/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1() 346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1() 379 if (group != data->proposal.dh) { in ikev2_process_kei() 382 group, data->proposal.dh); in ikev2_process_kei() 548 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret() [all …]
|
D | eap_ikev2.c | 121 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 164 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 190 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 251 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 195 transform_id == data->proposal.integ) in ikev2_parse_transform() 200 transform_id == data->proposal.dh) in ikev2_parse_transform() 355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1() [all …]
|
D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init() 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init() 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init() 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init() 160 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 186 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 263 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 337 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 34 # phase 1 proposal (for ISAKMP SA) 35 proposal { 43 # to obey the initiator's lifetime and PFS group proposal, 50 # phase 2 proposal (for IPsec SA). 51 # actual phase 2 proposal will obey the following items:
|
D | racoon.conf.sample-inherit | 22 proposal { 40 proposal {
|
D | racoon.conf.in | 66 proposal { 88 proposal {
|
/external/openssh/ |
D | ssh_api.c | 77 char **proposal; in ssh_init() local 94 proposal = kex_params ? kex_params->proposal : myproposal; in ssh_init() 95 if ((r = kex_new(ssh, proposal, &ssh->kex)) != 0) { in ssh_init() 488 char **proposal; in _ssh_order_hostkeyalgs() local 493 if ((r = kex_buf2prop(ssh->kex->my, NULL, &proposal)) != 0) in _ssh_order_hostkeyalgs() 495 orig = proposal[PROPOSAL_SERVER_HOST_KEY_ALGS]; in _ssh_order_hostkeyalgs() 524 proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = replace; in _ssh_order_hostkeyalgs() 526 r = kex_prop2buf(ssh->kex->my, proposal); in _ssh_order_hostkeyalgs() 531 kex_prop_free(proposal); in _ssh_order_hostkeyalgs()
|
D | kex.c | 245 kex_prop2buf(struct sshbuf *b, char *proposal[PROPOSAL_MAX]) in kex_prop2buf() 261 if ((r = sshbuf_put_cstring(b, proposal[i])) != 0) in kex_prop2buf() 277 char **proposal = NULL; in kex_buf2prop() local 281 if ((proposal = calloc(PROPOSAL_MAX, sizeof(char *))) == NULL) in kex_buf2prop() 291 if ((r = sshbuf_get_cstring(b, &(proposal[i]), NULL)) != 0) in kex_buf2prop() 293 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop() 304 *propp = proposal; in kex_buf2prop() 306 if (r != 0 && proposal != NULL) in kex_buf2prop() 307 kex_prop_free(proposal); in kex_buf2prop() 313 kex_prop_free(char **proposal) in kex_prop_free() argument [all …]
|
D | match.c | 301 match_filter_list(const char *proposal, const char *filter) in match_filter_list() argument 303 size_t len = strlen(proposal) + 1; in match_filter_list() 305 char *orig_prop = strdup(proposal); in match_filter_list()
|
/external/ipsec-tools/src/racoon/ |
D | security.c | 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
D | remoteconf.c | 178 new->proposal = NULL; in newrmconf() 313 if (rmconf->proposal) 314 delisakmpsa(rmconf->proposal); 469 if (rmconf->proposal == NULL) { 470 rmconf->proposal = new; 474 for (p = rmconf->proposal; p->next != NULL; p = p->next) 512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
|
D | oakley.h | 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
D | handler.c | 547 if (iph2->proposal == NULL && iph2->approval == NULL) 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 606 if (iph2->proposal) { 608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 673 if (iph2->proposal) { 674 flushsaprop(iph2->proposal); 675 iph2->proposal = NULL; 749 if (iph2->proposal == NULL && iph2->approval == NULL) 757 } else if (iph2->proposal != NULL) { [all …]
|
D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init() 206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init() 207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init() 692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id() 693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
|
D | TODO | 83 o wildcard "accept any proposal" policy should be allowed. 87 - number of proposal 128 o behavior to receive multiple auth method proposals and AND proposal
|
/external/openssh/regress/unittests/kex/ |
D | test_kex.c | 99 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key() 101 kex_params.proposal[PROPOSAL_KEX_ALGS] = kex; in do_kex_with_key() 104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
|
/external/dagger2/ |
D | README.md | 37 You can also learn more from [the original proposal][proposal], 129 [proposal]: https://github.com/square/dagger/issues/366
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
D | racoon.conf | 18 proposal {
|
/external/ipsec-tools/ |
D | ChangeLog | 119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks, 120 when malloc fails or when peer sends invalid proposal. 265 src/racoon/policy.c, src/racoon/proposal.c, 490 src/racoon/proposal.c, src/racoon/proposal.h, 500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys 536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437) 602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941) 662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for 694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
D | racoon.conf | 16 proposal {
|
D | racoon.conf-radius | 16 proposal {
|
/external/openssh/regress/misc/kexfuzz/ |
D | kexfuzz.c | 216 memcpy(kex_params.proposal, myproposal, sizeof(myproposal)); in do_kex_with_key() 218 kex_params.proposal[PROPOSAL_KEX_ALGS] = strdup(kex); in do_kex_with_key() 221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
|
/external/syzkaller/vendor/google.golang.org/grpc/ |
D | CONTRIBUTING.md | 17 …havioral or API change, consider starting with a [gRFC proposal](https://github.com/grpc/proposal)…
|
/external/libxml2/result/ |
D | dav13.rde | 9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
|