/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 279 "in proposal"); 353 os_memcpy(&data->proposal, &prop, sizeof(prop)); 367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 279 "in proposal"); 353 os_memcpy(&data->proposal, &prop, sizeof(prop)); 367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 45 integ = ikev2_get_integ(data->proposal.integ); 46 prf = ikev2_get_prf(data->proposal.prf); 47 encr = ikev2_get_encr(data->proposal.encr); 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 279 "in proposal"); 353 os_memcpy(&data->proposal, &prop, sizeof(prop)); 367 wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal # [all...] |
H A D | ikev2.h | 34 struct ikev2_proposal_data proposal; member in struct:ikev2_responder_data
|
/external/harfbuzz_ng/src/ |
H A D | hb-shape-plan.cc | 234 const hb_shape_plan_proposal_t *proposal) 236 return hb_segment_properties_equal (&shape_plan->props, &proposal->props) && 237 ((shape_plan->default_shaper_list && proposal->shaper_list == NULL) || 238 (shape_plan->shaper_func == proposal->shaper_func)); 251 hb_shape_plan_proposal_t proposal = { 262 proposal.shaper_func = _hb_##shaper##_shape; \ 276 if (unlikely (!proposal.shaper_list)) 284 if (hb_shape_plan_matches (node->shape_plan, &proposal)) 233 hb_shape_plan_matches(const hb_shape_plan_t *shape_plan, const hb_shape_plan_proposal_t *proposal) argument
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 18 proposal {
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 16 proposal {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 158 integ = ikev2_get_integ(data->ikev2.proposal.integ); 184 ikev2_integ_hash(data->ikev2.proposal.integ, 260 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 158 integ = ikev2_get_integ(data->ikev2.proposal.integ); 184 ikev2_integ_hash(data->ikev2.proposal.integ, 260 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 49 integ = ikev2_get_integ(data->proposal.integ); 50 prf = ikev2_get_prf(data->proposal.prf); 51 encr = ikev2_get_encr(data->proposal.encr); 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 164 transform_id == data->proposal.encr) { 190 transform_id == data->proposal.prf) 195 transform_id == data->proposal.integ) 200 transform_id == data->proposal.dh) 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal lengt [all...] |
H A D | eap_server_ikev2.c | 100 data->ikev2.proposal.proposal_num = 1; 101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96; 102 data->ikev2.proposal.prf = PRF_HMAC_SHA1; 103 data->ikev2.proposal.encr = ENCR_AES_CBC; 104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP; 158 integ = ikev2_get_integ(data->ikev2.proposal.integ); 184 ikev2_integ_hash(data->ikev2.proposal.integ, 260 data->ikev2.proposal.integ, &data->ikev2.keys, 0, 328 data->ikev2.proposal.prf, &data->ikev2.keys,
|
H A D | ikev2.h | 33 struct ikev2_proposal_data proposal; member in struct:ikev2_initiator_data
|
/external/ipsec-tools/src/racoon/ |
H A D | oakley.h | 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
H A D | security.c | 55 #include "proposal.h" 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 105 "invalid proposal with length %d\n", pa->len); 110 /* our first proposal */ 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
H A D | remoteconf.c | 71 #include "proposal.h" 178 new->proposal = NULL; 277 // FIXME: We should duplicate the proposal as well. 279 // new->proposal = ...; 313 if (rmconf->proposal) 314 delisakmpsa(rmconf->proposal); 446 * filled in for real when the ISAKMP proposal is configured. 471 if (rmconf->proposal == NULL) { 472 rmconf->proposal = new; 476 for (p = rmconf->proposal; [all...] |
H A D | handler.c | 62 #include "proposal.h" 547 if (iph2->proposal == NULL && iph2->approval == NULL) 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 592 * SPI in the proposal is cleared. 605 /* clear spi, keep variables in the proposal */ 606 if (iph2->proposal) { 608 for (pr = iph2->proposal->head; pr != NULL; pr = pr->next) 673 if (iph2->proposal) { 674 flushsaprop(iph2->proposal); [all...] |
/external/openssh/ |
H A D | kex.c | 93 /* put algorithm proposal into buffer */ 95 kex_prop2buf(Buffer *b, char *proposal[PROPOSAL_MAX]) argument 107 buffer_put_cstring(b, proposal[i]); 112 /* parse buffer and return algorithm proposal */ 118 char **proposal; local 120 proposal = xcalloc(PROPOSAL_MAX, sizeof(char *)); 127 /* extract kex init proposal strings */ 129 proposal[i] = buffer_get_cstring(&b,NULL); 130 debug2("kex_parse_kexinit: %s", proposal[i]); 140 return proposal; 144 kex_prop_free(char **proposal) argument 253 kex_setup(char *proposal[PROPOSAL_MAX]) argument [all...] |
/external/ipsec-tools/ |
H A D | Makefile | 26 src/racoon/proposal.c \
|
H A D | Android.mk | 42 src/racoon/proposal.c \
|