HomeSort by: relevance | last modified time | path
    Searched refs:proposal (Results 1 - 25 of 58) sorted by relevancy

1 2 3

  /src/external/bsd/wpa/dist/src/eap_peer/
ikev2.c 45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
    [all...]
ikev2.c 45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
222 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
224 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
    [all...]
ikev2.h 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
ikev2.h 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
  /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf 18 proposal {
racoon.conf 18 proposal {
  /src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/
racoon.conf 16 proposal {
racoon.conf 16 proposal {
  /src/external/bsd/wpa/dist/src/eap_server/
ikev2.c 49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d"
    [all...]
ikev2.c 49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d"
    [all...]
ikev2.h 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
ikev2.h 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
eap_server_ikev2.c 100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
160 integ = ikev2_get_integ(data->ikev2.proposal.integ);
186 ikev2_integ_hash(data->ikev2.proposal.integ,
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
337 data->ikev2.proposal.prf, &data->ikev2.keys,
eap_server_ikev2.c 100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
160 integ = ikev2_get_integ(data->ikev2.proposal.integ);
186 ikev2_integ_hash(data->ikev2.proposal.integ,
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
337 data->ikev2.proposal.prf, &data->ikev2.keys,
  /src/crypto/external/bsd/openssh/dist/
match.c 311 * Filter proposal using pattern-list filter.
318 filter_list(const char *proposal, const char *filter, int denylist)
320 size_t len = strlen(proposal) + 1;
322 char *orig_prop = strdup(proposal);
351 match_filter_denylist(const char *proposal, const char *filter)
353 return filter_list(proposal, filter, 1);
361 match_filter_allowlist(const char *proposal, const char *filter)
363 return filter_list(proposal, filter, 0);
match.c 311 * Filter proposal using pattern-list filter.
318 filter_list(const char *proposal, const char *filter, int denylist)
320 size_t len = strlen(proposal) + 1;
322 char *orig_prop = strdup(proposal);
351 match_filter_denylist(const char *proposal, const char *filter)
353 return filter_list(proposal, filter, 1);
361 match_filter_allowlist(const char *proposal, const char *filter)
363 return filter_list(proposal, filter, 0);
ssh_api.c 93 const char **proposal; local
110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal;
112 proposal[PROPOSAL_KEX_ALGS],
113 proposal[PROPOSAL_ENC_ALGS_CTOS],
114 proposal[PROPOSAL_MAC_ALGS_CTOS],
115 proposal[PROPOSAL_COMP_ALGS_CTOS],
116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]);
532 char **proposal; local
537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0
    [all...]
ssh_api.c 93 const char **proposal; local
110 proposal = kex_params ? __UNCONST(kex_params->proposal) : myproposal;
112 proposal[PROPOSAL_KEX_ALGS],
113 proposal[PROPOSAL_ENC_ALGS_CTOS],
114 proposal[PROPOSAL_MAC_ALGS_CTOS],
115 proposal[PROPOSAL_COMP_ALGS_CTOS],
116 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]);
532 char **proposal; local
537 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0
    [all...]
ssh_api.h 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
ssh_api.h 35 char *proposal[PROPOSAL_MAX]; member in struct:kex_params
kex.c 87 * Fill out a proposal array with dynamically allocated values, which may
104 fatal_f("proposal missing");
150 /* put algorithm proposal into buffer */
152 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX])
168 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0)
177 /* parse buffer and return algorithm proposal */
184 char **proposal = NULL; local
188 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL)
198 /* extract kex init proposal strings */
200 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0)
    [all...]
  /src/crypto/dist/ipsec-tools/src/racoon/
remoteconf.c 72 #include "proposal.h"
178 rmconf->proposal) == NULL)
486 new->proposal = NULL;
581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */
635 /* proposal has been deep copied already from spspec's, see
725 if (rmconf->proposal)
726 delisakmpsa(rmconf->proposal);
891 * filled in for real when the ISAKMP proposal is configured.
911 if (rmconf->proposal == NULL) {
912 rmconf->proposal = new
    [all...]
remoteconf.c 72 #include "proposal.h"
178 rmconf->proposal) == NULL)
486 new->proposal = NULL;
581 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */
635 /* proposal has been deep copied already from spspec's, see
725 if (rmconf->proposal)
726 delisakmpsa(rmconf->proposal);
891 * filled in for real when the ISAKMP proposal is configured.
911 if (rmconf->proposal == NULL) {
912 rmconf->proposal = new
    [all...]
security.c 55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
security.c 55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,

Completed in 58 milliseconds

1 2 3