/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 50 integ = ikev2_get_integ(data->proposal.integ); 51 prf = ikev2_get_prf(data->proposal.prf); 52 encr = ikev2_get_encr(data->proposal.encr); 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 284 "in proposal"); 358 os_memcpy(&data->proposal, &prop, sizeof(prop)); 372 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 51 integ = ikev2_get_integ(data->proposal.integ); 52 prf = ikev2_get_prf(data->proposal.prf); 53 encr = ikev2_get_encr(data->proposal.encr); 55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 285 "in proposal"); 359 os_memcpy(&data->proposal, &prop, sizeof(prop)); 373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 51 integ = ikev2_get_integ(data->proposal.integ); 52 prf = ikev2_get_prf(data->proposal.prf); 53 encr = ikev2_get_encr(data->proposal.encr); 55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 285 "in proposal"); 359 os_memcpy(&data->proposal, &prop, sizeof(prop)); 373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 51 integ = ikev2_get_integ(data->proposal.integ); 52 prf = ikev2_get_prf(data->proposal.prf); 53 encr = ikev2_get_encr(data->proposal.encr); 55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 285 "in proposal"); 359 os_memcpy(&data->proposal, &prop, sizeof(prop)); 373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 18 proposal {
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 16 proposal {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 54 integ = ikev2_get_integ(data->proposal.integ); 55 prf = ikev2_get_prf(data->proposal.prf); 56 encr = ikev2_get_encr(data->proposal.encr); 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 169 transform_id == data->proposal.encr) { 195 transform_id == data->proposal.prf) 200 transform_id == data->proposal.integ) 205 transform_id == data->proposal.dh) 223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_ikev2.c | 105 data->ikev2.proposal.proposal_num = 1; 106 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 108 data->ikev2.proposal.encr = ENCR_AES_CBC; 109 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 163 integ = ikev2_get_integ(data->ikev2.proposal.integ); 189 ikev2_integ_hash(data->ikev2.proposal.integ, 265 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 333 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 55 integ = ikev2_get_integ(data->proposal.integ); 56 prf = ikev2_get_prf(data->proposal.prf); 57 encr = ikev2_get_encr(data->proposal.encr); 59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 170 transform_id == data->proposal.encr) { 196 transform_id == data->proposal.prf) 201 transform_id == data->proposal.integ) 206 transform_id == data->proposal.dh) 224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 106 data->ikev2.proposal.proposal_num = 1; 107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 108 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 109 data->ikev2.proposal.encr = ENCR_AES_CBC; 110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); 190 ikev2_integ_hash(data->ikev2.proposal.integ, 266 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 334 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 55 integ = ikev2_get_integ(data->proposal.integ); 56 prf = ikev2_get_prf(data->proposal.prf); 57 encr = ikev2_get_encr(data->proposal.encr); 59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 170 transform_id == data->proposal.encr) { 196 transform_id == data->proposal.prf) 201 transform_id == data->proposal.integ) 206 transform_id == data->proposal.dh) 224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 106 data->ikev2.proposal.proposal_num = 1; 107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 108 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 109 data->ikev2.proposal.encr = ENCR_AES_CBC; 110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); 190 ikev2_integ_hash(data->ikev2.proposal.integ, 266 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 334 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 55 integ = ikev2_get_integ(data->proposal.integ); 56 prf = ikev2_get_prf(data->proposal.prf); 57 encr = ikev2_get_encr(data->proposal.encr); 59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 170 transform_id == data->proposal.encr) { 196 transform_id == data->proposal.prf) 201 transform_id == data->proposal.integ) 206 transform_id == data->proposal.dh) 224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 106 data->ikev2.proposal.proposal_num = 1; 107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 108 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 109 data->ikev2.proposal.encr = ENCR_AES_CBC; 110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); 190 ikev2_integ_hash(data->ikev2.proposal.integ, 266 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 334 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/ipsec-tools/src/racoon/ |
H A D | remoteconf.c | 72 #include "proposal.h" 184 rmconf->proposal) == NULL) 504 new->proposal = NULL; 607 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 657 /* proposal has been deep copied already from spspec's, see 745 if (rmconf->proposal) 746 delisakmpsa(rmconf->proposal); 927 * filled in for real when the ISAKMP proposal is configured. 949 if (rmconf->proposal == NULL) { 950 rmconf->proposal [all...] |
H A D | security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
/external/ipsec-tools/ |
H A D | Makefile | 26 src/racoon/proposal.c \
|