SKE: support for simplified key exchange
[silc.git] / lib / silcske / silcske.c
index bac8a5c4fac9b8feb642da88c272092fa4a1ccb3..129c178e6896ec67261dca6984d5287e14567b79 100644 (file)
@@ -4,7 +4,7 @@
 
   Author: Pekka Riikonen <priikone@silcnet.org>
 
-  Copyright (C) 2000 - 2008 Pekka Riikonen
+  Copyright (C) 2000 - 2014 Pekka Riikonen
 
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
@@ -73,6 +73,41 @@ static SilcBool silc_ske_packet_send(SilcSKE ske,
                                     const unsigned char *data,
                                     SilcUInt32 data_len);
 
+/*
+ * Notify the owner of the ske that we failed.  Ensures that we don't make the
+ * same callout twice, as the notification callback routines are not designed
+ * to handle that case.
+ */
+static void silc_ske_notify_failure(SilcSKE ske)
+{
+  SILC_LOG_DEBUG(("Notifying SKE %p owner of failure (failure_notified = %d)",
+                 ske, ske->failure_notified));
+
+  /*
+   * First, check if we have already made a failure callout.  If so, then we
+   * will stop here.
+   */
+  if (ske->failure_notified)
+    return;
+
+  /*
+   * Mark ourselves as having already sent the failure notification here and
+   * now.
+   */
+  ske->failure_notified = TRUE;
+
+  SILC_LOG_DEBUG(("Deliver failure notification for SKE %p (%s)",
+                 ske, ske->responder ? "responder" : "initiator"));
+
+  /*
+   * Finally, make the call to the owner's registered failure callback.
+   */
+  if (ske->responder)
+    silc_fsm_next(&ske->fsm, silc_ske_st_responder_failure);
+  else
+    silc_fsm_next(&ske->fsm, silc_ske_st_initiator_failure);
+}
+
 /* Packet callback */
 
 static SilcBool silc_ske_packet_receive(SilcPacketEngine engine,
@@ -107,12 +142,8 @@ static SilcBool silc_ske_packet_receive(SilcPacketEngine engine,
   }
 
   /* See if received failure from remote */
-  if (packet->type == SILC_PACKET_FAILURE) {
-    if (ske->responder)
-      silc_fsm_next(&ske->fsm, silc_ske_st_responder_failure);
-    else
-      silc_fsm_next(&ske->fsm, silc_ske_st_initiator_failure);
-  }
+  if (packet->type == SILC_PACKET_FAILURE)
+    silc_ske_notify_failure(ske);
 
   /* Handle rekey and SUCCESS packets synchronously.  After SUCCESS packets
      they keys are taken into use immediately, hence the synchronous
@@ -209,6 +240,8 @@ silc_ske_select_security_properties(SilcSKE ske,
   SILC_LOG_DEBUG(("Parsing KE Start Payload"));
 
   rp = remote_payload;
+  if (!rp)
+    return SILC_SKE_STATUS_BAD_VERSION;
 
   /* Check for mandatory fields */
   if (!rp->ke_grp_len) {
@@ -679,8 +712,14 @@ static SilcSKEStatus silc_ske_make_hash(SilcSKE ske,
     s_len = (ske->start_payload_copy ?
             silc_buffer_len(ske->start_payload_copy) : 0);
     e = silc_mp_mp2bin(&ske->ke1_payload->x, 0, &e_len);
+    if (!e)
+      return SILC_SKE_STATUS_OUT_OF_MEMORY;
     f = silc_mp_mp2bin(&ske->ke2_payload->x, 0, &f_len);
+    if (!f)
+      return SILC_SKE_STATUS_OUT_OF_MEMORY;
     KEY = silc_mp_mp2bin(ske->KEY, 0, &KEY_len);
+    if (!KEY)
+      return SILC_SKE_STATUS_OUT_OF_MEMORY;
 
     /* Format the buffer used to compute the hash value */
     buf = silc_buffer_alloc_size(s_len +
@@ -737,6 +776,8 @@ static SilcSKEStatus silc_ske_make_hash(SilcSKE ske,
     s_len = (ske->start_payload_copy ?
             silc_buffer_len(ske->start_payload_copy) : 0);
     e = silc_mp_mp2bin(&ske->ke1_payload->x, 0, &e_len);
+    if (!e)
+      return SILC_SKE_STATUS_OUT_OF_MEMORY;
 
     buf = silc_buffer_alloc_size(s_len + ske->ke1_payload->pk_len + e_len);
     if (!buf)
@@ -787,6 +828,9 @@ silc_ske_make_rekey_material(SilcSKE ske, SilcSKEKeyMaterial keymat)
   SilcSKERekeyMaterial rekey;
   const char *hash;
 
+  if (!keymat)
+    return NULL;
+
   /* Create rekey material */
   rekey = silc_calloc(1, sizeof(*rekey));
   if (!rekey)
@@ -820,7 +864,8 @@ silc_ske_make_rekey_material(SilcSKE ske, SilcSKEKeyMaterial keymat)
 static SilcSKEStartPayload
 silc_ske_assemble_security_properties(SilcSKE ske,
                                      SilcSKESecurityPropertyFlag flags,
-                                     const char *version)
+                                     const char *version,
+                                     SilcBool small_proposal)
 {
   SilcSKEStartPayload rp;
   int i;
@@ -828,12 +873,18 @@ silc_ske_assemble_security_properties(SilcSKE ske,
   SILC_LOG_DEBUG(("Assembling KE Start Payload"));
 
   rp = silc_calloc(1, sizeof(*rp));
+  if (!rp)
+    return NULL;
 
   /* Set flags */
   rp->flags = (unsigned char)flags;
 
   /* Set random cookie */
   rp->cookie = silc_calloc(SILC_SKE_COOKIE_LEN, sizeof(*rp->cookie));
+  if (!rp->cookie) {
+    silc_free(rp);
+    return NULL;
+  }
   for (i = 0; i < SILC_SKE_COOKIE_LEN; i++)
     rp->cookie[i] = silc_rng_get_byte_fast(ske->rng);
   rp->cookie_len = SILC_SKE_COOKIE_LEN;
@@ -845,32 +896,52 @@ silc_ske_assemble_security_properties(SilcSKE ske,
 
