Searched refs:proposal (Results 1 - 25 of 25) sorted by relevance

/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Dikev2.c50 integ = ikev2_get_integ(data->proposal.integ);
51 prf = ikev2_get_prf(data->proposal.prf);
52 encr = ikev2_get_encr(data->proposal.encr);
54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
284 "in proposal");
358 os_memcpy(&data->proposal, &prop, sizeof(prop));
372 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
H A Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys,
173 integ = ikev2_get_integ(data->ikev2.proposal.integ);
199 ikev2_integ_hash(data->ikev2.proposal.integ,
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/
H A Dracoon.conf18 proposal {
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/
H A Dracoon.conf16 proposal {
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Dikev2.c54 integ = ikev2_get_integ(data->proposal.integ);
55 prf = ikev2_get_prf(data->proposal.prf);
56 encr = ikev2_get_encr(data->proposal.encr);
58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
169 transform_id == data->proposal.encr) {
195 transform_id == data->proposal.prf)
200 transform_id == data->proposal.integ)
205 transform_id == data->proposal.dh)
223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c105 data->ikev2.proposal.proposal_num = 1;
106 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
107 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
108 data->ikev2.proposal.encr = ENCR_AES_CBC;
109 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
163 integ = ikev2_get_integ(data->ikev2.proposal.integ);
189 ikev2_integ_hash(data->ikev2.proposal.integ,
265 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
333 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/
H A Dremoteconf.c72 #include "proposal.h"
184 rmconf->proposal) == NULL)
504 new->proposal = NULL;
605 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */
660 /* proposal has been deep copied already from spspec's, see
751 if (rmconf->proposal)
752 delisakmpsa(rmconf->proposal);
924 * filled in for real when the ISAKMP proposal is configured.
946 if (rmconf->proposal == NULL) {
947 rmconf->proposal
[all...]
H A Dsecurity.c55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
H A Dremoteconf.h148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf
233 struct isakmpsa *proposal,
H A Dhandler.c62 #include "proposal.h"
669 if (iph2->proposal == NULL && iph2->approval == NULL)
679 } else if (iph2->proposal != NULL) {
680 for (pr = iph2->proposal->head; pr != NULL;
715 * SPI in the proposal is cleared.
730 /* clear spi, keep variables in the proposal */
731 if (iph2->proposal) {
733 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
819 if (iph2->proposal) {
820 flushsaprop(iph2->proposal);
[all...]
H A Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
692 if (iph1->rmconf->proposal->gssid != NULL)
693 return (vdup(iph1->rmconf->proposal->gssid));
H A Disakmp_agg.c156 /* create SA payload for my proposal */
157 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal);
180 switch (iph1->rmconf->proposal->authmethod) {
213 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
215 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
232 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) {
242 if (oakley_needcr(iph1->rmconf->proposal->authmethod))
477 "failed to get valid proposal.\n");
872 "failed to get valid proposal.\n");
982 if (iph1->rmconf->proposal
[all...]
H A Dhandler.h321 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle
325 caddr_t spidx_gen; /* policy from peer's proposal */
H A Dipsec_doi.c78 #include "proposal.h"
167 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
182 /* get proposal pair */
265 /* compare proposal and select one */
288 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n");
294 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n");
320 if (iph1->rmconf->proposal->gssid != NULL)
321 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
350 * compare peer's single proposal and all of my proposal
3124 struct saprop *proposal, *a; local
[all...]
H A Disakmp_base.c145 /* create SA payload for my proposal */
147 iph1->rmconf->proposal);
158 switch (iph1->rmconf->proposal->authmethod) {
379 "failed to get valid proposal.\n");
870 "failed to get valid proposal.\n");
H A Dproposal.c1 /* $NetBSD: proposal.c,v 1.16 2008/07/22 13:25:18 vanhu Exp $ */
3 /* $Id: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */
62 #include "proposal.h"
184 * take a single match between saprop. allocate a new proposal and return it
185 * for future use (like picking single proposal from a bundle).
186 * pp1: peer's proposal.
187 * pp2: my proposal.
189 * modification of the proposal by calling cmp_aproppair_i() before
214 /* see proposal.h about lifetime/key length and PFS selection. */
322 "My proposal missin
[all...]
H A Disakmp_quick.c70 #include "proposal.h"
82 #include "proposal.h"
214 /* create SA payload for my proposal */
229 pfsgroup = iph2->proposal->pfs_group;
269 ipsecdoi_transportmode(iph2->proposal)) {
279 if (ipsecdoi_transportmode(iph2->proposal)
623 "IDci prefix/ulproto does not match proposal.\n");
635 "IDci matches proposal.\n");
670 "IDcr prefix/ulproto does not match proposal.\n");
683 "IDcr matches proposal
[all...]
H A Disakmp_ident.c144 /* create SA payload for my proposal */
146 iph1->rmconf->proposal);
160 switch (iph1->rmconf->proposal->authmethod) {
272 * if proposal-lifetime > lifetime-redcreek-wants.
324 "failed to get valid proposal.\n");
927 "failed to get valid proposal.\n");
H A Dcfparse.y214 for (p = cur_rmconf->proposal; p; p = p->next) {
228 yyerror("DH group must be set in the proposal.\n");
2664 /* set final acceptable proposal */
2731 "failed to expand isakmp proposal.\n");
2738 if (rmconf->proposal == NULL) {
2740 "no proposal found.\n");
H A Dpfkey.c86 #include "proposal.h"
903 pp = iph2->proposal;
1050 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval;
2195 if(iph2->proposal->head->reqid_in > 0){
2197 xisr->sadb_x_ipsecrequest_reqid = iph2->proposal->head->reqid_in;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dkex.c86 /* put algorithm proposal into buffer */
89 kex_prop2buf(Buffer *b, const char *proposal[PROPOSAL_MAX]) argument
101 buffer_put_cstring(b, proposal[i]);
106 /* parse buffer and return algorithm proposal */
112 char **proposal; local
114 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *));
121 /* extract kex init proposal strings */
123 proposal[i] = buffer_get_cstring(&b,NULL);
124 debug2("kex_parse_kexinit: %s", proposal[i]);
134 return proposal;
138 kex_prop_free(char **proposal) argument
247 kex_setup(const char *proposal[PROPOSAL_MAX]) argument
[all...]
H A Dkex.h139 void kex_prop2buf(Buffer *, const char *proposal[PROPOSAL_MAX]);
/netbsd-6-1-5-RELEASE/usr.sbin/racoon/
H A DMakefile18 proposal.c sainfo.c strnames.c plog.c logger.c \

Completed in 232 milliseconds