HomeSort by: relevance | last modified time | path
    Searched refs:proposal (Results 1 - 25 of 29) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/src/eap_peer/
ikev2.c 45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
    [all...]
ikev2.h 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
eap_ikev2.c 121 data->ikev2.proposal.prf, &data->ikev2.keys,
164 integ = ikev2_get_integ(data->ikev2.proposal.integ);
190 ikev2_integ_hash(data->ikev2.proposal.integ,
251 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
  /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf 18 proposal {
  /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/
racoon.conf 16 proposal {
  /src/external/bsd/wpa/dist/src/eap_server/
ikev2.c 49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d"
    [all...]
ikev2.h 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
eap_server_ikev2.c 100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
160 integ = ikev2_get_integ(data->ikev2.proposal.integ);
186 ikev2_integ_hash(data->ikev2.proposal.integ,
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
337 data->ikev2.proposal.prf, &data->ikev2.keys,
  /src/crypto/external/bsd/openssh/dist/
match.c 311 * Filter proposal using pattern-list filter.
318 filter_list(const char *proposal, const char *filter, int denylist)
320 size_t len = strlen(proposal) + 1;
322 char *orig_prop = strdup(proposal);
351 match_filter_denylist(const char *proposal, const char *filter)
353 return filter_list(proposal, filter, 1);
361 match_filter_allowlist(const char *proposal, const char *filter)
363 return filter_list(proposal, filter, 0);
ssh_api.c 93 const char **proposal; local
110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal;
112 proposal[PROPOSAL_KEX_ALGS],
113 proposal[PROPOSAL_ENC_ALGS_CTOS],
114 proposal[PROPOSAL_MAC_ALGS_CTOS],
115 proposal[PROPOSAL_COMP_ALGS_CTOS],
116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]);
532 char **proposal; local
537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0
    [all...]
ssh_api.h 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
kex.c 87 * Fill out a proposal array with dynamically allocated values, which may
104 fatal_f("proposal missing");
150 /* put algorithm proposal into buffer */
152 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX])
168 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0)
177 /* parse buffer and return algorithm proposal */
184 char **proposal = NULL; local
188 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL)
198 /* extract kex init proposal strings */
200 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0)
    [all...]
kex-names.c 181 /* returns non-zero if proposal contains any algorithm from algs */
183 kex_has_any_alg(const char *proposal, const char *algs)
187 if ((cp = match_list(proposal, algs, NULL)) == NULL)
kex.h 209 int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]);
  /src/crypto/dist/ipsec-tools/src/racoon/
remoteconf.c 72 #include "proposal.h"
178 rmconf->proposal) == NULL)
486 new->proposal = NULL;
581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */
635 /* proposal has been deep copied already from spspec's, see
725 if (rmconf->proposal)
726 delisakmpsa(rmconf->proposal);
891 * filled in for real when the ISAKMP proposal is configured.
911 if (rmconf->proposal == NULL) {
912 rmconf->proposal = new
    [all...]
security.c 55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
remoteconf.h 148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf
230 extern struct isakmpsa * checkisakmpsa(int pcheck, struct isakmpsa *proposal,
handler.c 62 #include "proposal.h"
646 if (iph2->proposal == NULL && iph2->approval == NULL)
656 } else if (iph2->proposal != NULL) {
657 for (pr = iph2->proposal->head; pr != NULL;
692 * SPI in the proposal is cleared.
706 /* clear spi, keep variables in the proposal */
707 if (iph2->proposal) {
709 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
794 if (iph2->proposal) {
795 flushsaprop(iph2->proposal);
    [all...]
gssapi.c 210 if (iph1->rmconf->proposal->gssid != NULL) {
211 id_token.length = iph1->rmconf->proposal->gssid->l;
212 id_token.value = iph1->rmconf->proposal->gssid->v;
697 if (iph1->rmconf->proposal->gssid != NULL)
698 return (vdup(iph1->rmconf->proposal->gssid));
isakmp_agg.c 154 /* create SA payload for my proposal */
155 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal);
178 switch (iph1->rmconf->proposal->authmethod) {
211 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
213 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
230 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) {
240 if (oakley_needcr(iph1->rmconf->proposal->authmethod))
469 "failed to get valid proposal.\n");
860 "failed to get valid proposal.\n");
968 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB
    [all...]
handler.h 322 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle
326 caddr_t spidx_gen; /* policy from peer's proposal */
ipsec_doi.c 78 #include "proposal.h"
166 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
179 /* get proposal pair */
258 /* compare proposal and select one */
279 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n");
285 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n");
311 if (iph1->rmconf->proposal->gssid != NULL)
312 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
341 * compare peer's single proposal and all of my proposal
3061 struct saprop *proposal, *a; local
    [all...]
isakmp_base.c 143 /* create SA payload for my proposal */
145 iph1->rmconf->proposal);
156 switch (iph1->rmconf->proposal->authmethod) {
371 "failed to get valid proposal.\n");
855 "failed to get valid proposal.\n");
proposal.c 1 /* $NetBSD: proposal.c,v 1.18 2025/03/07 15:55:29 christos Exp $ */
3 /* $Id: proposal.c,v 1.18 2025/03/07 15:55:29 christos Exp $ */
62 #include "proposal.h"
176 * take a single match between saprop. allocate a new proposal and return it
177 * for future use (like picking single proposal from a bundle).
178 * pp1: peer's proposal.
179 * pp2: my proposal.
181 * modification of the proposal by calling cmp_aproppair_i() before
206 /* see proposal.h about lifetime/key length and PFS selection. */
313 "My proposal missing security context\n")
    [all...]
  /src/usr.sbin/racoon/
Makefile 15 proposal.c remoteconf.c safefile.c sainfo.c schedule.c session.c \

Completed in 47 milliseconds

1 2