Home
last modified time | relevance | path

Searched refs:proposal (Results 1 – 25 of 153) sorted by relevance

1234567

/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1()
346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1()
379 if (group != data->proposal.dh) { in ikev2_process_kei()
382 group, data->proposal.dh); in ikev2_process_kei()
548 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret()
[all …]
Deap_ikev2.c121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
164 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
190 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
164 transform_id == data->proposal.encr) { in ikev2_parse_transform()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
195 transform_id == data->proposal.integ) in ikev2_parse_transform()
200 transform_id == data->proposal.dh) in ikev2_parse_transform()
355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1()
356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1()
[all …]
Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init()
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init()
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init()
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init()
160 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
186 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample34 # phase 1 proposal (for ISAKMP SA)
35 proposal {
43 # to obey the initiator's lifetime and PFS group proposal,
50 # phase 2 proposal (for IPsec SA).
51 # actual phase 2 proposal will obey the following items:
Dracoon.conf.sample-inherit22 proposal {
40 proposal {
Dracoon.conf.in66 proposal {
88 proposal {
/external/openssh/
Dssh_api.c77 char **proposal; in ssh_init() local
94 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init()
95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { in ssh_init()
488 char **proposal; in _ssh_order_hostkeyalgs() local
493 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs()
495 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs()
524 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; in _ssh_order_hostkeyalgs()
526 r = kex_prop2buf(ssh->kex->my, proposal); in _ssh_order_hostkeyalgs()
531 kex_prop_free(proposal); in _ssh_order_hostkeyalgs()
Dkex.c245 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf()
261 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf()
277 char **proposal = NULL; in kex_buf2prop() local
281 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop()
291 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) in kex_buf2prop()
293 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop()
304 *propp = proposal; in kex_buf2prop()
306 if (r != 0 && proposal != NULL) in kex_buf2prop()
307 kex_prop_free(proposal); in kex_buf2prop()
313 kex_prop_free(char **proposal) in kex_prop_free() argument
[all …]
Dmatch.c301 match_filter_list(const char *proposal, const char *filter) in match_filter_list() argument
303 size_t len = strlen(proposal) + 1; in match_filter_list()
305 char *orig_prop = strdup(proposal); in match_filter_list()
/external/ipsec-tools/src/racoon/
Dsecurity.c168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Dremoteconf.c178 new->proposal = NULL; in newrmconf()
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
469 if (rmconf->proposal == NULL) {
470 rmconf->proposal = new;
474 for (p = rmconf->proposal; p->next != NULL; p = p->next)
512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Dhandler.c547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
675 iph2->proposal = NULL;
749 if (iph2->proposal == NULL && iph2->approval == NULL)
757 } else if (iph2->proposal != NULL) {
[all …]
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
DTODO83 o wildcard "accept any proposal" policy should be allowed.
87 - number of proposal
128 o behavior to receive multiple auth method proposals and AND proposal
/external/openssh/regress/unittests/kex/
Dtest_kex.c99 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key()
101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; in do_kex_with_key()
104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
/external/dagger2/
DREADME.md37 You can also learn more from [the original proposal][proposal],
129 [proposal]: https://github.com/square/dagger/issues/366
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
Dracoon.conf18 proposal {
/external/ipsec-tools/
DChangeLog119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks,
120 when malloc fails or when peer sends invalid proposal.
265 src/racoon/policy.c, src/racoon/proposal.c,
490 src/racoon/proposal.c, src/racoon/proposal.h,
500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys
536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437)
602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941)
662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for
694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
Dracoon.conf16 proposal {
Dracoon.conf-radius16 proposal {
/external/openssh/regress/misc/kexfuzz/
Dkexfuzz.c216 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key()
218 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex); in do_kex_with_key()
221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
/external/syzkaller/vendor/google.golang.org/grpc/
DCONTRIBUTING.md17 …havioral or API change, consider starting with a [gRFC proposal](https://github.com/grpc/proposal)…
/external/libxml2/result/
Ddav13.rde9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc

1234567