   /* Put version */
   rp->version = strdup(version);
-  rp->version_len = strlen(version);
+  if (rp->version)
+    rp->version_len = strlen(version);
 
   /* Get supported Key Exhange groups */
-  rp->ke_grp_list = silc_ske_get_supported_groups();
-  rp->ke_grp_len = strlen(rp->ke_grp_list);
+  rp->ke_grp_list = silc_ske_get_supported_groups(small_proposal);
+  if (rp->ke_grp_list)
+    rp->ke_grp_len = strlen(rp->ke_grp_list);
 
   /* Get supported PKCS algorithms */
-  rp->pkcs_alg_list = silc_pkcs_get_supported();
-  rp->pkcs_alg_len = strlen(rp->pkcs_alg_list);
+  if (small_proposal)
+    rp->pkcs_alg_list = strdup(silc_default_pkcs_alg[0].name);
+  else
+    rp->pkcs_alg_list = silc_pkcs_get_supported();
+  if (rp->pkcs_alg_list)
+    rp->pkcs_alg_len = strlen(rp->pkcs_alg_list);
 
   /* Get supported encryption algorithms */
-  rp->enc_alg_list = silc_cipher_get_supported();
-  rp->enc_alg_len = strlen(rp->enc_alg_list);
+  if (small_proposal)
+    rp->enc_alg_list = strdup(silc_default_ciphers[0].name);
+  else
+    rp->enc_alg_list = silc_cipher_get_supported();
+  if (rp->enc_alg_list)
+    rp->enc_alg_len = strlen(rp->enc_alg_list);
 
   /* Get supported hash algorithms */
-  rp->hash_alg_list = silc_hash_get_supported();
-  rp->hash_alg_len = strlen(rp->hash_alg_list);
+  if (small_proposal)
+    rp->hash_alg_list = strdup(silc_default_hash[0].name);
+  else
+    rp->hash_alg_list = silc_hash_get_supported();
+  if (rp->hash_alg_list)
+    rp->hash_alg_len = strlen(rp->hash_alg_list);
 
   /* Get supported HMACs */
-  rp->hmac_alg_list = silc_hmac_get_supported();
-  rp->hmac_alg_len = strlen(rp->hmac_alg_list);
+  if (small_proposal)
+    rp->hmac_alg_list = strdup(silc_default_hmacs[0].name);
+  else
+    rp->hmac_alg_list = silc_hmac_get_supported();
+  if (rp->hmac_alg_list)
+    rp->hmac_alg_len = strlen(rp->hmac_alg_list);
 
-  /* XXX */
-  /* Get supported compression algorithms */
-  rp->comp_alg_list = strdup("none");
-  rp->comp_alg_len = strlen("none");
+  if (!small_proposal) {
+    /* XXX */
+    /* Get supported compression algorithms */
+    rp->comp_alg_list = strdup("none");
+    rp->comp_alg_len = strlen("none");
+  }
 
   rp->len = 1 + 1 + 2 + SILC_SKE_COOKIE_LEN +
     2 + rp->version_len +
@@ -895,10 +966,7 @@ SILC_TASK_CALLBACK(silc_ske_packet_send_retry)
     silc_free(ske->retrans.data);
     ske->retrans.data = NULL;
     ske->status = SILC_SKE_STATUS_TIMEOUT;
-    if (ske->responder)
-      silc_fsm_next(&ske->fsm, silc_ske_st_responder_failure);
-    else
-      silc_fsm_next(&ske->fsm, silc_ske_st_initiator_failure);
+    silc_ske_notify_failure(ske);
     silc_fsm_continue_sync(&ske->fsm);
     return;
   }
@@ -944,8 +1012,10 @@ static SilcBool silc_ske_packet_send(SilcSKE ske,
     ske->retrans.type = type;
     ske->retrans.flags = flags;
     ske->retrans.data = silc_memdup(data, data_len);
-    ske->retrans.data_len = data_len;
-    silc_ske_install_retransmission(ske);
+    if (ske->retrans.data) {
+      ske->retrans.data_len = data_len;
+      silc_ske_install_retransmission(ske);
+    }
   }
 
   return ret;
@@ -957,7 +1027,7 @@ static SilcBool silc_ske_packet_send(SilcSKE ske,
 static void silc_ske_completion(SilcSKE ske)
 {
   /* Call the completion callback */
-  if (!ske->freed && !ske->aborted && ske->callbacks->completed) {
+  if (!ske->aborted && ske->callbacks->completed) {
     if (ske->status != SILC_SKE_STATUS_OK)
       ske->callbacks->completed(ske, ske->status, NULL, NULL, NULL,
                                ske->callbacks->context);
@@ -973,9 +1043,7 @@ static void silc_ske_finished(SilcFSM fsm, void *fsm_context,
                              void *destructor_context)
 {
   SilcSKE ske = fsm_context;
-  ske->running = FALSE;
-  if (ske->freed)
-    silc_ske_free(ske);
+  silc_ske_free(ske);
 }
 
 /* Key exchange timeout task callback */
@@ -988,10 +1056,22 @@ SILC_TASK_CALLBACK(silc_ske_timeout)
 
   ske->packet = NULL;
   ske->status = SILC_SKE_STATUS_TIMEOUT;
-  if (ske->responder)
-    silc_fsm_next(&ske->fsm, silc_ske_st_responder_failure);
-  else
-    silc_fsm_next(&ske->fsm, silc_ske_st_initiator_failure);
+  silc_ske_notify_failure(ske);
+
+  silc_fsm_continue_sync(&ske->fsm);
+}
+
+/* Key exchange timeout task callback */
+
+SILC_TASK_CALLBACK(silc_ske_probe_timeout)
+{
+  SilcSKE ske = context;
+
+  SILC_LOG_DEBUG(("Probe timeout"));
+
+  ske->packet = NULL;
+  ske->status = SILC_SKE_STATUS_PROBE_TIMEOUT;
+  silc_ske_notify_failure(ske);
 
   silc_fsm_continue_sync(&ske->fsm);
 }
@@ -1036,25 +1116,30 @@ SilcSKE silc_ske_alloc(SilcRng rng, SilcSchedule schedule,
 
 void silc_ske_free(SilcSKE ske)
 {
-  SILC_LOG_DEBUG(("Freeing Key Exchange object"));
-
   if (!ske)
     return;
 
