/netbsd-src/external/bsd/wpa/dist/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 195 transform_id == data->proposal.integ) in ikev2_parse_transform() 200 transform_id == data->proposal.dh) in ikev2_parse_transform() 355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1() [all …]
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
H A D | remoteconf.c | 180 rmconf->proposal) == NULL) in rmconf_match_etype_and_approval() 495 new->proposal = NULL; in newrmconf() 591 new->proposal = NULL; /* will be filled by set_isakmp_proposal() */ 737 if (rmconf->proposal) 738 delisakmpsa(rmconf->proposal); 932 if (rmconf->proposal == NULL) { 933 rmconf->proposal = new; 937 for (p = rmconf->proposal; p->next != NULL; p = p->next) 960 struct isakmpsa *prop = p->proposal; in dump_rmconf_single() 1192 checkisakmpsa(pcheck_level, proposal, acceptable) in checkisakmpsa() argument [all …]
|
H A D | security.c | 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
H A D | handler.c | 669 if (iph2->proposal == NULL && iph2->approval == NULL) 679 } else if (iph2->proposal != NULL) { 680 for (pr = iph2->proposal->head; pr != NULL; 731 if (iph2->proposal) { 733 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 819 if (iph2->proposal) { 820 flushsaprop(iph2->proposal); 821 iph2->proposal = NULL; 895 if (iph2->proposal == NULL && iph2->approval == NULL) 903 } else if (iph2->proposal != NULL) { [all …]
|
H A D | remoteconf.h | 148 struct isakmpsa *proposal; /* proposal list */ member 233 struct isakmpsa *proposal,
|
H A D | gssapi.c | 210 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init() 211 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init() 212 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init() 697 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id() 698 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
|
H A D | isakmp_agg.c | 157 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal); 180 switch (iph1->rmconf->proposal->authmethod) { 213 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 215 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) 232 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) { 242 if (oakley_needcr(iph1->rmconf->proposal->authmethod)) 978 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
|
H A D | TODO | 83 o wildcard "accept any proposal" policy should be allowed. 87 - number of proposal 128 o behavior to receive multiple auth method proposals and AND proposal
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/samples/ |
H A D | racoon.conf.sample | 34 # phase 1 proposal (for ISAKMP SA) 35 proposal { 43 # to obey the initiator's lifetime and PFS group proposal, 50 # phase 2 proposal (for IPsec SA). 51 # actual phase 2 proposal will obey the following items:
|
H A D | racoon.conf.sample-inherit | 22 proposal { 40 proposal {
|
H A D | racoon.conf.in | 66 proposal { 88 proposal {
|
H A D | racoon.conf.sample-natt | 79 proposal { 89 # Phase 2 proposal (for IPsec SA)
|
H A D | racoon.conf.sample-plainrsa | 31 proposal {
|
H A D | racoon.conf.sample-gssapi | 21 proposal {
|
/netbsd-src/external/apache2/llvm/dist/libcxx/docs/ |
H A D | Cxx1yStatusPaperStatus.csv | 22 "`3672 <https://wg21.link/n3672>`__","LWG","A proposal to add a utility class to represent optional… 32 "`3891 <https://wg21.link/n3891>`__","SG1","A proposal to rename shared_mutex to shared_timed_mutex…
|
H A D | Cxx2bStatusPaperStatus.csv | 4 "`P1048R1 <https://wg21.link/P1048R1>`__","LWG","A proposal for a type trait to detect scoped enume…
|
/netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/IR/ |
H A D | IntrinsicsWebAssembly.td | 176 // load_zero instructions are merged to the proposal. 193 // once the load_lane instructions are merged to the proposal. 236 // to the proposal.
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 18 proposal {
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 16 proposal {
|
H A D | racoon.conf-radius | 16 proposal {
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | openssh-lpk_openldap.schema | 5 # Based on the proposal of : Mark Ruijter
|
H A D | ssh_api.h | 35 char *proposal[PROPOSAL_MAX]; member
|
/netbsd-src/external/bsd/wpa/dist/src/eap_peer/ |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member
|
/netbsd-src/usr.sbin/racoon/ |
H A D | Makefile | 18 proposal.c sainfo.c strnames.c plog.c logger.c \
|