Searched refs:newkeys (Results 1 - 8 of 8) sorted by relevance

/external/dropbear/
H A Dcommon-kex.c247 * ses.newkeys is the new set of keys which are generated, these are only
248 * taken into use after both sides have sent a newkeys message */
280 C2S_keysize = ses.newkeys->trans_algo_crypt->keysize;
281 S2C_keysize = ses.newkeys->recv_algo_crypt->keysize;
289 C2S_keysize = ses.newkeys->recv_algo_crypt->keysize;
290 S2C_keysize = ses.newkeys->trans_algo_crypt->keysize;
300 recv_cipher = find_cipher(ses.newkeys->recv_algo_crypt->cipherdesc->name);
305 ses.newkeys->recv_algo_crypt->keysize, 0,
306 &ses.newkeys->recv_symmetric_struct) != CRYPT_OK) {
309 trans_cipher = find_cipher(ses.newkeys
[all...]
H A Dsvr-kex.c91 ses.newkeys->algo_hostkey);
99 ses.newkeys->algo_hostkey, ses.hash, SHA1_HASH_SIZE);
H A Dsession.h132 struct key_context *newkeys; member in struct:sshsession
H A Dcli-kex.c74 type = ses.newkeys->algo_hostkey;
229 algoname = signkey_name_from_type(ses.newkeys->algo_hostkey, &algolen);
H A Dcommon-session.c89 ses.newkeys = NULL;
/external/openssh/
H A Dkex.c404 Newkeys *newkeys; local
434 newkeys = xcalloc(1, sizeof(*newkeys));
435 kex->newkeys[mode] = newkeys;
441 choose_enc (&newkeys->enc, cprop[nenc], sprop[nenc]);
442 choose_mac (&newkeys->mac, cprop[nmac], sprop[nmac]);
443 choose_comp(&newkeys->comp, cprop[ncomp], sprop[ncomp]);
446 newkeys->enc.name,
447 newkeys
[all...]
H A Dpacket.c165 Newkeys *newkeys[MODE_MAX]; member in struct:session_state
230 active_state->newkeys[MODE_IN] = active_state->newkeys[MODE_OUT] = NULL;
755 if (active_state->newkeys[mode] != NULL) {
758 enc = &active_state->newkeys[mode]->enc;
759 mac = &active_state->newkeys[mode]->mac;
760 comp = &active_state->newkeys[mode]->comp;
768 xfree(active_state->newkeys[mode]);
770 active_state->newkeys[mode] = kex_get_newkeys(mode);
771 if (active_state->newkeys[mod
[all...]
H A Dkex.h120 Newkeys *newkeys[MODE_MAX]; member in struct:Kex

Completed in 454 milliseconds