-  if (ske->running) {
-    ske->freed = TRUE;
+  SILC_LOG_DEBUG(("Freeing Key Exchange object %p: aborted=%u refcount=%hu",
+                 ske, ske->aborted, ske->refcnt));
 
-    if (ske->aborted) {
-      /* If already aborted, destroy the session immediately */
-      ske->packet = NULL;
-      ske->status = SILC_SKE_STATUS_ERROR;
-      if (ske->responder)
-       silc_fsm_next(&ske->fsm, silc_ske_st_responder_failure);
-      else
-       silc_fsm_next(&ske->fsm, silc_ske_st_initiator_failure);
+  if (ske->aborted) {
+    /*
+     * If already aborted, destroy the session immediately.  Only do the
+     * notification work if we have not already though, as doing so twice
+     * results in memory corruption.  We may have silc_ske_free called
+     * twice, once when the abort is requested, and then again when the
+     * FSM finish routine is called.  We have to be prepared to handle
+     * that case.
+     */
+    ske->packet = NULL;
+    ske->status = SILC_SKE_STATUS_ERROR;
+
+    silc_ske_notify_failure(ske);
+
+    if (silc_fsm_is_started(&ske->fsm))
       silc_fsm_continue_sync(&ske->fsm);
-    }
-    return;
+    else
+      SILC_LOG_DEBUG(("Not continuing FSM as it's finished for SKE %p", ske));
   }
 
   ske->refcnt--;
@@ -1102,7 +1187,7 @@ void silc_ske_free(SilcSKE ske)
   silc_free(ske->hash);
   silc_free(ske->callbacks);
 
-  memset(ske, 'F', sizeof(*ske));
+  memset(ske, 0xdd, sizeof(*ske));
   silc_free(ske);
 }
 
@@ -1174,10 +1259,6 @@ SILC_FSM_STATE(silc_ske_st_initiator_start)
     return SILC_FSM_CONTINUE;
   }
 
-  /* Add key exchange timeout */
-  silc_schedule_task_add_timeout(ske->schedule, silc_ske_timeout,
-                                ske, ske->timeout, 0);
-
   /** Wait for responder proposal */
   SILC_LOG_DEBUG(("Waiting for responder proposal"));
   silc_fsm_next(fsm, silc_ske_st_initiator_phase1);
@@ -1208,6 +1289,8 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase1)
     return SILC_FSM_WAIT;
   }
 
+  silc_schedule_task_del_by_all(ske->schedule, 0, silc_ske_probe_timeout, ske);
+
   /* Decode the payload */
   status = silc_ske_payload_start_decode(ske, packet_buf, &payload);
   if (status != SILC_SKE_STATUS_OK) {
@@ -1220,7 +1303,9 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase1)
   }
 
   /* Get remote ID and set it to stream */
-  if (ske->packet->src_id_len) {
+  if (ske->packet->src_id_len &&
+      (ske->packet->src_id_type == SILC_ID_SERVER ||
+       ske->packet->src_id_type == SILC_ID_CLIENT)) {
     silc_id_str2id(ske->packet->src_id, ske->packet->src_id_len,
                   ske->packet->src_id_type,
                   (ske->packet->src_id_type == SILC_ID_SERVER ?
@@ -1309,13 +1394,15 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase1)
     silc_ske_payload_start_free(payload);
   if (group)
     silc_ske_group_free(group);
-  if (prop->cipher)
-    silc_cipher_free(prop->cipher);
-  if (prop->hash)
-    silc_hash_free(prop->hash);
-  if (prop->hmac)
-    silc_hmac_free(prop->hmac);
-  silc_free(prop);
+  if (prop) {
+    if (prop->cipher)
+      silc_cipher_free(prop->cipher);
+    if (prop->hash)
+      silc_hash_free(prop->hash);
+    if (prop->hmac)
+      silc_hmac_free(prop->hmac);
+    silc_free(prop);
+  }
   ske->prop = NULL;
 
   if (status == SILC_SKE_STATUS_OK)
@@ -1342,7 +1429,7 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase2)
 
   /* Create the random number x, 1 < x < q. */
   x = silc_calloc(1, sizeof(*x));
-  if (!x){
+  if (!x) {
     /** Out of memory */
     ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
     silc_fsm_next(fsm, silc_ske_st_initiator_error);
@@ -1400,7 +1487,7 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase2)
 
   /* Compute signature data if we are doing mutual authentication */
   if (ske->private_key && ske->prop->flags & SILC_SKE_SP_FLAG_MUTUAL) {
-    unsigned char hash[SILC_HASH_MAXLEN], sign[2048 + 1];
+    unsigned char hash[SILC_HASH_MAXLEN], sign[65536 + 1];
     SilcUInt32 hash_len, sign_len;
 
     SILC_LOG_DEBUG(("We are doing mutual authentication"));
@@ -1408,7 +1495,19 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase2)
 
     /* Compute the hash value */
     memset(hash, 0, sizeof(hash));
-    silc_ske_make_hash(ske, hash, &hash_len, TRUE);
+    if (silc_ske_make_hash(ske, hash, &hash_len, TRUE) != SILC_SKE_STATUS_OK)
+      {
+       /** Error computing hash */
+       silc_mp_uninit(x);
+       silc_free(x);
+       silc_mp_uninit(&payload->x);
+       silc_free(payload->pk_data);
+       silc_free(payload);
+       ske->ke1_payload = NULL;
+       ske->status = SILC_SKE_STATUS_SIGNATURE_ERROR;
+       silc_fsm_next(fsm, silc_ske_st_initiator_error);
+       return SILC_FSM_CONTINUE;
+      }
 
