Home
last modified time | relevance | path

Searched refs:proposal (Results 1 – 25 of 80) sorted by relevance

1234

/external/harfbuzz_ng/src/
Dhb-shape-plan.cc401 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_user_features_match() argument
403 if (proposal->num_user_features != shape_plan->num_user_features) in hb_shape_plan_user_features_match()
405 for (unsigned int i = 0, n = proposal->num_user_features; i < n; i++) in hb_shape_plan_user_features_match()
406 if (proposal->user_features[i].tag != shape_plan->user_features[i].tag || in hb_shape_plan_user_features_match()
407 proposal->user_features[i].value != shape_plan->user_features[i].value || in hb_shape_plan_user_features_match()
408 proposal->user_features[i].start != shape_plan->user_features[i].start || in hb_shape_plan_user_features_match()
409 proposal->user_features[i].end != shape_plan->user_features[i].end) in hb_shape_plan_user_features_match()
416 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_coords_match() argument
418 if (proposal->num_coords != shape_plan->num_coords) in hb_shape_plan_coords_match()
420 for (unsigned int i = 0, n = proposal->num_coords; i < n; i++) in hb_shape_plan_coords_match()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1()
346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1()
379 if (group != data->proposal.dh) { in ikev2_process_kei()
382 group, data->proposal.dh); in ikev2_process_kei()
549 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret()
[all …]
Deap_ikev2.c123 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
166 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
192 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
253 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
164 transform_id == data->proposal.encr) { in ikev2_parse_transform()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
195 transform_id == data->proposal.integ) in ikev2_parse_transform()
200 transform_id == data->proposal.dh) in ikev2_parse_transform()
355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1()
356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1()
[all …]
Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init()
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init()
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init()
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init()
161 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
187 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
264 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
338 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample34 # phase 1 proposal (for ISAKMP SA)
35 proposal {
43 # to obey the initiator's lifetime and PFS group proposal,
50 # phase 2 proposal (for IPsec SA).
51 # actual phase 2 proposal will obey the following items:
Dracoon.conf.sample-inherit22 proposal {
40 proposal {
Dracoon.conf.in66 proposal {
88 proposal {
/external/openssh/
Dkex.c223 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf()
239 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf()
255 char **proposal = NULL; in kex_buf2prop() local
259 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop()
269 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) in kex_buf2prop()
271 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop()
282 *propp = proposal; in kex_buf2prop()
284 if (r != 0 && proposal != NULL) in kex_buf2prop()
285 kex_prop_free(proposal); in kex_buf2prop()
291 kex_prop_free(char **proposal) in kex_prop_free() argument
[all …]
Dssh_api.c79 char **proposal; in ssh_init() local
96 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init()
97 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { in ssh_init()
484 char **proposal; in _ssh_order_hostkeyalgs() local
489 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs()
491 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs()
520 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; in _ssh_order_hostkeyalgs()
522 r = kex_prop2buf(ssh->kex->my, proposal); in _ssh_order_hostkeyalgs()
527 kex_prop_free(proposal); in _ssh_order_hostkeyalgs()
Dcompat.c258 filter_proposal(char *proposal, const char *filter) in filter_proposal() argument
265 tmp = orig_prop = xstrdup(proposal); in filter_proposal()
Dssh_api.h34 char *proposal[PROPOSAL_MAX]; member
/external/ipsec-tools/src/racoon/
Dsecurity.c168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Dremoteconf.c178 new->proposal = NULL; in newrmconf()
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
469 if (rmconf->proposal == NULL) {
470 rmconf->proposal = new;
474 for (p = rmconf->proposal; p->next != NULL; p = p->next)
512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
Dhandler.c547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
675 iph2->proposal = NULL;
749 if (iph2->proposal == NULL && iph2->approval == NULL)
757 } else if (iph2->proposal != NULL) {
[all …]
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
DTODO83 o wildcard "accept any proposal" policy should be allowed.
87 - number of proposal
128 o behavior to receive multiple auth method proposals and AND proposal
/external/dagger2/
DREADME.md37 You can also learn more from [the original proposal][proposal],
129 [proposal]: https://github.com/square/dagger/issues/366
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
Dracoon.conf16 proposal {
Dracoon.conf-radius16 proposal {
/external/libxml2/result/
Ddav13.rde9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
Ddav13.rdr9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
/external/ipsec-tools/
DChangeLog119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks,
120 when malloc fails or when peer sends invalid proposal.
265 src/racoon/policy.c, src/racoon/proposal.c,
490 src/racoon/proposal.c, src/racoon/proposal.h,
500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys
536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437)
602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941)
662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for
694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default

1234