/external/harfbuzz_ng/src/ |
D | hb-shape-plan.cc | 401 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_user_features_match() argument 403 if (proposal->num_user_features != shape_plan->num_user_features) in hb_shape_plan_user_features_match() 405 for (unsigned int i = 0, n = proposal->num_user_features; i < n; i++) in hb_shape_plan_user_features_match() 406 if (proposal->user_features[i].tag != shape_plan->user_features[i].tag || in hb_shape_plan_user_features_match() 407 proposal->user_features[i].value != shape_plan->user_features[i].value || in hb_shape_plan_user_features_match() 408 proposal->user_features[i].start != shape_plan->user_features[i].start || in hb_shape_plan_user_features_match() 409 proposal->user_features[i].end != shape_plan->user_features[i].end) in hb_shape_plan_user_features_match() 416 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_coords_match() argument 418 if (proposal->num_coords != shape_plan->num_coords) in hb_shape_plan_coords_match() 420 for (unsigned int i = 0, n = proposal->num_coords; i < n; i++) in hb_shape_plan_coords_match() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1() 346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1() 379 if (group != data->proposal.dh) { in ikev2_process_kei() 382 group, data->proposal.dh); in ikev2_process_kei() 549 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret() [all …]
|
D | eap_ikev2.c | 123 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 166 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 192 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 253 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 195 transform_id == data->proposal.integ) in ikev2_parse_transform() 200 transform_id == data->proposal.dh) in ikev2_parse_transform() 355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1() [all …]
|
D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init() 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init() 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init() 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init() 161 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 187 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 264 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 338 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 34 # phase 1 proposal (for ISAKMP SA) 35 proposal { 43 # to obey the initiator's lifetime and PFS group proposal, 50 # phase 2 proposal (for IPsec SA). 51 # actual phase 2 proposal will obey the following items:
|
D | racoon.conf.sample-inherit | 22 proposal { 40 proposal {
|
D | racoon.conf.in | 66 proposal { 88 proposal {
|
/external/openssh/ |
D | kex.c | 223 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf() 239 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf() 255 char **proposal = NULL; in kex_buf2prop() local 259 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop() 269 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) in kex_buf2prop() 271 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop() 282 *propp = proposal; in kex_buf2prop() 284 if (r != 0 && proposal != NULL) in kex_buf2prop() 285 kex_prop_free(proposal); in kex_buf2prop() 291 kex_prop_free(char **proposal) in kex_prop_free() argument [all …]
|
D | ssh_api.c | 79 char **proposal; in ssh_init() local 96 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init() 97 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { in ssh_init() 484 char **proposal; in _ssh_order_hostkeyalgs() local 489 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs() 491 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs() 520 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; in _ssh_order_hostkeyalgs() 522 r = kex_prop2buf(ssh->kex->my, proposal); in _ssh_order_hostkeyalgs() 527 kex_prop_free(proposal); in _ssh_order_hostkeyalgs()
|
D | compat.c | 258 filter_proposal(char *proposal, const char *filter) in filter_proposal() argument 265 tmp = orig_prop = xstrdup(proposal); in filter_proposal()
|
D | ssh_api.h | 34 char *proposal[PROPOSAL_MAX]; member
|
/external/ipsec-tools/src/racoon/ |
D | security.c | 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
D | oakley.h | 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
D | remoteconf.c | 178 new->proposal = NULL; in newrmconf() 313 if (rmconf->proposal) 314 delisakmpsa(rmconf->proposal); 469 if (rmconf->proposal == NULL) { 470 rmconf->proposal = new; 474 for (p = rmconf->proposal; p->next != NULL; p = p->next) 512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
|
D | handler.c | 547 if (iph2->proposal == NULL && iph2->approval == NULL) 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 606 if (iph2->proposal) { 608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 673 if (iph2->proposal) { 674 flushsaprop(iph2->proposal); 675 iph2->proposal = NULL; 749 if (iph2->proposal == NULL && iph2->approval == NULL) 757 } else if (iph2->proposal != NULL) { [all …]
|
D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init() 206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init() 207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init() 692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id() 693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
|
D | TODO | 83 o wildcard "accept any proposal" policy should be allowed. 87 - number of proposal 128 o behavior to receive multiple auth method proposals and AND proposal
|
/external/dagger2/ |
D | README.md | 37 You can also learn more from [the original proposal][proposal], 129 [proposal]: https://github.com/square/dagger/issues/366
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
D | racoon.conf | 18 proposal {
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
D | racoon.conf | 16 proposal {
|
D | racoon.conf-radius | 16 proposal {
|
/external/libxml2/result/ |
D | dav13.rde | 9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
|
D | dav13.rdr | 9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
|
/external/ipsec-tools/ |
D | ChangeLog | 119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks, 120 when malloc fails or when peer sends invalid proposal. 265 src/racoon/policy.c, src/racoon/proposal.c, 490 src/racoon/proposal.c, src/racoon/proposal.h, 500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys 536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437) 602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941) 662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for 694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
|