     SILC_LOG_DEBUG(("Signing HASH_i value"));
 
@@ -1514,6 +1613,10 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase3)
 
   /* Compute the shared secret key */
   KEY = silc_calloc(1, sizeof(*KEY));
+  if (!KEY) {
+    ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    goto err;
+  }
   silc_mp_init(KEY);
   silc_mp_pow_mod(KEY, &payload->x, ske->x, &ske->prop->group->group);
   ske->KEY = KEY;
@@ -1615,6 +1718,10 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase4)
   if (status != SILC_SKE_STATUS_OK)
     goto err;
   ske->hash = silc_memdup(hash, hash_len);
+  if (!ske->hash) {
+    status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    goto err;
+  }
   ske->hash_len = hash_len;
 
   if (ske->prop->public_key) {
@@ -1655,20 +1762,26 @@ SILC_FSM_STATE(silc_ske_st_initiator_phase4)
     goto err;
   }
 
-  /* Send SUCCESS packet */
-  SILC_PUT32_MSB((SilcUInt32)SILC_SKE_STATUS_OK, hash);
-  if (!silc_ske_packet_send(ske, SILC_PACKET_SUCCESS, 0, hash, 4)) {
-    /** Error sending packet */
-    SILC_LOG_DEBUG(("Error sending packet"));
-    ske->status = SILC_SKE_STATUS_ERROR;
-    silc_fsm_next(fsm, silc_ske_st_initiator_error);
+  if (!ske->no_acks) {
+    /* Send SUCCESS packet */
+    SILC_PUT32_MSB((SilcUInt32)SILC_SKE_STATUS_OK, hash);
+    if (!silc_ske_packet_send(ske, SILC_PACKET_SUCCESS, 0, hash, 4)) {
+      /** Error sending packet */
+      SILC_LOG_DEBUG(("Error sending packet"));
+      ske->status = SILC_SKE_STATUS_ERROR;
+      silc_fsm_next(fsm, silc_ske_st_initiator_error);
+      return SILC_FSM_CONTINUE;
+    }
+
+    /** Waiting completion */
+    silc_fsm_next(fsm, silc_ske_st_initiator_end);
+    return SILC_FSM_WAIT;
+  } else {
+    /** Complete protocol */
+    silc_fsm_next(fsm, silc_ske_st_initiator_end);
     return SILC_FSM_CONTINUE;
   }
 
-  /** Waiting completion */
-  silc_fsm_next(fsm, silc_ske_st_initiator_end);
-  return SILC_FSM_WAIT;
-
  err:
   memset(hash, 'F', sizeof(hash));
   silc_ske_payload_ke_free(payload);
@@ -1701,7 +1814,7 @@ SILC_FSM_STATE(silc_ske_st_initiator_end)
 
   SILC_LOG_DEBUG(("Start"));
 
-  if (ske->packet->type != SILC_PACKET_SUCCESS) {
+  if (!ske->no_acks && ske->packet->type != SILC_PACKET_SUCCESS) {
     SILC_LOG_DEBUG(("Remote retransmitted an old packet"));
     silc_ske_install_retransmission(ske);
     silc_packet_free(ske->packet);
@@ -1711,7 +1824,8 @@ SILC_FSM_STATE(silc_ske_st_initiator_end)
 
   SILC_LOG_DEBUG(("Key exchange completed successfully"));
 
-  silc_packet_free(ske->packet);
+  if (ske->packet)
+    silc_packet_free(ske->packet);
   ske->packet = NULL;
   silc_packet_stream_unlink(ske->stream, &silc_ske_stream_cbs, ske);
   silc_schedule_task_del_by_context(ske->schedule, ske);
@@ -1749,7 +1863,7 @@ SILC_FSM_STATE(silc_ske_st_initiator_aborted)
 SILC_FSM_STATE(silc_ske_st_initiator_error)
 {
   SilcSKE ske = fsm_context;
-  SilcSKEStatus status;
+  SilcUInt32 status;
   unsigned char data[4];
 
   SILC_LOG_DEBUG(("Error %s (%d) occurred during key exchange",
@@ -1760,7 +1874,7 @@ SILC_FSM_STATE(silc_ske_st_initiator_error)
     status = SILC_SKE_STATUS_ERROR;
 
   /* Send FAILURE packet */
-  SILC_PUT32_MSB((SilcUInt32)status, data);
+  SILC_PUT32_MSB(status, data);
   silc_ske_packet_send(ske, SILC_PACKET_FAILURE, 0, data, 4);
 
   silc_packet_stream_unlink(ske->stream, &silc_ske_stream_cbs, ske);
@@ -1777,14 +1891,16 @@ SILC_FSM_STATE(silc_ske_st_initiator_error)
 SILC_FSM_STATE(silc_ske_st_initiator_failure)
 {
   SilcSKE ske = fsm_context;
-  SilcUInt32 error = SILC_SKE_STATUS_ERROR;
+  SilcUInt32 error = ske->status;
 
   if (ske->packet && silc_buffer_len(&ske->packet->buffer) == 4) {
     SILC_GET32_MSB(error, ske->packet->buffer.data);
-    ske->status = error;
     silc_packet_free(ske->packet);
     ske->packet = NULL;
   }
+  if (error == SILC_SKE_STATUS_OK)
+    error = SILC_SKE_STATUS_ERROR;
+  ske->status = error;
 
   SILC_LOG_DEBUG(("Error %s (%d) received during key exchange",
                  silc_ske_map_status(ske->status), ske->status));
@@ -1805,7 +1921,8 @@ SilcAsyncOperation silc_ske_initiator(SilcSKE ske,
                                      SilcSKEParams params,
                                      SilcSKEStartPayload start_payload)
 {
-  SILC_LOG_DEBUG(("Start SKE as initiator"));
+  SILC_LOG_DEBUG(("Start SKE %p as initiator; stream=%p; params=%p; "
+                 "start_payload=%p", ske, stream, params, start_payload));
 
   if (!ske || !stream || !params || !params->version)
     return NULL;
@@ -1820,18 +1937,23 @@ SilcAsyncOperation silc_ske_initiator(SilcSKE ske,
     ske->session_port = params->session_port;
 
