Home
last modified time | relevance | path

Searched refs:proposal (Results 1 – 25 of 50) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Dikev2.c54 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
55 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
56 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
169 transform_id == data->proposal.encr) { in ikev2_parse_transform()
195 transform_id == data->proposal.prf) in ikev2_parse_transform()
200 transform_id == data->proposal.integ) in ikev2_parse_transform()
205 transform_id == data->proposal.dh) in ikev2_parse_transform()
360 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1()
361 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
362 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1()
[all …]
Deap_ikev2.c105 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init()
106 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init()
107 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
108 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init()
109 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init()
163 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
189 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
265 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
333 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
Dikev2.h39 struct ikev2_proposal_data proposal; member
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Dikev2.c50 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
51 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
52 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
358 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1()
377 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1()
378 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
379 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1()
410 if (group != data->proposal.dh) { in ikev2_process_kei()
413 group, data->proposal.dh); in ikev2_process_kei()
588 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret()
[all …]
Deap_ikev2.c124 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
173 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
199 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
259 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
Dikev2.h40 struct ikev2_proposal_data proposal; member
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample34 # phase 1 proposal (for ISAKMP SA)
35 proposal {
43 # to obey the initiator's lifetime and PFS group proposal,
50 # phase 2 proposal (for IPsec SA).
51 # actual phase 2 proposal will obey the following items:
Dracoon.conf.sample-inherit22 proposal {
40 proposal {
Dracoon.conf.in66 proposal {
88 proposal {
Dracoon.conf.sample-natt79 proposal {
89 # Phase 2 proposal (for IPsec SA)
Dracoon.conf.sample-plainrsa31 proposal {
Dracoon.conf.sample-gssapi21 proposal {
/external/ipsec-tools/src/racoon/
Dsecurity.c168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Dremoteconf.c178 new->proposal = NULL; in newrmconf()
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
471 if (rmconf->proposal == NULL) {
472 rmconf->proposal = new;
476 for (p = rmconf->proposal; p->next != NULL; p = p->next)
514 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
Dhandler.c547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
675 iph2->proposal = NULL;
749 if (iph2->proposal == NULL && iph2->approval == NULL)
757 } else if (iph2->proposal != NULL) {
[all …]
Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
DTODO83 o wildcard "accept any proposal" policy should be allowed.
87 - number of proposal
128 o behavior to receive multiple auth method proposals and AND proposal
/external/ipsec-tools/
Dsetup.c151 if (!remoteconf.proposal) { in add_proposal()
153 remoteconf.proposal = p; in add_proposal()
155 struct isakmpsa *q = remoteconf.proposal; in add_proposal()
DChangeLog119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks,
120 when malloc fails or when peer sends invalid proposal.
265 src/racoon/policy.c, src/racoon/proposal.c,
490 src/racoon/proposal.c, src/racoon/proposal.h,
500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys
536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437)
602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941)
662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for
694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
DMakefile22 src/racoon/proposal.c \
DAndroid.mk41 src/racoon/proposal.c \
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
Dracoon.conf16 proposal {
Dracoon.conf-radius16 proposal {

12