| /src/external/bsd/wpa/dist/src/eap_peer/ |
| ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); [all...] |
| ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
| eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); 190 ikev2_integ_hash(data->ikev2.proposal.integ, 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
| /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
| racoon.conf | 18 proposal {
|
| /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
| racoon.conf | 16 proposal {
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d" [all...] |
| ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
| eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); 186 ikev2_integ_hash(data->ikev2.proposal.integ, 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 337 data->ikev2.proposal.prf, &data->ikev2.keys,
|
| /src/crypto/external/bsd/openssh/dist/ |
| match.c | 311 * Filter proposal using pattern-list filter. 318 filter_list(const char *proposal, const char *filter, int denylist) 320 size_t len = strlen(proposal) + 1; 322 char *orig_prop = strdup(proposal); 351 match_filter_denylist(const char *proposal, const char *filter) 353 return filter_list(proposal, filter, 1); 361 match_filter_allowlist(const char *proposal, const char *filter) 363 return filter_list(proposal, filter, 0);
|
| ssh_api.c | 93 const char **proposal; local 110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal; 112 proposal[PROPOSAL_KEX_ALGS], 113 proposal[PROPOSAL_ENC_ALGS_CTOS], 114 proposal[PROPOSAL_MAC_ALGS_CTOS], 115 proposal[PROPOSAL_COMP_ALGS_CTOS], 116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]); 532 char **proposal; local 537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0 [all...] |
| ssh_api.h | 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
|
| kex.c | 87 * Fill out a proposal array with dynamically allocated values, which may 104 fatal_f("proposal missing"); 150 /* put algorithm proposal into buffer */ 152 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) 168 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) 177 /* parse buffer and return algorithm proposal */ 184 char **proposal = NULL; local 188 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) 198 /* extract kex init proposal strings */ 200 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) [all...] |
| kex-names.c | 181 /* returns non-zero if proposal contains any algorithm from algs */ 183 kex_has_any_alg(const char *proposal, const char *algs) 187 if ((cp = match_list(proposal, algs, NULL)) == NULL)
|
| kex.h | 209 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.c | 72 #include "proposal.h" 178 rmconf->proposal) == NULL) 486 new->proposal = NULL; 581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 635 /* proposal has been deep copied already from spspec's, see 725 if (rmconf->proposal) 726 delisakmpsa(rmconf->proposal); 891 * filled in for real when the ISAKMP proposal is configured. 911 if (rmconf->proposal == NULL) { 912 rmconf->proposal = new [all...] |
| security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
| remoteconf.h | 148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf 230 extern struct isakmpsa * checkisakmpsa(int pcheck, struct isakmpsa *proposal,
|
| handler.c | 62 #include "proposal.h" 646 if (iph2->proposal == NULL && iph2->approval == NULL) 656 } else if (iph2->proposal != NULL) { 657 for (pr = iph2->proposal->head; pr != NULL; 692 * SPI in the proposal is cleared. 706 /* clear spi, keep variables in the proposal */ 707 if (iph2->proposal) { 709 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 794 if (iph2->proposal) { 795 flushsaprop(iph2->proposal); [all...] |
| gssapi.c | 210 if (iph1->rmconf->proposal->gssid != NULL) { 211 id_token.length = iph1->rmconf->proposal->gssid->l; 212 id_token.value = iph1->rmconf->proposal->gssid->v; 697 if (iph1->rmconf->proposal->gssid != NULL) 698 return (vdup(iph1->rmconf->proposal->gssid));
|
| isakmp_agg.c | 154 /* create SA payload for my proposal */ 155 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal); 178 switch (iph1->rmconf->proposal->authmethod) { 211 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 213 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) 230 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) { 240 if (oakley_needcr(iph1->rmconf->proposal->authmethod)) 469 "failed to get valid proposal.\n"); 860 "failed to get valid proposal.\n"); 968 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB [all...] |
| handler.h | 322 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle 326 caddr_t spidx_gen; /* policy from peer's proposal */
|
| ipsec_doi.c | 78 #include "proposal.h" 166 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 179 /* get proposal pair */ 258 /* compare proposal and select one */ 279 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n"); 285 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n"); 311 if (iph1->rmconf->proposal->gssid != NULL) 312 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); 341 * compare peer's single proposal and all of my proposal 3061 struct saprop *proposal, *a; local [all...] |
| isakmp_base.c | 143 /* create SA payload for my proposal */ 145 iph1->rmconf->proposal); 156 switch (iph1->rmconf->proposal->authmethod) { 371 "failed to get valid proposal.\n"); 855 "failed to get valid proposal.\n");
|
| proposal.c | 1 /* $NetBSD: proposal.c,v 1.18 2025/03/07 15:55:29 christos Exp $ */ 3 /* $Id: proposal.c,v 1.18 2025/03/07 15:55:29 christos Exp $ */ 62 #include "proposal.h" 176 * take a single match between saprop. allocate a new proposal and return it 177 * for future use (like picking single proposal from a bundle). 178 * pp1: peer's proposal. 179 * pp2: my proposal. 181 * modification of the proposal by calling cmp_aproppair_i() before 206 /* see proposal.h about lifetime/key length and PFS selection. */ 313 "My proposal missing security context\n") [all...] |
| /src/usr.sbin/racoon/ |
| Makefile | 15 proposal.c remoteconf.c safefile.c sainfo.c schedule.c session.c \
|