   /* Generate security properties if not provided */
-  if (!start_payload) {
-    start_payload = silc_ske_assemble_security_properties(ske,
-                                                         params->flags,
-                                                         params->version);
+  if (!start_payload && !params->prop) {
+    start_payload =
+      silc_ske_assemble_security_properties(ske, params->flags,
+                                           params->version,
+                                           params->small_proposal);
     if (!start_payload)
       return NULL;
   }
 
   ske->timeout = params->timeout_secs ? params->timeout_secs : 30;
+  ske->probe_timeout = (params->probe_timeout_secs ?
+                       params->probe_timeout_secs : 30);
   ske->start_payload = start_payload;
+  ske->prop = params->prop;
   ske->version = params->version;
-  ske->running = TRUE;
+  ske->no_acks = params->no_acks;
+  ++ske->refcnt;
 
   /* Link to packet stream to get key exchange packets */
   ske->stream = stream;
@@ -1841,8 +1963,18 @@ SilcAsyncOperation silc_ske_initiator(SilcSKE ske,
                          SILC_PACKET_SUCCESS,
                          SILC_PACKET_FAILURE, -1);
 
+  /* Add key exchange timeout */
+  silc_schedule_task_add_timeout(ske->schedule, silc_ske_timeout,
+                                ske, ske->timeout, 0);
+  if (ske->timeout != ske->probe_timeout)
+    silc_schedule_task_add_timeout(ske->schedule, silc_ske_probe_timeout,
+                                  ske, ske->probe_timeout, 0);
+
   /* Start SKE as initiator */
-  silc_fsm_start(&ske->fsm, silc_ske_st_initiator_start);
+  if (!ske->prop)
+    silc_fsm_start(&ske->fsm, silc_ske_st_initiator_start);
+  else
+    silc_fsm_start(&ske->fsm, silc_ske_st_initiator_phase2);
 
   return &ske->op;
 }
@@ -1863,12 +1995,11 @@ SILC_FSM_STATE(silc_ske_st_responder_start)
     return SILC_FSM_CONTINUE;
   }
 
-  /* Add key exchange timeout */
-  silc_schedule_task_add_timeout(ske->schedule, silc_ske_timeout,
-                                ske, ske->timeout, 0);
-
   /** Wait for initiator */
-  silc_fsm_next(fsm, silc_ske_st_responder_phase1);
+  if (!ske->prop)
+    silc_fsm_next(fsm, silc_ske_st_responder_phase1);
+  else
+    silc_fsm_next(fsm, silc_ske_st_responder_phase2);
   return SILC_FSM_WAIT;
 }
 
@@ -1897,7 +2028,9 @@ SILC_FSM_STATE(silc_ske_st_responder_phase1)
   }
 
   /* Get remote ID and set it to stream */
-  if (ske->packet->src_id_len) {
+  if (ske->packet->src_id_len &&
+      (ske->packet->src_id_type == SILC_ID_SERVER ||
+       ske->packet->src_id_type == SILC_ID_CLIENT)) {
     silc_id_str2id(ske->packet->src_id, ske->packet->src_id_len,
                   ske->packet->src_id_type,
                   (ske->packet->src_id_type == SILC_ID_SERVER ?
@@ -1912,6 +2045,13 @@ SILC_FSM_STATE(silc_ske_st_responder_phase1)
   /* Take a copy of the payload buffer for future use. It is used to
      compute the HASH value. */
   ske->start_payload_copy = silc_buffer_copy(packet_buf);
+  if (!ske->start_payload_copy) {
+    silc_packet_free(ske->packet);
+    ske->packet = NULL;
+    ske->status = status;
+    silc_fsm_next(fsm, silc_ske_st_responder_error);
+    return SILC_FSM_CONTINUE;
+  }
 
   silc_packet_free(ske->packet);
   ske->packet = NULL;
@@ -2089,8 +2229,8 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
 {
   SilcSKE ske = fsm_context;
   SilcSKEStatus status;
-  SilcSKEKEPayload recv_payload, send_payload;
-  SilcMPInt *x, *KEY;
+  SilcSKEKEPayload recv_payload, send_payload = NULL;
+  SilcMPInt *x = NULL, *KEY;
 
   if (ske->aborted) {
     /** Aborted */
@@ -2102,16 +2242,16 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
   if (ske->status != SILC_SKE_STATUS_OK) {
     /** Public key not verified */
     SILC_LOG_DEBUG(("Public key verification failed"));
-    silc_fsm_next(fsm, silc_ske_st_initiator_error);
-    return SILC_FSM_CONTINUE;
+    goto err;
   }
 
   recv_payload = ske->ke1_payload;
 
   /* The public key verification was performed only if the Mutual
      Authentication flag is set. */
-  if (ske->start_payload &&
-      ske->start_payload->flags & SILC_SKE_SP_FLAG_MUTUAL) {
+  if ((ske->start_payload &&
+       ske->start_payload->flags & SILC_SKE_SP_FLAG_MUTUAL) ||
+      ske->prop->flags & SILC_SKE_SP_FLAG_MUTUAL) {
     unsigned char hash[SILC_HASH_MAXLEN];
     SilcUInt32 hash_len;
 
@@ -2121,9 +2261,9 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
     status = silc_ske_make_hash(ske, hash, &hash_len, TRUE);
     if (status != SILC_SKE_STATUS_OK) {
       /** Error computing hash */
+      SILC_LOG_DEBUG(("Error computing hash"));
       ske->status = status;
-      silc_fsm_next(fsm, silc_ske_st_responder_error);
-      return SILC_FSM_CONTINUE;
+      goto err;
     }
 
     SILC_LOG_DEBUG(("Verifying signature (HASH_i)"));
@@ -2134,8 +2274,7 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
       /** Incorrect signature */
       SILC_LOG_ERROR(("Signature verification failed, incorrect signature"));
       ske->status = SILC_SKE_STATUS_INCORRECT_SIGNATURE;
-      silc_fsm_next(fsm, silc_ske_st_responder_error);
-      return SILC_FSM_CONTINUE;
+      goto err;
     }
 
