Lines Matching refs:autokey
204 int peer_clear_digest_early = 1; /* bad digest (TEST5) and Autokey */
223 #ifdef AUTOKEY
225 #endif /* AUTOKEY */
349 * During the first few packets of the autokey dance there will
659 #ifdef AUTOKEY
662 struct autokey *ap; /* autokey structure pointer */
665 #endif /* AUTOKEY */
862 #ifdef AUTOKEY
865 #endif /*AUTOKEY */
890 #ifdef AUTOKEY
903 DPRINTF(2, ("receive: drop: bad autokey hostname length\n"));
911 DPRINTF(2, ("receive: drop: empty autokey groupname\n"));
917 #endif /* AUTOKEY */
991 * More on the autokey mambo. Normally the local interface is
995 * address used to construct the autokey is the unicast address
1104 AUTOKEY
1106 * For autokey modes, generate the session key
1113 * More on the autokey dance (AKD). A cookie is
1176 * use later in the autokey mambo.
1191 #endif /* AUTOKEY */
1195 * succeed in bloating the key cache. If an autokey,
1205 #ifdef AUTOKEY
1208 #endif /* AUTOKEY */
1363 #ifdef AUTOKEY
1372 #endif /* AUTOKEY */
1453 #ifdef AUTOKEY
1462 #endif /* AUTOKEY */
1538 #ifdef AUTOKEY
1547 #endif /* AUTOKEY */
1574 #ifdef AUTOKEY
1576 * Do not respond if Autokey and the opcode is not a
1581 DPRINTF(2, ("receive: AM_NEWBCL drop: Autokey but not CRYPTO_ASSOC\n"));
1585 #endif /* AUTOKEY */
1605 #ifdef AUTOKEY
1608 * neither is Autokey.
1612 DPRINTF(2, ("receive: AM_NEWBCL drop: Autokey but not 2-way\n"));
1613 return; /* no autokey */
1615 #endif /* AUTOKEY */
1639 * propagation delay and run the Autokey protocol.
1656 #ifdef AUTOKEY
1659 #endif /* AUTOKEY */
1677 #ifdef AUTOKEY
1682 DPRINTF(2, ("receive: AM_NEWPASS drop: Autokey group mismatch\n"));
1686 #endif /* AUTOKEY */
1785 #ifdef AUTOKEY
1790 DPRINTF(2, ("receive: AM_PROCPKT drop: Autokey group mismatch\n"));
1794 #endif /* AUTOKEY */
1928 #ifdef AUTOKEY
1930 * If the association is configured for Autokey, the packet must
1937 DPRINTF(2, ("receive: drop: Autokey but wrong/bad auth\n"));
1941 #endif /* AUTOKEY */
2201 #ifdef AUTOKEY
2205 #endif /* AUTOKEY */
2239 #ifdef AUTOKEY
2243 #endif /* AUTOKEY */
2360 * Autokey-authenticated packets are accepted.
2406 #ifdef AUTOKEY
2408 * More autokey dance. The rules of the cha-cha are as follows:
2425 * match, sit the dance and call for new autokey values.
2432 * Decrement remaining autokey hashes. This isn't
2435 ap = (struct autokey *)peer->recval.ptr;
2478 * tkeyid is the hash of skeyid. If the autokey values
2483 * a successful failure and refresh the autokey values.
2509 peer->flash |= TEST8; /* bad autokey */
2513 * week before restarting the Autokey protocol to
2523 #endif /* AUTOKEY */
2873 * client mode when the client is fit and the autokey dance is
2879 #ifdef AUTOKEY
2886 #else /* !AUTOKEY follows */
2888 #endif /* !AUTOKEY */
3034 #ifdef AUTOKEY
3037 #endif /* AUTOKEY */
3097 #ifdef AUTOKEY
3105 #endif /* AUTOKEY */
3146 #ifdef AUTOKEY
3158 #endif /* AUTOKEY */
3240 #ifdef AUTOKEY
3263 #endif /* AUTOKEY */
3323 #ifdef AUTOKEY
3325 #endif /* AUTOKEY */
4180 * It is most important when autokey is in use that the local
4189 #ifdef AUTOKEY
4191 #endif /* !AUTOKEY */
4248 * authenticated. If autokey is enabled, fuss with the various
4251 #ifdef AUTOKEY
4314 * In broadcast server mode the autokey values are
4331 * identity, cookie and autokey exchanges are
4336 * autokey sequence, it uses the autokey exchange to
4337 * retrieve the autokey values. In any case, if a new
4338 * keylist is generated, the autokey values are pushed.
4358 * Cookie and autokey. We request the cookie
4361 * autokey values when the cookie is zero. Any
4363 * autokey values without being asked. If for
4365 * autokey sequence, the autokey exchange is
4366 * used to retrieve the autokey values.
4402 * autokey exchange is substitutes for the cookie
4404 * broadcast client finds a broken autokey sequence, it
4405 * uses the autokey exchange to retrieve the autokey
4425 * Cookie and autokey. These are requests, but
4426 * we use the peer association ID with autokey
4472 * autokey response message are request messages.
4490 #endif /* AUTOKEY */
4522 #ifdef AUTOKEY
4525 #endif /* AUTOKEY */
4550 #ifdef AUTOKEY
4554 #else /* !AUTOKEY follows */
4559 #endif /* !AUTOKEY */
4602 #ifdef AUTOKEY
4805 * cryptosum. For autokey cryptography, use the server private
4809 #ifdef AUTOKEY
4837 #endif /* AUTOKEY */
4840 #ifdef AUTOKEY
4843 #endif /* AUTOKEY */
4970 #ifdef AUTOKEY
5002 #endif /* AUTOKEY */
5044 #ifdef AUTOKEY
5067 #endif /* AUTOKEY */