Searched refs:proposal (Results 1 - 25 of 46) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
279 "in proposal");
353 os_memcpy(&data->proposal, &prop, sizeof(prop));
367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
279 "in proposal");
353 os_memcpy(&data->proposal, &prop, sizeof(prop));
367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c45 integ = ikev2_get_integ(data->proposal.integ);
46 prf = ikev2_get_prf(data->proposal.prf);
47 encr = ikev2_get_encr(data->proposal.encr);
49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
279 "in proposal");
353 os_memcpy(&data->proposal, &prop, sizeof(prop));
367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #
[all...]
H A Dikev2.h34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
/external/harfbuzz_ng/src/
H A Dhb-shape-plan.cc234 const hb_shape_plan_proposal_t *proposal)
236 return hb_segment_properties_equal (&shape_plan->props, &proposal->props) &&
237 ((shape_plan->default_shaper_list && proposal->shaper_list == NULL) ||
238 (shape_plan->shaper_func == proposal->shaper_func));
251 hb_shape_plan_proposal_t proposal = {
262 proposal.shaper_func = _hb_##shaper##_shape; \
276 if (unlikely (!proposal.shaper_list))
284 if (hb_shape_plan_matches (node->shape_plan, &proposal))
233 hb_shape_plan_matches(const hb_shape_plan_t *shape_plan, const hb_shape_plan_proposal_t *proposal) argument
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
H A Dracoon.conf18 proposal {
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
H A Dracoon.conf16 proposal {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
158 integ = ikev2_get_integ(data->ikev2.proposal.integ);
184 ikev2_integ_hash(data->ikev2.proposal.integ,
260 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
328 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
158 integ = ikev2_get_integ(data->ikev2.proposal.integ);
184 ikev2_integ_hash(data->ikev2.proposal.integ,
260 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
328 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c49 integ = ikev2_get_integ(data->proposal.integ);
50 prf = ikev2_get_prf(data->proposal.prf);
51 encr = ikev2_get_encr(data->proposal.encr);
53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
164 transform_id == data->proposal.encr) {
190 transform_id == data->proposal.prf)
195 transform_id == data->proposal.integ)
200 transform_id == data->proposal.dh)
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt
[all...]
H A Deap_server_ikev2.c100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
158 integ = ikev2_get_integ(data->ikev2.proposal.integ);
184 ikev2_integ_hash(data->ikev2.proposal.integ,
260 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
328 data->ikev2.proposal.prf, &data->ikev2.keys,
H A Dikev2.h33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
/external/ipsec-tools/src/racoon/
H A Doakley.h234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
H A Dsecurity.c55 #include "proposal.h"
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
105 "invalid proposal with length %d\n", pa->len);
110 /* our first proposal */
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
H A Dremoteconf.c71 #include "proposal.h"
178 new->proposal = NULL;
277 // FIXME: We should duplicate the proposal as well.
279 // new->proposal = ...;
313 if (rmconf->proposal)
314 delisakmpsa(rmconf->proposal);
446 * filled in for real when the ISAKMP proposal is configured.
471 if (rmconf->proposal == NULL) {
472 rmconf->proposal = new;
476 for (p = rmconf->proposal;
[all...]
H A Dhandler.c62 #include "proposal.h"
547 if (iph2->proposal == NULL && iph2->approval == NULL)
557 } else if (iph2->proposal != NULL) {
558 for (pr = iph2->proposal->head; pr != NULL;
592 * SPI in the proposal is cleared.
605 /* clear spi, keep variables in the proposal */
606 if (iph2->proposal) {
608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next)
673 if (iph2->proposal) {
674 flushsaprop(iph2->proposal);
[all...]
/external/openssh/
H A Dkex.c93 /* put algorithm proposal into buffer */
95 kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) argument
107 buffer_put_cstring(b, proposal[i]);
112 /* parse buffer and return algorithm proposal */
118 char **proposal; local
120 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *));
127 /* extract kex init proposal strings */
129 proposal[i] = buffer_get_cstring(&b,NULL);
130 debug2("kex_parse_kexinit: %s", proposal[i]);
140 return proposal;
144 kex_prop_free(char **proposal) argument
253 kex_setup(char *proposal[PROPOSAL_MAX]) argument
[all...]
/external/ipsec-tools/
H A DMakefile26 src/racoon/proposal.c \
H A DAndroid.mk42 src/racoon/proposal.c \

Completed in 290 milliseconds

12