     SILC_LOG_DEBUG(("Signature is Ok"));
@@ -2145,6 +2284,10 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
 
   /* Create the random number x, 1 < x < q. */
   x = silc_calloc(1, sizeof(*x));
+  if (!x) {
+    ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    goto err;
+  }
   silc_mp_init(x);
   status =
     silc_ske_create_rnd(ske, &ske->prop->group->group_order,
@@ -2152,15 +2295,16 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
                        x);
   if (status != SILC_SKE_STATUS_OK) {
     /** Error generating random number */
-    silc_mp_uninit(x);
-    silc_free(x);
     ske->status = status;
-    silc_fsm_next(fsm, silc_ske_st_responder_error);
-    return SILC_FSM_CONTINUE;
+    goto err;
   }
 
   /* Save the results for later processing */
   send_payload = silc_calloc(1, sizeof(*send_payload));
+  if (!send_payload) {
+    ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    goto err;
+  }
   ske->x = x;
   ske->ke2_payload = send_payload;
 
@@ -2175,6 +2319,10 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
 
   /* Compute the shared secret key */
   KEY = silc_calloc(1, sizeof(*KEY));
+  if (!KEY) {
+    ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    goto err;
+  }
   silc_mp_init(KEY);
   silc_mp_pow_mod(KEY, &ske->ke1_payload->x, ske->x,
                  &ske->prop->group->group);
@@ -2183,6 +2331,16 @@ SILC_FSM_STATE(silc_ske_st_responder_phase4)
   /** Send KE2 payload */
   silc_fsm_next(fsm, silc_ske_st_responder_phase5);
   return SILC_FSM_CONTINUE;
+
+ err:
+  silc_mp_uninit(x);
+  silc_free(x);
+  ske->x = NULL;
+  silc_free(send_payload);
+  ske->ke2_payload = NULL;
+
+  silc_fsm_next(fsm, silc_ske_st_responder_error);
+  return SILC_FSM_CONTINUE;
 }
 
 /* Phase-5.  Send KE2 payload */
@@ -2192,7 +2350,7 @@ SILC_FSM_STATE(silc_ske_st_responder_phase5)
   SilcSKE ske = fsm_context;
   SilcSKEStatus status;
   SilcBuffer payload_buf;
-  unsigned char hash[SILC_HASH_MAXLEN], sign[2048 + 1], *pk;
+  unsigned char hash[SILC_HASH_MAXLEN], sign[65536 + 1], *pk;
   SilcUInt32 hash_len, sign_len, pk_len;
 
   SILC_LOG_DEBUG(("Start"));
@@ -2204,7 +2362,7 @@ SILC_FSM_STATE(silc_ske_st_responder_phase5)
     pk = silc_pkcs_public_key_encode(ske->public_key, &pk_len);
     if (!pk) {
       /** Error encoding public key */
-      status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+      ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
       silc_fsm_next(fsm, silc_ske_st_responder_error);
       return SILC_FSM_CONTINUE;
     }
@@ -2224,6 +2382,12 @@ SILC_FSM_STATE(silc_ske_st_responder_phase5)
     return SILC_FSM_CONTINUE;
   }
   ske->hash = silc_memdup(hash, hash_len);
+  if (!ske->hash) {
+    /** Error computing hash */
+    ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+    silc_fsm_next(fsm, silc_ske_st_responder_error);
+    return SILC_FSM_CONTINUE;
+  }
   ske->hash_len = hash_len;
 
   if (ske->public_key && ske->private_key) {
@@ -2233,11 +2397,17 @@ SILC_FSM_STATE(silc_ske_st_responder_phase5)
     if (!silc_pkcs_sign(ske->private_key, hash, hash_len, sign,
                        sizeof(sign) - 1, &sign_len, FALSE, ske->prop->hash)) {
       /** Error computing signature */
-      status = SILC_SKE_STATUS_SIGNATURE_ERROR;
+      ske->status = SILC_SKE_STATUS_SIGNATURE_ERROR;
       silc_fsm_next(fsm, silc_ske_st_responder_error);
       return SILC_FSM_CONTINUE;
     }
     ske->ke2_payload->sign_data = silc_memdup(sign, sign_len);
+    if (!ske->ke2_payload->sign_data) {
+      /** Error computing hash */
+      ske->status = SILC_SKE_STATUS_OUT_OF_MEMORY;
+      silc_fsm_next(fsm, silc_ske_st_responder_error);
+      return SILC_FSM_CONTINUE;
+    }
     ske->ke2_payload->sign_len = sign_len;
     memset(sign, 0, sizeof(sign));
   }
@@ -2271,9 +2441,15 @@ SILC_FSM_STATE(silc_ske_st_responder_phase5)
     return SILC_FSM_CONTINUE;
   }
 
-  /** Waiting completion */
-  silc_fsm_next(fsm, silc_ske_st_responder_end);
-  return SILC_FSM_WAIT;
+  if (!ske->no_acks) {
+    /** Waiting completion */
+    silc_fsm_next(fsm, silc_ske_st_responder_end);
+    return SILC_FSM_WAIT;
+  } else {
+    /** Complete protocol */
+    silc_fsm_next(fsm, silc_ske_st_responder_end);
+    return SILC_FSM_CONTINUE;
+  }
 }
 
 /* Protocol completed */
@@ -2284,14 +2460,15 @@ SILC_FSM_STATE(silc_ske_st_responder_end)
   unsigned char tmp[4];
   SilcUInt32 hash_len, key_len, block_len;
 
-  if (ske->packet->type != SILC_PACKET_SUCCESS) {
+  if (!ske->no_acks && ske->packet->type != SILC_PACKET_SUCCESS) {
     SILC_LOG_DEBUG(("Remote retransmitted an old packet"));
     silc_ske_install_retransmission(ske);
     silc_packet_free(ske->packet);
     ske->packet = NULL;
     return SILC_FSM_WAIT;
   }
-  silc_packet_free(ske->packet);
+  if (ske->packet)
+    silc_packet_free(ske->packet);
   ske->packet = NULL;
 
