/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | ikev2.c | 50 integ = ikev2_get_integ(data->proposal.integ); 51 prf = ikev2_get_prf(data->proposal.prf); 52 encr = ikev2_get_encr(data->proposal.encr); 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 284 "in proposal"); 358 os_memcpy(&data->proposal, &prop, sizeof(prop)); 372 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys, 173 integ = ikev2_get_integ(data->ikev2.proposal.integ); 199 ikev2_integ_hash(data->ikev2.proposal.integ, 259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 18 proposal {
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 16 proposal {
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | ikev2.c | 54 integ = ikev2_get_integ(data->proposal.integ); 55 prf = ikev2_get_prf(data->proposal.prf); 56 encr = ikev2_get_encr(data->proposal.encr); 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 169 transform_id == data->proposal.encr) { 195 transform_id == data->proposal.prf) 200 transform_id == data->proposal.integ) 205 transform_id == data->proposal.dh) 223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 105 data->ikev2.proposal.proposal_num = 1; 106 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 108 data->ikev2.proposal.encr = ENCR_AES_CBC; 109 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 163 integ = ikev2_get_integ(data->ikev2.proposal.integ); 189 ikev2_integ_hash(data->ikev2.proposal.integ, 265 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 333 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | remoteconf.c | 72 #include "proposal.h" 184 rmconf->proposal) == NULL) 504 new->proposal = NULL; 605 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 660 /* proposal has been deep copied already from spspec's, see 751 if (rmconf->proposal) 752 delisakmpsa(rmconf->proposal); 924 * filled in for real when the ISAKMP proposal is configured. 946 if (rmconf->proposal == NULL) { 947 rmconf->proposal [all...] |
H A D | security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
H A D | remoteconf.h | 148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf 233 struct isakmpsa *proposal,
|
H A D | handler.c | 62 #include "proposal.h" 669 if (iph2->proposal == NULL && iph2->approval == NULL) 679 } else if (iph2->proposal != NULL) { 680 for (pr = iph2->proposal->head; pr != NULL; 715 * SPI in the proposal is cleared. 730 /* clear spi, keep variables in the proposal */ 731 if (iph2->proposal) { 733 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 819 if (iph2->proposal) { 820 flushsaprop(iph2->proposal); [all...] |
H A D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 692 if (iph1->rmconf->proposal->gssid != NULL) 693 return (vdup(iph1->rmconf->proposal->gssid));
|
H A D | isakmp_agg.c | 156 /* create SA payload for my proposal */ 157 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal); 180 switch (iph1->rmconf->proposal->authmethod) { 213 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 215 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) 232 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) { 242 if (oakley_needcr(iph1->rmconf->proposal->authmethod)) 477 "failed to get valid proposal.\n"); 872 "failed to get valid proposal.\n"); 982 if (iph1->rmconf->proposal [all...] |
H A D | handler.h | 321 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle 325 caddr_t spidx_gen; /* policy from peer's proposal */
|
H A D | ipsec_doi.c | 78 #include "proposal.h" 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 182 /* get proposal pair */ 265 /* compare proposal and select one */ 288 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n"); 294 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n"); 320 if (iph1->rmconf->proposal->gssid != NULL) 321 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); 350 * compare peer's single proposal and all of my proposal 3124 struct saprop *proposal, *a; local [all...] |
H A D | isakmp_base.c | 145 /* create SA payload for my proposal */ 147 iph1->rmconf->proposal); 158 switch (iph1->rmconf->proposal->authmethod) { 379 "failed to get valid proposal.\n"); 870 "failed to get valid proposal.\n");
|
H A D | proposal.c | 1 /* $NetBSD: proposal.c,v 1.16 2008/07/22 13:25:18 vanhu Exp $ */ 3 /* $Id: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */ 62 #include "proposal.h" 184 * take a single match between saprop. allocate a new proposal and return it 185 * for future use (like picking single proposal from a bundle). 186 * pp1: peer's proposal. 187 * pp2: my proposal. 189 * modification of the proposal by calling cmp_aproppair_i() before 214 /* see proposal.h about lifetime/key length and PFS selection. */ 322 "My proposal missin [all...] |
H A D | isakmp_quick.c | 70 #include "proposal.h" 82 #include "proposal.h" 214 /* create SA payload for my proposal */ 229 pfsgroup = iph2->proposal->pfs_group; 269 ipsecdoi_transportmode(iph2->proposal)) { 279 if (ipsecdoi_transportmode(iph2->proposal) 623 "IDci prefix/ulproto does not match proposal.\n"); 635 "IDci matches proposal.\n"); 670 "IDcr prefix/ulproto does not match proposal.\n"); 683 "IDcr matches proposal [all...] |
H A D | isakmp_ident.c | 144 /* create SA payload for my proposal */ 146 iph1->rmconf->proposal); 160 switch (iph1->rmconf->proposal->authmethod) { 272 * if proposal-lifetime > lifetime-redcreek-wants. 324 "failed to get valid proposal.\n"); 927 "failed to get valid proposal.\n");
|
H A D | cfparse.y | 214 for (p = cur_rmconf->proposal; p; p = p->next) { 228 yyerror("DH group must be set in the proposal.\n"); 2664 /* set final acceptable proposal */ 2731 "failed to expand isakmp proposal.\n"); 2738 if (rmconf->proposal == NULL) { 2740 "no proposal found.\n");
|
H A D | pfkey.c | 86 #include "proposal.h" 903 pp = iph2->proposal; 1050 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 2195 if(iph2->proposal->head->reqid_in > 0){ 2197 xisr->sadb_x_ipsecrequest_reqid = iph2->proposal->head->reqid_in;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | kex.c | 86 /* put algorithm proposal into buffer */ 89 kex_prop2buf(Buffer *b, const char *proposal[PROPOSAL_MAX]) argument 101 buffer_put_cstring(b, proposal[i]); 106 /* parse buffer and return algorithm proposal */ 112 char **proposal; local 114 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *)); 121 /* extract kex init proposal strings */ 123 proposal[i] = buffer_get_cstring(&b,NULL); 124 debug2("kex_parse_kexinit: %s", proposal[i]); 134 return proposal; 138 kex_prop_free(char **proposal) argument 247 kex_setup(const char *proposal[PROPOSAL_MAX]) argument [all...] |
H A D | kex.h | 139 void kex_prop2buf(Buffer *, const char *proposal[PROPOSAL_MAX]);
|
/netbsd-6-1-5-RELEASE/usr.sbin/racoon/ |
H A D | Makefile | 18 proposal.c sainfo.c strnames.c plog.c logger.c \
|