Searched refs:proposal (Results 1 - 25 of 44) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Dikev2.c50 integ = ikev2_get_integ(data->proposal.integ);
51 prf = ikev2_get_prf(data->proposal.prf);
52 encr = ikev2_get_encr(data->proposal.encr);
54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
284 "in proposal");
358 os_memcpy(&data->proposal, &prop, sizeof(prop));
372 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c51 integ = ikev2_get_integ(data->proposal.integ);
52 prf = ikev2_get_prf(data->proposal.prf);
53 encr = ikev2_get_encr(data->proposal.encr);
55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
285 "in proposal");
359 os_memcpy(&data->proposal, &prop, sizeof(prop));
373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c51 integ = ikev2_get_integ(data->proposal.integ);
52 prf = ikev2_get_prf(data->proposal.prf);
53 encr = ikev2_get_encr(data->proposal.encr);
55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
285 "in proposal");
359 os_memcpy(&data->proposal, &prop, sizeof(prop));
373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c51 integ = ikev2_get_integ(data->proposal.integ);
52 prf = ikev2_get_prf(data->proposal.prf);
53 encr = ikev2_get_encr(data->proposal.encr);
55 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
240 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
249 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
285 "in proposal");
359 os_memcpy(&data->proposal, &prop, sizeof(prop));
373 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h40 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
H A Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
H A Dracoon.conf16 proposal {
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.c54 integ = ikev2_get_integ(data->proposal.integ);
55 prf = ikev2_get_prf(data->proposal.prf);
56 encr = ikev2_get_encr(data->proposal.encr);
58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
169 transform_id == data->proposal.encr) {
195 transform_id == data->proposal.prf)
200 transform_id == data->proposal.integ)
205 transform_id == data->proposal.dh)
223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_ikev2.c105 data->ikev2.proposal.proposal_num = 1;
106 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
107 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
108 data->ikev2.proposal.encr = ENCR_AES_CBC;
109 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
163 integ = ikev2_get_integ(data->ikev2.proposal.integ);
189 ikev2_integ_hash(data->ikev2.proposal.integ,
265 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
333 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c55 integ = ikev2_get_integ(data->proposal.integ);
56 prf = ikev2_get_prf(data->proposal.prf);
57 encr = ikev2_get_encr(data->proposal.encr);
59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
170 transform_id == data->proposal.encr) {
196 transform_id == data->proposal.prf)
201 transform_id == data->proposal.integ)
206 transform_id == data->proposal.dh)
224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c106 data->ikev2.proposal.proposal_num = 1;
107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
108 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
109 data->ikev2.proposal.encr = ENCR_AES_CBC;
110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
164 integ = ikev2_get_integ(data->ikev2.proposal.integ);
190 ikev2_integ_hash(data->ikev2.proposal.integ,
266 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
334 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c55 integ = ikev2_get_integ(data->proposal.integ);
56 prf = ikev2_get_prf(data->proposal.prf);
57 encr = ikev2_get_encr(data->proposal.encr);
59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
170 transform_id == data->proposal.encr) {
196 transform_id == data->proposal.prf)
201 transform_id == data->proposal.integ)
206 transform_id == data->proposal.dh)
224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c106 data->ikev2.proposal.proposal_num = 1;
107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
108 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
109 data->ikev2.proposal.encr = ENCR_AES_CBC;
110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
164 integ = ikev2_get_integ(data->ikev2.proposal.integ);
190 ikev2_integ_hash(data->ikev2.proposal.integ,
266 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
334 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c55 integ = ikev2_get_integ(data->proposal.integ);
56 prf = ikev2_get_prf(data->proposal.prf);
57 encr = ikev2_get_encr(data->proposal.encr);
59 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
170 transform_id == data->proposal.encr) {
196 transform_id == data->proposal.prf)
201 transform_id == data->proposal.integ)
206 transform_id == data->proposal.dh)
224 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
231 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c106 data->ikev2.proposal.proposal_num = 1;
107 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
108 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
109 data->ikev2.proposal.encr = ENCR_AES_CBC;
110 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
164 integ = ikev2_get_integ(data->ikev2.proposal.integ);
190 ikev2_integ_hash(data->ikev2.proposal.integ,
266 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
334 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h39 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/ipsec-tools/src/racoon/
H A Dremoteconf.c72 #include "proposal.h"
184 rmconf->proposal) == NULL)
504 new->proposal = NULL;
607 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */
657 /* proposal has been deep copied already from spspec's, see
745 if (rmconf->proposal)
746 delisakmpsa(rmconf->proposal);
927 * filled in for real when the ISAKMP proposal is configured.
949 if (rmconf->proposal == NULL) {
950 rmconf->proposal
[all...]
H A Dsecurity.c55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
/external/ipsec-tools/
H A DMakefile26 src/racoon/proposal.c \

Completed in 246 milliseconds

12