   /* Process key material */
@@ -2308,9 +2485,11 @@ SILC_FSM_STATE(silc_ske_st_responder_end)
     return SILC_FSM_CONTINUE;
   }
 
-  /* Send SUCCESS packet */
-  SILC_PUT32_MSB(SILC_SKE_STATUS_OK, tmp);
-  silc_ske_packet_send(ske, SILC_PACKET_SUCCESS, 0, tmp, 4);
+  if (!ske->no_acks) {
+    /* Send SUCCESS packet */
+    SILC_PUT32_MSB(SILC_SKE_STATUS_OK, tmp);
+    silc_ske_packet_send(ske, SILC_PACKET_SUCCESS, 0, tmp, 4);
+  }
 
   silc_packet_stream_unlink(ske->stream, &silc_ske_stream_cbs, ske);
   silc_schedule_task_del_by_context(ske->schedule, ske);
@@ -2348,16 +2527,18 @@ SILC_FSM_STATE(silc_ske_st_responder_aborted)
 SILC_FSM_STATE(silc_ske_st_responder_failure)
 {
   SilcSKE ske = fsm_context;
-  SilcUInt32 error = SILC_SKE_STATUS_ERROR;
+  SilcUInt32 error = ske->status;
 
   SILC_LOG_DEBUG(("Key exchange protocol failed"));
 
   if (ske->packet && silc_buffer_len(&ske->packet->buffer) == 4) {
     SILC_GET32_MSB(error, ske->packet->buffer.data);
-    ske->status = error;
     silc_packet_free(ske->packet);
     ske->packet = NULL;
   }
+  if (error == SILC_SKE_STATUS_OK)
+    error = SILC_SKE_STATUS_ERROR;
+  ske->status = error;
 
   silc_packet_stream_unlink(ske->stream, &silc_ske_stream_cbs, ske);
   silc_schedule_task_del_by_context(ske->schedule, ske);
@@ -2374,14 +2555,16 @@ SILC_FSM_STATE(silc_ske_st_responder_error)
 {
   SilcSKE ske = fsm_context;
   unsigned char tmp[4];
+  SilcUInt32 status;
 
   SILC_LOG_DEBUG(("Error %d (%s) during key exchange protocol",
                  ske->status, silc_ske_map_status(ske->status)));
 
   /* Send FAILURE packet */
-  if (ske->status > SILC_SKE_STATUS_INVALID_COOKIE)
-    ske->status = SILC_SKE_STATUS_BAD_PAYLOAD;
-  SILC_PUT32_MSB(ske->status, tmp);
+  status = ske->status;
+  if (status > SILC_SKE_STATUS_INVALID_COOKIE)
+    status = SILC_SKE_STATUS_ERROR;
+  SILC_PUT32_MSB(status, tmp);
   silc_ske_packet_send(ske, SILC_PACKET_FAILURE, 0, tmp, 4);
 
   silc_packet_stream_unlink(ske->stream, &silc_ske_stream_cbs, ske);
@@ -2416,9 +2599,11 @@ SilcAsyncOperation silc_ske_responder(SilcSKE ske,
   if (ske->flags & SILC_SKE_SP_FLAG_IV_INCLUDED)
     ske->session_port = params->session_port;
   ske->version = params->version;
+  ske->no_acks = params->no_acks;
+  ske->prop = params->prop;
   if (!ske->version)
     return NULL;
-  ske->running = TRUE;
+  ++ske->refcnt;
 
   /* Link to packet stream to get key exchange packets */
   ske->stream = stream;
@@ -2428,6 +2613,10 @@ SilcAsyncOperation silc_ske_responder(SilcSKE ske,
                          SILC_PACKET_SUCCESS,
                          SILC_PACKET_FAILURE, -1);
 
+  /* Add key exchange timeout */
+  silc_schedule_task_add_timeout(ske->schedule, silc_ske_timeout,
+                                ske, ske->timeout, 0);
+
   /* Start SKE as responder */
   silc_fsm_start(&ske->fsm, silc_ske_st_responder_start);
 
@@ -2522,13 +2711,16 @@ SILC_FSM_STATE(silc_ske_st_rekey_initiator_done)
   if (ske->rekey->pfs) {
     /* PFS */
     pfsbuf = silc_mp_mp2bin(ske->KEY, 0, &x_len);
-    if (pfsbuf) {
-      ske->keymat = silc_ske_process_key_material_data(pfsbuf, x_len,
-                                                      block_len, key_len,
-                                                      hash_len, hash);
-      memset(pfsbuf, 0, x_len);
-      silc_free(pfsbuf);
+    if (!pfsbuf) {
+      SILC_LOG_ERROR(("Error processing key material"));
+      silc_fsm_next(fsm, silc_ske_st_initiator_error);
+      return SILC_FSM_CONTINUE;
     }
+    ske->keymat = silc_ske_process_key_material_data(pfsbuf, x_len,
+                                                    block_len, key_len,
+                                                    hash_len, hash);
+    memset(pfsbuf, 0, x_len);
+    silc_free(pfsbuf);
   } else {
     /* No PFS */
     ske->keymat =
@@ -2676,8 +2868,8 @@ silc_ske_rekey_initiator(SilcSKE ske,
 
   ske->rekey = rekey;
   ske->responder = FALSE;
-  ske->running = TRUE;
   ske->rekeying = TRUE;
+  ++ske->refcnt;
 
