Home
last modified time | relevance | path

Searched refs:proposal (Results 1 – 25 of 66) sorted by relevance

123

/external/harfbuzz_ng/src/
Dhb-shape-plan.cc358 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_user_features_match() argument
360 if (proposal->num_user_features != shape_plan->num_user_features) return false; in hb_shape_plan_user_features_match()
361 for (unsigned int i = 0, n = proposal->num_user_features; i < n; i++) in hb_shape_plan_user_features_match()
362 if (proposal->user_features[i].tag != shape_plan->user_features[i].tag || in hb_shape_plan_user_features_match()
363 proposal->user_features[i].value != shape_plan->user_features[i].value || in hb_shape_plan_user_features_match()
364 proposal->user_features[i].start != shape_plan->user_features[i].start || in hb_shape_plan_user_features_match()
365 proposal->user_features[i].end != shape_plan->user_features[i].end) return false; in hb_shape_plan_user_features_match()
371 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_matches() argument
373 return hb_segment_properties_equal (&shape_plan->props, &proposal->props) && in hb_shape_plan_matches()
374 hb_shape_plan_user_features_match (shape_plan, proposal) && in hb_shape_plan_matches()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1()
346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1()
379 if (group != data->proposal.dh) { in ikev2_process_kei()
382 group, data->proposal.dh); in ikev2_process_kei()
549 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret()
[all …]
Deap_ikev2.c123 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat()
166 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
192 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
253 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
Dikev2.h34 struct ikev2_proposal_data proposal; member
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys()
50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys()
51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
164 transform_id == data->proposal.encr) { in ikev2_parse_transform()
190 transform_id == data->proposal.prf) in ikev2_parse_transform()
195 transform_id == data->proposal.integ) in ikev2_parse_transform()
200 transform_id == data->proposal.dh) in ikev2_parse_transform()
355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1()
356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1()
[all …]
Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init()
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init()
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init()
103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init()
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init()
161 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg()
187 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg()
264 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv()
338 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
Dikev2.h33 struct ikev2_proposal_data proposal; member
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample34 # phase 1 proposal (for ISAKMP SA)
35 proposal {
43 # to obey the initiator's lifetime and PFS group proposal,
50 # phase 2 proposal (for IPsec SA).
51 # actual phase 2 proposal will obey the following items:
Dracoon.conf.sample-inherit22 proposal {
40 proposal {
Dracoon.conf.in66 proposal {
88 proposal {
Dracoon.conf.sample-natt79 proposal {
89 # Phase 2 proposal (for IPsec SA)
/external/ipsec-tools/src/racoon/
Dsecurity.c168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Dremoteconf.c178 new->proposal = NULL; in newrmconf()
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
469 if (rmconf->proposal == NULL) {
470 rmconf->proposal = new;
474 for (p = rmconf->proposal; p->next != NULL; p = p->next)
512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
Dhandler.c547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
675 iph2->proposal = NULL;
749 if (iph2->proposal == NULL && iph2->approval == NULL)
757 } else if (iph2->proposal != NULL) {
[all …]
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
DTODO83 o wildcard "accept any proposal" policy should be allowed.
87 - number of proposal
128 o behavior to receive multiple auth method proposals and AND proposal
/external/dagger2/
DREADME.md37 You can also learn more from [the original proposal][proposal],
129 [proposal]: https://github.com/square/dagger/issues/366
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
Dracoon.conf16 proposal {
Dracoon.conf-radius16 proposal {
/external/libxml2/result/
Ddav13.rde9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
Ddav13.rdr9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
/external/ipsec-tools/
DChangeLog119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks,
120 when malloc fails or when peer sends invalid proposal.
265 src/racoon/policy.c, src/racoon/proposal.c,
490 src/racoon/proposal.c, src/racoon/proposal.h,
500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys
536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437)
602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941)
662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for
694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
DMakefile26 src/racoon/proposal.c \

123