| /src/external/bsd/wpa/dist/src/eap_peer/ |
| ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); [all...] |
| ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); [all...] |
| ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
| ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
| /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
| racoon.conf | 18 proposal {
|
| racoon.conf | 18 proposal {
|
| /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
| racoon.conf | 16 proposal {
|
| racoon.conf | 16 proposal {
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d" [all...] |
| ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d" [all...] |
| ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
| ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
| eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); 186 ikev2_integ_hash(data->ikev2.proposal.integ, 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 337 data->ikev2.proposal.prf, &data->ikev2.keys,
|
| eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); 186 ikev2_integ_hash(data->ikev2.proposal.integ, 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 337 data->ikev2.proposal.prf, &data->ikev2.keys,
|
| /src/crypto/external/bsd/openssh/dist/ |
| match.c | 311 * Filter proposal using pattern-list filter. 318 filter_list(const char *proposal, const char *filter, int denylist) 320 size_t len = strlen(proposal) + 1; 322 char *orig_prop = strdup(proposal); 351 match_filter_denylist(const char *proposal, const char *filter) 353 return filter_list(proposal, filter, 1); 361 match_filter_allowlist(const char *proposal, const char *filter) 363 return filter_list(proposal, filter, 0);
|
| match.c | 311 * Filter proposal using pattern-list filter. 318 filter_list(const char *proposal, const char *filter, int denylist) 320 size_t len = strlen(proposal) + 1; 322 char *orig_prop = strdup(proposal); 351 match_filter_denylist(const char *proposal, const char *filter) 353 return filter_list(proposal, filter, 1); 361 match_filter_allowlist(const char *proposal, const char *filter) 363 return filter_list(proposal, filter, 0);
|
| ssh_api.c | 93 const char **proposal; local 110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal; 112 proposal[PROPOSAL_KEX_ALGS], 113 proposal[PROPOSAL_ENC_ALGS_CTOS], 114 proposal[PROPOSAL_MAC_ALGS_CTOS], 115 proposal[PROPOSAL_COMP_ALGS_CTOS], 116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]); 532 char **proposal; local 537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0 [all...] |
| ssh_api.c | 93 const char **proposal; local 110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal; 112 proposal[PROPOSAL_KEX_ALGS], 113 proposal[PROPOSAL_ENC_ALGS_CTOS], 114 proposal[PROPOSAL_MAC_ALGS_CTOS], 115 proposal[PROPOSAL_COMP_ALGS_CTOS], 116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]); 532 char **proposal; local 537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0 [all...] |
| ssh_api.h | 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
|
| ssh_api.h | 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
|
| kex.c | 87 * Fill out a proposal array with dynamically allocated values, which may 104 fatal_f("proposal missing"); 150 /* put algorithm proposal into buffer */ 152 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) 168 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) 177 /* parse buffer and return algorithm proposal */ 184 char **proposal = NULL; local 188 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) 198 /* extract kex init proposal strings */ 200 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) [all...] |
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.c | 72 #include "proposal.h" 178 rmconf->proposal) == NULL) 486 new->proposal = NULL; 581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 635 /* proposal has been deep copied already from spspec's, see 725 if (rmconf->proposal) 726 delisakmpsa(rmconf->proposal); 891 * filled in for real when the ISAKMP proposal is configured. 911 if (rmconf->proposal == NULL) { 912 rmconf->proposal = new [all...] |
| remoteconf.c | 72 #include "proposal.h" 178 rmconf->proposal) == NULL) 486 new->proposal = NULL; 581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 635 /* proposal has been deep copied already from spspec's, see 725 if (rmconf->proposal) 726 delisakmpsa(rmconf->proposal); 891 * filled in for real when the ISAKMP proposal is configured. 911 if (rmconf->proposal == NULL) { 912 rmconf->proposal = new [all...] |
| security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
| security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|