Lines Matching refs:proposal

54 	integ = ikev2_get_integ(data->proposal.integ);
55 prf = ikev2_get_prf(data->proposal.prf);
56 encr = ikev2_get_encr(data->proposal.encr);
58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
169 transform_id == data->proposal.encr) {
195 transform_id == data->proposal.prf)
200 transform_id == data->proposal.integ)
205 transform_id == data->proposal.dh)
223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
266 "in proposal");
345 /* Only one proposal expected in SAr */
350 wpa_printf(MSG_INFO, "IKEV2: Unexpected data after proposal");
355 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
360 "INTEG:%d D-H:%d", data->proposal.proposal_num,
361 data->proposal.encr, data->proposal.prf,
362 data->proposal.integ, data->proposal.dh);
393 if (group != data->proposal.dh) {
395 "with the selected proposal (%u)",
396 group, data->proposal.dh);
461 decrypted = ikev2_decrypt_payload(data->proposal.encr,
462 data->proposal.integ, &data->keys, 0,
622 if (ikev2_derive_auth_data(data->proposal.prf, data->r_sign_msg,
636 prf = ikev2_get_prf(data->proposal.prf);
725 decrypted = ikev2_decrypt_payload(data->proposal.encr,
726 data->proposal.integ,
926 p->proposal_num = data->proposal.proposal_num;
933 WPA_PUT_BE16(t->transform_id, data->proposal.encr);
934 if (data->proposal.encr == ENCR_AES_CBC) {
946 WPA_PUT_BE16(t->transform_id, data->proposal.prf);
952 WPA_PUT_BE16(t->transform_id, data->proposal.integ);
957 WPA_PUT_BE16(t->transform_id, data->proposal.dh);
978 data->dh = dh_groups_get(data->proposal.dh);
990 wpabuf_put_be16(msg, data->proposal.dh); /* DH Group # */
1060 prf = ikev2_get_prf(data->proposal.prf);
1072 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg,
1177 ikev2_build_encrypted(data->proposal.encr, data->proposal.integ,