   /* Link to packet stream to get key exchange packets */
   ske->stream = stream;
@@ -2799,13 +2991,16 @@ SILC_FSM_STATE(silc_ske_st_rekey_responder_done)
   if (ske->rekey->pfs) {
     /* PFS */
     pfsbuf = silc_mp_mp2bin(ske->KEY, 0, &x_len);
-    if (pfsbuf) {
-      ske->keymat = silc_ske_process_key_material_data(pfsbuf, x_len,
-                                                      block_len, key_len,
-                                                      hash_len, hash);
-      memset(pfsbuf, 0, x_len);
-      silc_free(pfsbuf);
+    if (!pfsbuf) {
+      SILC_LOG_ERROR(("Error processing key material"));
+      silc_fsm_next(fsm, silc_ske_st_responder_error);
+      return SILC_FSM_CONTINUE;
     }
+    ske->keymat = silc_ske_process_key_material_data(pfsbuf, x_len,
+                                                    block_len, key_len,
+                                                    hash_len, hash);
+    memset(pfsbuf, 0, x_len);
+    silc_free(pfsbuf);
   } else {
     /* No PFS */
     ske->keymat =
@@ -2953,9 +3148,9 @@ silc_ske_rekey_responder(SilcSKE ske,
 
   ske->rekey = rekey;
   ske->responder = TRUE;
-  ske->running = TRUE;
   ske->rekeying = TRUE;
   ske->packet = packet;
+  ++ske->refcnt;
 
   /* Link to packet stream to get key exchange packets */
   ske->stream = stream;
@@ -3011,11 +3206,23 @@ silc_ske_process_key_material_data(unsigned char *data,
   buf->data[0] = 0;
   silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
   key->send_iv = silc_calloc(req_iv_len, sizeof(unsigned char));
+  if (!key->send_iv) {
+    silc_buffer_clear(buf);
+    silc_buffer_free(buf);
+    silc_free(key);
+    return NULL;
+  }
   memcpy(key->send_iv, hashd, req_iv_len);
   memset(hashd, 0, sizeof(hashd));
   buf->data[0] = 1;
   silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
   key->receive_iv = silc_calloc(req_iv_len, sizeof(unsigned char));
+  if (!key->receive_iv) {
+    silc_buffer_clear(buf);
+    silc_buffer_free(buf);
+    silc_free(key);
+    return NULL;
+  }
   memcpy(key->receive_iv, hashd, req_iv_len);
   key->iv_len = req_iv_len;
 
@@ -3061,11 +3268,24 @@ silc_ske_process_key_material_data(unsigned char *data,
 
     /* Then, save the keys */
     dtmp = silc_calloc((3 * hash_len), sizeof(unsigned char));
+    if (!dtmp) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      return NULL;
+    }
     memcpy(dtmp, k1, hash_len);
     memcpy(dtmp + hash_len, k2, hash_len);
     memcpy(dtmp + hash_len + hash_len, k3, hash_len);
 
     key->send_enc_key = silc_calloc(enc_key_len, sizeof(unsigned char));
+    if (!key->send_enc_key) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      silc_free(dtmp);
+      return NULL;
+    }
     memcpy(key->send_enc_key, dtmp, enc_key_len);
     key->enc_key_len = req_enc_key_len;
 
@@ -3081,6 +3301,12 @@ silc_ske_process_key_material_data(unsigned char *data,
     memset(hashd, 0, sizeof(hashd));
     silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
     key->send_enc_key = silc_calloc(enc_key_len, sizeof(unsigned char));
+    if (!key->send_enc_key) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      return NULL;
+    }
     memcpy(key->send_enc_key, hashd, enc_key_len);
     key->enc_key_len = req_enc_key_len;
   }
@@ -3124,11 +3350,24 @@ silc_ske_process_key_material_data(unsigned char *data,
 
     /* Then, save the keys */
     dtmp = silc_calloc((3 * hash_len), sizeof(unsigned char));
+    if (!dtmp) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      return NULL;
+    }
     memcpy(dtmp, k1, hash_len);
     memcpy(dtmp + hash_len, k2, hash_len);
     memcpy(dtmp + hash_len + hash_len, k3, hash_len);
 
     key->receive_enc_key = silc_calloc(enc_key_len, sizeof(unsigned char));
+    if (!key->receive_enc_key) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      silc_free(dtmp);
+      return NULL;
+    }
     memcpy(key->receive_enc_key, dtmp, enc_key_len);
     key->enc_key_len = req_enc_key_len;
 
@@ -3144,6 +3383,12 @@ silc_ske_process_key_material_data(unsigned char *data,
     memset(hashd, 0, sizeof(hashd));
     silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
     key->receive_enc_key = silc_calloc(enc_key_len, sizeof(unsigned char));
+    if (!key->receive_enc_key) {
+      silc_buffer_clear(buf);
+      silc_buffer_free(buf);
+      silc_free(key);
+      return NULL;
+    }
     memcpy(key->receive_enc_key, hashd, enc_key_len);
     key->enc_key_len = req_enc_key_len;
   }
@@ -3153,11 +3398,23 @@ silc_ske_process_key_material_data(unsigned char *data,
   buf->data[0] = 4;
   silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
   key->send_hmac_key = silc_calloc(req_hmac_key_len, sizeof(unsigned char));
+  if (!key->send_hmac_key) {
+    silc_buffer_clear(buf);
+    silc_buffer_free(buf);
+    silc_free(key);
+    return NULL;
+  }
   memcpy(key->send_hmac_key, hashd, req_hmac_key_len);
   memset(hashd, 0, sizeof(hashd));
   buf->data[0] = 5;
   silc_hash_make(hash, buf->data, silc_buffer_len(buf), hashd);
   key->receive_hmac_key = silc_calloc(req_hmac_key_len, sizeof(unsigned char));
+  if (!key->receive_hmac_key) {
+    silc_buffer_clear(buf);
+    silc_buffer_free(buf);
+    silc_free(key);
+    return NULL;
+  }
   memcpy(key->receive_hmac_key, hashd, req_hmac_key_len);
   key->hmac_key_len = req_hmac_key_len;
   memset(hashd, 0, sizeof(hashd));
@@ -3441,7 +3698,7 @@ const char *silc_ske_status_string[] =
   "Unsupported PKCS",
   "Unsupported hash function",
   "Unsupported HMAC",
-  "Unsupported public key (or certificate)",
+  "Public key not accepted",
   "Incorrect signature",
   "Bad or unsupported version",
   "Invalid cookie",
@@ -3453,6 +3710,7 @@ const char *silc_ske_status_string[] =
   "Error computing signature",
   "System out of memory",
   "Key exchange timeout",
+  "Key exchange timeout",
 
   NULL
 };