/external/ipsec-tools/src/racoon/ |
H A D | remoteconf.h | 148 struct isakmpsa *proposal; /* proposal list */ member in struct:remoteconf 233 struct isakmpsa *proposal,
|
H A D | handler.c | 62 #include "proposal.h" 667 if (iph2->proposal == NULL && iph2->approval == NULL) 677 } else if (iph2->proposal != NULL) { 678 for (pr = iph2->proposal->head; pr != NULL; 713 * SPI in the proposal is cleared. 728 /* clear spi, keep variables in the proposal */ 729 if (iph2->proposal) { 731 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 817 if (iph2->proposal) { 818 flushsaprop(iph2->proposal); [all...] |
H A D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 692 if (iph1->rmconf->proposal->gssid != NULL) 693 return (vdup(iph1->rmconf->proposal->gssid));
|
H A D | isakmp_agg.c | 156 /* create SA payload for my proposal */ 157 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal); 180 switch (iph1->rmconf->proposal->authmethod) { 213 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 215 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) 232 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) { 242 if (oakley_needcr(iph1->rmconf->proposal->authmethod)) 477 "failed to get valid proposal.\n"); 872 "failed to get valid proposal.\n"); 982 if (iph1->rmconf->proposal [all...] |
H A D | handler.h | 321 struct saprop *proposal; /* SA(s) proposal. */ member in struct:ph2handle 325 caddr_t spidx_gen; /* policy from peer's proposal */
|
H A D | ipsec_doi.c | 78 #include "proposal.h" 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 182 /* get proposal pair */ 265 /* compare proposal and select one */ 288 plog(LLV_ERROR, LOCATION, NULL, "no suitable proposal found.\n"); 294 plog(LLV_DEBUG, LOCATION, NULL, "an acceptable proposal found.\n"); 320 if (iph1->rmconf->proposal->gssid != NULL) 321 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); 350 * compare peer's single proposal and all of my proposal 3124 struct saprop *proposal, *a; local [all...] |
H A D | isakmp_base.c | 145 /* create SA payload for my proposal */ 147 iph1->rmconf->proposal); 158 switch (iph1->rmconf->proposal->authmethod) { 379 "failed to get valid proposal.\n"); 870 "failed to get valid proposal.\n");
|
H A D | proposal.c | 1 /* $NetBSD: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */ 3 /* $Id: proposal.c,v 1.17 2008/09/19 11:14:49 tteras Exp $ */ 62 #include "proposal.h" 184 * take a single match between saprop. allocate a new proposal and return it 185 * for future use (like picking single proposal from a bundle). 186 * pp1: peer's proposal. 187 * pp2: my proposal. 189 * modification of the proposal by calling cmp_aproppair_i() before 214 /* see proposal.h about lifetime/key length and PFS selection. */ 322 "My proposal missin [all...] |
H A D | isakmp_quick.c | 70 #include "proposal.h" 82 #include "proposal.h" 214 /* create SA payload for my proposal */ 229 pfsgroup = iph2->proposal->pfs_group; 269 ipsecdoi_transportmode(iph2->proposal)) { 279 if (ipsecdoi_transportmode(iph2->proposal) 624 "IDci prefix/ulproto does not match proposal.\n"); 636 "IDci matches proposal.\n"); 671 "IDcr prefix/ulproto does not match proposal.\n"); 684 "IDcr matches proposal [all...] |
H A D | isakmp_ident.c | 144 /* create SA payload for my proposal */ 146 iph1->rmconf->proposal); 160 switch (iph1->rmconf->proposal->authmethod) { 272 * if proposal-lifetime > lifetime-redcreek-wants. 324 "failed to get valid proposal.\n"); 927 "failed to get valid proposal.\n");
|
H A D | cfparse.y | 1754 for (p = cur_rmconf->proposal; p; p = p->next) { 1768 yyerror("DH group must be set in the proposal.\n"); 2508 /* set final acceptable proposal */ 2575 "failed to expand isakmp proposal.\n"); 2582 if (rmconf->proposal == NULL) { 2584 "no proposal found.\n");
|
H A D | pfkey.c | 88 #include "proposal.h" 905 pp = iph2->proposal; 1052 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 2201 if(iph2->proposal->head->reqid_in > 0){ 2203 xisr->sadb_x_ipsecrequest_reqid = iph2->proposal->head->reqid_in;
|
/external/ipsec-tools/ |
H A D | Android.mk | 42 src/racoon/proposal.c \
|
H A D | setup.c | 45 #include "proposal.h" 306 if (!remoteconf->proposal) { 308 remoteconf->proposal = p; 310 struct isakmpsa *q = remoteconf->proposal;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys, 173 integ = ikev2_get_integ(data->ikev2.proposal.integ); 199 ikev2_integ_hash(data->ikev2.proposal.integ, 259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys, 173 integ = ikev2_get_integ(data->ikev2.proposal.integ); 199 ikev2_integ_hash(data->ikev2.proposal.integ, 259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys, 173 integ = ikev2_get_integ(data->ikev2.proposal.integ); 199 ikev2_integ_hash(data->ikev2.proposal.integ, 259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 124 data->ikev2.proposal.prf, &data->ikev2.keys, 173 integ = ikev2_get_integ(data->ikev2.proposal.integ); 199 ikev2_integ_hash(data->ikev2.proposal.integ, 259 data->ikev2.proposal.integ, &data->ikev2.keys, 1,
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 1439 CCM is a NIST proposal for encrypt + authenticate that is centered around using AES (or any 16--byte cipher) as a primitive. Unlike EAX and OCB mode, 1542 Galois counter mode is an IEEE proposal for authenticated encryption (also it is a planned NIST standard). Like EAX and OCB mode, it can be used in a streaming capacity
|