Home
last modified time | relevance | path

Searched refs:proposal (Results 1 – 25 of 68) sorted by relevance

123

/external/harfbuzz_ng/src/
Dhb-shape-plan.cc354 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_user_features_match() argument
356 if (proposal->num_user_features != shape_plan->num_user_features) return false; in hb_shape_plan_user_features_match()
357 for (unsigned int i = 0, n = proposal->num_user_features; i < n; i++) in hb_shape_plan_user_features_match()
358 if (proposal->user_features[i].tag != shape_plan->user_features[i].tag || in hb_shape_plan_user_features_match()
359 proposal->user_features[i].value != shape_plan->user_features[i].value || in hb_shape_plan_user_features_match()
360 proposal->user_features[i].start != shape_plan->user_features[i].start || in hb_shape_plan_user_features_match()
361 proposal->user_features[i].end != shape_plan->user_features[i].end) return false; in hb_shape_plan_user_features_match()
367 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_matches() argument
369 return hb_segment_properties_equal (&shape_plan->props, &proposal->props) && in hb_shape_plan_matches()
370 hb_shape_plan_user_features_match (shape_plan, proposal) && in hb_shape_plan_matches()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1()
346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1()
379 if (group != data->proposal.dh) { in ikev2_process_kei()
382 group, data->proposal.dh); in ikev2_process_kei()
549 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret()
[all …]
Deap_ikev2.c123 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
166 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
192 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
253 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
Dikev2.h34 struct ikev2_proposal_data proposal; member
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
164 transform_id == data->proposal.encr) { in ikev2_parse_transform()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
195 transform_id == data->proposal.integ) in ikev2_parse_transform()
200 transform_id == data->proposal.dh) in ikev2_parse_transform()
355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1()
356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1()
[all …]
Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init()
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init()
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init()
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init()
161 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
187 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
264 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
338 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample34 # phase 1 proposal (for ISAKMP SA)
35 proposal {
43 # to obey the initiator's lifetime and PFS group proposal,
50 # phase 2 proposal (for IPsec SA).
51 # actual phase 2 proposal will obey the following items:
Dracoon.conf.sample-inherit22 proposal {
40 proposal {
Dracoon.conf.in66 proposal {
88 proposal {
/external/openssh/
Dkex.c161 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf()
177 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf()
193 char **proposal = NULL; in kex_buf2prop() local
197 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop()
207 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) in kex_buf2prop()
209 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop()
220 *propp = proposal; in kex_buf2prop()
222 if (r != 0 && proposal != NULL) in kex_buf2prop()
223 kex_prop_free(proposal); in kex_buf2prop()
229 kex_prop_free(char **proposal) in kex_prop_free() argument
[all …]
Dssh_api.c79 char **proposal; in ssh_init() local
96 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init()
97 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { in ssh_init()
484 char **proposal; in _ssh_order_hostkeyalgs() local
489 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs()
491 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs()
520 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; in _ssh_order_hostkeyalgs()
522 r = kex_prop2buf(ssh->kex->my, proposal); in _ssh_order_hostkeyalgs()
527 kex_prop_free(proposal); in _ssh_order_hostkeyalgs()
Dcompat.c223 filter_proposal(char *proposal, const char *filter) in filter_proposal() argument
230 tmp = orig_prop = xstrdup(proposal); in filter_proposal()
Dssh_api.h34 char *proposal[PROPOSAL_MAX]; member
/external/ipsec-tools/src/racoon/
Dsecurity.c168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Dremoteconf.c178 new->proposal = NULL; in newrmconf()
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
471 if (rmconf->proposal == NULL) {
472 rmconf->proposal = new;
476 for (p = rmconf->proposal; p->next != NULL; p = p->next)
514 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
Dhandler.c547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
675 iph2->proposal = NULL;
749 if (iph2->proposal == NULL && iph2->approval == NULL)
757 } else if (iph2->proposal != NULL) {
[all …]
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
DTODO83 o wildcard "accept any proposal" policy should be allowed.
87 - number of proposal
128 o behavior to receive multiple auth method proposals and AND proposal
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
Dracoon.conf16 proposal {
Dracoon.conf-radius16 proposal {
/external/libxml2/result/
Ddav13.rde9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
Ddav13.rdr9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
/external/ipsec-tools/
DChangeLog119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks,
120 when malloc fails or when peer sends invalid proposal.
265 src/racoon/policy.c, src/racoon/proposal.c,
490 src/racoon/proposal.c, src/racoon/proposal.h,
500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys
536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437)
602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941)
662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for
694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default

123