Searched refs:proposal (Results 26 - 44 of 44) sorted by relevance

12

/external/ipsec-tools/src/racoon/
H A Dremoteconf.h148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf
233 struct isakmpsa *proposal,
H A Dhandler.c62 #include "proposal.h"
667 if (iph2->proposal == NULL && iph2->approval == NULL)
677 } else if (iph2->proposal != NULL) {
678 for (pr = iph2->proposal->head; pr != NULL;
713 * SPI in the proposal is cleared.
728 /* clear spi, keep variables in the proposal */
729 if (iph2->proposal) {
731 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
817 if (iph2->proposal) {
818 flushsaprop(iph2->proposal);
[all...]
H A Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
692 if (iph1->rmconf->proposal->gssid != NULL)
693 return (vdup(iph1->rmconf->proposal->gssid));
H A Disakmp_agg.c156 /* create SA payload for my proposal */
157 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal);
180 switch (iph1->rmconf->proposal->authmethod) {
213 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
215 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
232 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) {
242 if (oakley_needcr(iph1->rmconf->proposal->authmethod))
477 "failed to get valid proposal.\n");
872 "failed to get valid proposal.\n");
982 if (iph1->rmconf->proposal
[all...]
H A Dhandler.h321 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle
325 caddr_t spidx_gen; /* policy from peer's proposal */
H A Dipsec_doi.c78 #include "proposal.h"
167 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
182 /* get proposal pair */
265 /* compare proposal and select one */
288 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n");
294 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n");
320 if (iph1->rmconf->proposal->gssid != NULL)
321 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
350 * compare peer's single proposal and all of my proposal
3124 struct saprop *proposal, *a; local
[all...]
H A Disakmp_base.c145 /* create SA payload for my proposal */
147 iph1->rmconf->proposal);
158 switch (iph1->rmconf->proposal->authmethod) {
379 "failed to get valid proposal.\n");
870 "failed to get valid proposal.\n");
H A Dproposal.c1 /* $NetBSD: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */
3 /* $Id: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */
62 #include "proposal.h"
184 * take a single match between saprop. allocate a new proposal and return it
185 * for future use (like picking single proposal from a bundle).
186 * pp1: peer's proposal.
187 * pp2: my proposal.
189 * modification of the proposal by calling cmp_aproppair_i() before
214 /* see proposal.h about lifetime/key length and PFS selection. */
322 "My proposal missin
[all...]
H A Disakmp_quick.c70 #include "proposal.h"
82 #include "proposal.h"
214 /* create SA payload for my proposal */
229 pfsgroup = iph2->proposal->pfs_group;
269 ipsecdoi_transportmode(iph2->proposal)) {
279 if (ipsecdoi_transportmode(iph2->proposal)
624 "IDci prefix/ulproto does not match proposal.\n");
636 "IDci matches proposal.\n");
671 "IDcr prefix/ulproto does not match proposal.\n");
684 "IDcr matches proposal
[all...]
H A Disakmp_ident.c144 /* create SA payload for my proposal */
146 iph1->rmconf->proposal);
160 switch (iph1->rmconf->proposal->authmethod) {
272 * if proposal-lifetime > lifetime-redcreek-wants.
324 "failed to get valid proposal.\n");
927 "failed to get valid proposal.\n");
H A Dcfparse.y1754 for (p = cur_rmconf->proposal; p; p = p->next) {
1768 yyerror("DH group must be set in the proposal.\n");
2508 /* set final acceptable proposal */
2575 "failed to expand isakmp proposal.\n");
2582 if (rmconf->proposal == NULL) {
2584 "no proposal found.\n");
H A Dpfkey.c88 #include "proposal.h"
905 pp = iph2->proposal;
1052 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval;
2201 if(iph2->proposal->head->reqid_in > 0){
2203 xisr->sadb_x_ipsecrequest_reqid = iph2->proposal->head->reqid_in;
/external/ipsec-tools/
H A DAndroid.mk42 src/racoon/proposal.c \
H A Dsetup.c45 #include "proposal.h"
306 if (!remoteconf->proposal) {
308 remoteconf->proposal = p;
310 struct isakmpsa *q = remoteconf->proposal;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys,
173 integ = ikev2_get_integ(data->ikev2.proposal.integ);
199 ikev2_integ_hash(data->ikev2.proposal.integ,
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys,
173 integ = ikev2_get_integ(data->ikev2.proposal.integ);
199 ikev2_integ_hash(data->ikev2.proposal.integ,
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys,
173 integ = ikev2_get_integ(data->ikev2.proposal.integ);
199 ikev2_integ_hash(data->ikev2.proposal.integ,
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys,
173 integ = ikev2_get_integ(data->ikev2.proposal.integ);
199 ikev2_integ_hash(data->ikev2.proposal.integ,
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
/external/dropbear/libtomcrypt/
H A Dcrypt.tex1439 CCM is a NIST proposal for encrypt + authenticate that is centered around using AES (or any 16--byte cipher) as a primitive. Unlike EAX and OCB mode,
1542 Galois counter mode is an IEEE proposal for authenticated encryption (also it is a planned NIST standard). Like EAX and OCB mode, it can be used in a streaming capacity

Completed in 167 milliseconds

12