [all …]
|
H A D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 190 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 195 transform_id == data->proposal.integ) in ikev2_parse_transform() 200 transform_id == data->proposal.dh) in ikev2_parse_transform() 355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1() [all …]
|
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init() 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init() 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init() 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init() 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 186 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member
|
/freebsd/crypto/openssh/ |
H A D | match.c | 321 filter_list(const char *proposal, const char *filter, int denylist) in filter_list() argument 323 size_t len = strlen(proposal) + 1; in filter_list() 325 char *orig_prop = strdup(proposal); in filter_list() 354 match_filter_denylist(const char *proposal, const char *filter) in match_filter_denylist() argument 356 return filter_list(proposal, filter, 1); in match_filter_denylist() 364 match_filter_allowlist(const char *proposal, const char *filter) in match_filter_allowlist() argument 366 return filter_list(proposal, filter, 0); in match_filter_allowlist()
|
H A D | ssh_api.c | 92 char **proposal; in ssh_init() local 107 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init() 109 proposal[PROPOSAL_KEX_ALGS], in ssh_init() 110 proposal[PROPOSAL_ENC_ALGS_CTOS], in ssh_init() 111 proposal[PROPOSAL_MAC_ALGS_CTOS], in ssh_init() 112 proposal[PROPOSAL_COMP_ALGS_CTOS], in ssh_init() 113 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]); in ssh_init() 533 char **proposal; in _ssh_order_hostkeyalgs() local 538 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs() 540 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs() [all …]
|
H A D | kex.c | 150 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf() 166 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf() 182 char **proposal = NULL; in kex_buf2prop() local 186 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop() 198 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) { in kex_buf2prop() 202 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop() 215 *propp = proposal; in kex_buf2prop() 217 if (r != 0 && proposal != NULL) in kex_buf2prop() 218 kex_prop_free(proposal); in kex_buf2prop() 224 kex_prop_free(char **proposal) in kex_prop_free() argument [all …]
|
H A D | kex-names.c | 188 kex_has_any_alg(const char *proposal, const char *algs) in kex_has_any_alg() argument 192 if ((cp = match_list(proposal, algs, NULL)) == NULL) in kex_has_any_alg()
|
H A D | ssh_api.h | 34 char *proposal[PROPOSAL_MAX]; member
|
H A D | kex.h | 210 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
|
/freebsd/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 97 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key() 99 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; in do_kex_with_key() 102 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
|
/freebsd/contrib/libcbor/ |
H A D | CONTRIBUTING.md | 13 **New features:** I am looking to keep the scope of libcbor small. If you would like to add a feature, please open an issue with your proposal (or reach out to me privately) to discuss if the feature fits into libcbor before opening a PR. 15 **Major changes:** Please open an issue with your proposal (or reach out to me privately) to discuss if the improvement fits into cbor before opening a PR.
|
/freebsd/sys/contrib/openzfs/.github/ISSUE_TEMPLATE/ |
H A D | feature_request.md | 32 Any additional information you can add about the proposal?
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 181 const char *ccp, *proposal[PROPOSAL_MAX] = { KEX_CLIENT }; in do_kex_with_key() local 206 ccp = proposal[i]; in do_kex_with_key() 220 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key()
|
/freebsd/contrib/googletest/ |
H A D | CONTRIBUTING.md | 64 that a particular proposal may not be the best choice. There's never a reason to
|
/freebsd/contrib/llvm-project/llvm/include/llvm/IR/ |
H A D | IntrinsicsWebAssembly.td | 347 // instructions are merged to the proposal.
|
/freebsd/contrib/llvm-project/llvm/include/llvm/BinaryFormat/ |
H A D | Dwarf.def | 503 // Extensions for Fission proposal. 687 // Extensions for Fission proposal 690 // Alternate debug sections proposal (output of "dwz" tool). 885 // Extensions for Fission proposal.
|
H A D | DynamicTags.def | 83 // Experimental support for SHT_RELR sections. For details, see proposal
|
/freebsd/crypto/heimdal/doc/ |
H A D | apps.texi | 230 2b is the name of the proposal that was implemented to give basic
|
/freebsd/crypto/heimdal/lib/wind/ |
H A D | rfc4518.txt | 152 "Internationalized String Matching Rules for X.500" [XMATCH] proposal
|
/freebsd/usr.sbin/cron/doc/ |
H A D | MAIL | 176 My proposal to you is to implement some special chars for the first
|
/freebsd/contrib/tzdata/ |
H A D | southamerica | 140 # The last hurdle of Argentina DST is over, the proposal was approved in 143 # the original scanned proposal, where the dates and the zero hours are 675 # This change follows a proposal of senator Tiao Viana of Acre state, that
|
H A D | africa | 1255 # "The proposal is that the Globe should be divided into twelve zones East and 1259 # proposal, standard time will be advanced another 30 minutes". It was further
|