Searched refs:approval (Results 1 – 21 of 21) sorted by relevance
/external/ipsec-tools/src/racoon/ |
D | handler.c | 322 if (iph1->approval) { 323 delisakmpsa(iph1->approval); 324 iph1->approval = NULL; 360 if(iph1->approval != NULL) 361 delisakmpsa(iph1->approval); 547 if (iph2->proposal == NULL && iph2->approval == NULL) 549 if (iph2->approval != NULL) { 550 for (pr = iph2->approval->head; pr != NULL; 613 if (iph2->approval) { 614 flushsaprop(iph2->approval); [all …]
|
D | pfkey.c | 852 pp = iph2->approval; 981 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 1034 if (iph2->approval == NULL) { 1047 sa_args.l_addtime = iph2->approval->lifetime; 1053 ipsecdoi_transportmode(iph2->approval)) { 1061 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 1095 sa_args.l_bytes = iph2->approval->lifebyte * 1024, 1101 if (*iph2->approval->sctx.ctx_str) { 1102 sa_args.ctxdoi = iph2->approval->sctx.ctx_doi; 1103 sa_args.ctxalg = iph2->approval->sctx.ctx_alg; [all …]
|
D | oakley.c | 386 if (iph1->approval == NULL) { 393 type = iph1->approval->hashtype; 416 if (iph1->approval == NULL) { 423 type = iph1->approval->hashtype; 447 if (iph2->approval->pfs_group && iph2->dhpub_p) { 491 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0); 505 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 662 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 1054 iph1->approval->authmethod); 1149 iph1->approval->authmethod); [all …]
|
D | oakley.h | 230 (iph1)->approval->authmethod == OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I) ? \ 231 FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I : (iph1)->approval->authmethod) 239 #define AUTHMETHOD(iph1) (iph1)->approval->authmethod
|
D | isakmp_ident.c | 370 if (oakley_dh_generate(iph1->approval->dhgrp, 590 if (oakley_dh_compute(iph1->approval->dhgrp, iph1->dhpub, 995 if (iph1->approval->gssid != NULL) { 996 gss_sa = ipsecdoi_setph1proposal(iph1->approval); 1271 if (oakley_dh_generate(iph1->approval->dhgrp, 1307 if (oakley_dh_compute(iph1->approval->dhgrp, iph1->dhpub, 1465 iph1->approval->authmethod); 1663 && oakley_needcr(iph1->approval->authmethod) 1812 && oakley_needcr(iph1->approval->authmethod) 1872 iph1->approval->authmethod); [all …]
|
D | gssapi.c | 292 if (iph1->approval != NULL && iph1->approval->gssid != NULL) { in gssapi_get_itoken() 295 (int)iph1->approval->gssid->l, iph1->approval->gssid->v); in gssapi_get_itoken() 296 name_token.length = iph1->approval->gssid->l; in gssapi_get_itoken() 297 name_token.value = iph1->approval->gssid->v; in gssapi_get_itoken()
|
D | isakmp_base.c | 433 if (oakley_dh_generate(iph1->approval->dhgrp, 467 vid = set_vendorid(iph1->approval->vendorid); 699 if (oakley_dh_compute(iph1->approval->dhgrp, iph1->dhpub, 1161 if (oakley_dh_generate(iph1->approval->dhgrp, 1166 if (oakley_dh_compute(iph1->approval->dhgrp, iph1->dhpub, 1272 iph1->approval->authmethod); 1283 vid = set_vendorid(iph1->approval->vendorid);
|
D | handler.h | 125 struct isakmpsa *approval; /* pointer to SA(s) approved. */ member 290 struct saprop *approval; /* SA(s) approved. */ member
|
D | isakmp_quick.c | 1100 if (iph2->dhpub_p != NULL && iph2->approval->pfs_group == 0) { 1106 if (iph2->dhpub_p == NULL && iph2->approval->pfs_group != 0) { 1219 pfsgroup = iph2->approval->pfs_group; 1284 struct saprop *pp = iph2->approval; 1527 tlen = sizeof(struct isakmp_pl_n) + iph2->approval->head->spisize; 1538 n->proto_id = iph2->approval->head->proto_id; 1539 n->spi_size = sizeof(iph2->approval->head->spisize); 1541 memcpy(n + 1, &iph2->approval->head->spi, iph2->approval->head->spisize); 1687 if (tunnel_mode_prop(iph2->approval)) {
|
D | ipsec_doi.c | 219 if (iph1->approval) { 220 delisakmpsa(iph1->approval); 221 iph1->approval = NULL; 294 iph1->approval = fixup_initiator_sa(sa, &tsa); 302 iph1->approval = sa; 311 iph1->approval = sa; 313 if(iph1->approval) { 315 s_oakley_attr_method(iph1->approval->authmethod)); 320 delisakmpsa(iph1->approval); 321 iph1->approval = NULL; [all …]
|
D | isakmp_agg.c | 988 if (oakley_dh_compute(iph1->approval->dhgrp, iph1->dhpub, 1021 && oakley_needcr(iph1->approval->authmethod) 1174 if (iph1->approval->gssid != NULL) 1176 ipsecdoi_setph1proposal(iph1->approval);
|
D | isakmp_inf.c | 647 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 846 if (!iph2->approval) 849 pr = iph2->approval->head;
|
D | nattraversal.c | 131 saddr2str(addr), iph1->approval->hashtype, in natt_hash_addr()
|
D | isakmp.c | 867 iph1->sce = sched_new(iph1->approval->lifetime, 1060 iph1->approval = NULL; 1173 iph1->approval = NULL; 3571 if (tunnel_mode_prop(iph2->approval)) {
|
/external/skia/site/ |
D | roles.md | 57 <p>upload changes for approval</p>
|
/external/droiddriver/ |
D | contributing_aosp.md | 32 …iewed (+2), then verified & submitted by an approver. Reviewers without approval rights are limite…
|
/external/llvm/docs/ |
D | DeveloperPolicy.rst | 147 approval, or request active objections to the patch with a deadline. 361 #. You are granted *commit-after-approval* to all parts of LLVM. To get 362 approval, submit a `patch`_ to `llvm-commits 366 #. You are allowed to commit patches without approval which you think are 372 #. You are allowed to commit patches without approval to those portions of LLVM 551 license for your contributions won't change without your approval in the
|
/external/wpa_supplicant_8/ |
D | CONTRIBUTIONS | 60 was used to collect explicit approval to license the contribution with
|
/external/skia/site/dev/sheriffing/ |
D | index.md | 67 …ifts with someone (because you are out sick or on vacation), please get approval from the person y…
|
/external/bison/ |
D | ChangeLog | 3287 waiting for approval).
|
/external/icu/icu4j/main/shared/data/ |
D | Transliterator_Han_Latin_Definition.txt | 972 啧 < interjection\-of\-approval\-or\-admiration; 36621 啧 > interjection\-of\-approval\-or\-admiration; 36645 嘖 > interjection\-of\-approval\-or\-admiration;
|