/external/harfbuzz_ng/src/ |
D | hb-shape-plan.cc | 358 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_user_features_match() argument 360 if (proposal->num_user_features != shape_plan->num_user_features) return false; in hb_shape_plan_user_features_match() 361 for (unsigned int i = 0, n = proposal->num_user_features; i < n; i++) in hb_shape_plan_user_features_match() 362 if (proposal->user_features[i].tag != shape_plan->user_features[i].tag || in hb_shape_plan_user_features_match() 363 proposal->user_features[i].value != shape_plan->user_features[i].value || in hb_shape_plan_user_features_match() 364 proposal->user_features[i].start != shape_plan->user_features[i].start || in hb_shape_plan_user_features_match() 365 proposal->user_features[i].end != shape_plan->user_features[i].end) return false; in hb_shape_plan_user_features_match() 371 const hb_shape_plan_proposal_t *proposal) in hb_shape_plan_matches() argument 373 return hb_segment_properties_equal (&shape_plan->props, &proposal->props) && in hb_shape_plan_matches() 374 hb_shape_plan_user_features_match (shape_plan, proposal) && in hb_shape_plan_matches() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 46 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 327 os_memcpy(&data->proposal, &prop, sizeof(prop)); in ikev2_process_sai1() 346 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 348 data->proposal.integ, data->proposal.dh); in ikev2_process_sai1() 379 if (group != data->proposal.dh) { in ikev2_process_kei() 382 group, data->proposal.dh); in ikev2_process_kei() 549 if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, in ikev2_process_auth_secret() [all …]
|
D | eap_ikev2.c | 123 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_peer_keymat() 166 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 192 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 253 data->ikev2.proposal.integ, &data->ikev2.keys, 1, in eap_ikev2_process_icv()
|
D | ikev2.h | 34 struct ikev2_proposal_data proposal; member
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); in ikev2_derive_keys() 50 prf = ikev2_get_prf(data->proposal.prf); in ikev2_derive_keys() 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 190 transform_id == data->proposal.prf) in ikev2_parse_transform() 195 transform_id == data->proposal.integ) in ikev2_parse_transform() 200 transform_id == data->proposal.dh) in ikev2_parse_transform() 355 "INTEG:%d D-H:%d", data->proposal.proposal_num, in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 357 data->proposal.integ, data->proposal.dh); in ikev2_process_sar1() [all …]
|
D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; in eap_ikev2_init() 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; in eap_ikev2_init() 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; in eap_ikev2_init() 103 data->ikev2.proposal.encr = ENCR_AES_CBC; in eap_ikev2_init() 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; in eap_ikev2_init() 161 integ = ikev2_get_integ(data->ikev2.proposal.integ); in eap_ikev2_build_msg() 187 ikev2_integ_hash(data->ikev2.proposal.integ, in eap_ikev2_build_msg() 264 data->ikev2.proposal.integ, &data->ikev2.keys, 0, in eap_ikev2_process_icv() 338 data->ikev2.proposal.prf, &data->ikev2.keys, in eap_ikev2_server_keymat()
|
D | ikev2.h | 33 struct ikev2_proposal_data proposal; member
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 34 # phase 1 proposal (for ISAKMP SA) 35 proposal { 43 # to obey the initiator's lifetime and PFS group proposal, 50 # phase 2 proposal (for IPsec SA). 51 # actual phase 2 proposal will obey the following items:
|
D | racoon.conf.sample-inherit | 22 proposal { 40 proposal {
|
D | racoon.conf.in | 66 proposal { 88 proposal {
|
D | racoon.conf.sample-natt | 79 proposal { 89 # Phase 2 proposal (for IPsec SA)
|
/external/ipsec-tools/src/racoon/ |
D | security.c | 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
D | oakley.h | 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
D | remoteconf.c | 178 new->proposal = NULL; in newrmconf() 313 if (rmconf->proposal) 314 delisakmpsa(rmconf->proposal); 469 if (rmconf->proposal == NULL) { 470 rmconf->proposal = new; 474 for (p = rmconf->proposal; p->next != NULL; p = p->next) 512 struct isakmpsa *prop = p->proposal; in dump_rmconf_single()
|
D | handler.c | 547 if (iph2->proposal == NULL && iph2->approval == NULL) 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 606 if (iph2->proposal) { 608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 673 if (iph2->proposal) { 674 flushsaprop(iph2->proposal); 675 iph2->proposal = NULL; 749 if (iph2->proposal == NULL && iph2->approval == NULL) 757 } else if (iph2->proposal != NULL) { [all …]
|
D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init() 206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init() 207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init() 692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id() 693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
|
D | TODO | 83 o wildcard "accept any proposal" policy should be allowed. 87 - number of proposal 128 o behavior to receive multiple auth method proposals and AND proposal
|
/external/dagger2/ |
D | README.md | 37 You can also learn more from [the original proposal][proposal], 129 [proposal]: https://github.com/square/dagger/issues/366
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
D | racoon.conf | 18 proposal {
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
D | racoon.conf | 16 proposal {
|
D | racoon.conf-radius | 16 proposal {
|
/external/libxml2/result/ |
D | dav13.rde | 9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
|
D | dav13.rdr | 9 http://webdav.sb.aol.com/workspace/webdav/proposal.doc
|
/external/ipsec-tools/ |
D | ChangeLog | 119 * src/racoon/proposal.c: From Kohki Ohhira: fix some memory leaks, 120 when malloc fails or when peer sends invalid proposal. 265 src/racoon/policy.c, src/racoon/proposal.c, 490 src/racoon/proposal.c, src/racoon/proposal.h, 500 * src/racoon/: proposal.c, proposal.h, racoon.conf.5: Check keys 536 * src/racoon/proposal.c: Fix memory leak (Coverity 3438 and 3437) 602 * src/racoon/proposal.c: Don't use NULL pointer (Coverity 941) 662 * src/racoon/: pfkey.c, proposal.c: fix SA bundle (e.g.: for 694 * src/racoon/proposal.c: From Yves-Alexis Perez: fixes default
|
D | Makefile | 26 src/racoon/proposal.c \
|