/external/ipsec-tools/src/racoon/ |
isakmp_ident.c | 108 ident_i1send(iph1, msg) 109 struct ph1handle *iph1; 134 if (iph1->status != PHASE1ST_START) { 136 "status mismatched %d.\n", iph1->status); 141 memset(&iph1->index, 0, sizeof(iph1->index)); 142 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 145 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf [all...] |
isakmp_agg.c | 111 agg_i1send(iph1, msg) 112 struct ph1handle *iph1; 142 if (iph1->status != PHASE1ST_START) { 144 "status mismatched %d.\n", iph1->status); 149 memset(&iph1->index, 0, sizeof(iph1->index)); 150 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 153 if (ipsecdoi_setid1(iph1) < 0 [all...] |
isakmp_base.c | 103 base_i1send(iph1, msg) 104 struct ph1handle *iph1; 131 if (iph1->status != PHASE1ST_START) { 133 "status mismatched %d.\n", iph1->status); 138 memset(&iph1->index, 0, sizeof(iph1->index)); 139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 142 if (ipsecdoi_setid1(iph1) < 0 [all...] |
isakmp_newg.c | 69 isakmp_newgroup_r(iph1, msg) 70 struct ph1handle *iph1; 102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 103 plog(LLV_ERROR, LOCATION, iph1->remote, 113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 114 plog(LLV_ERROR, LOCATION, iph1->remote, 126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 127 plog(LLV_ERROR, LOCATION, iph1->remote, 138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 139 plog(LLV_ERROR, LOCATION, iph1->remote [all...] |
isakmp_inf.c | 123 isakmp_info_recv(iph1, msg0) 124 struct ph1handle *iph1; 149 if (iph1->ivm == NULL) { 150 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n"); 155 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid); 159 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive); 188 if (iph1->status != PHASE1ST_ESTABLISHED && 189 iph1->status != PHASE1ST_DYING) { 232 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload); 265 switch (iph1->etype) 624 struct ph1handle *iph1; local 698 struct ph1handle *iph1 = NULL; local 829 struct ph1handle *iph1 = iph2->ph1; local 1083 struct ph1handle *iph1; local 1495 struct ph1handle *iph1 = container_of(sc, struct ph1handle, dpd_r_u); local [all...] |
oakley.c | 126 static int oakley_check_certid __P((struct ph1handle *iph1)); 422 oakley_prf(key, buf, iph1) 424 struct ph1handle *iph1; 429 if (iph1->approval == NULL) { 436 type = iph1->approval->hashtype; 452 oakley_hash(buf, iph1) 454 struct ph1handle *iph1; 459 if (iph1->approval == NULL) { 466 type = iph1->approval->hashtype; 730 oakley_compute_hashx(struct ph1handle *iph1, ... 2257 struct ph1handle *iph1; member in struct:append_cr_ctx [all...] |
isakmp_cfg.c | 141 isakmp_cfg_r(iph1, msg) 142 struct ph1handle *iph1; 172 if (iph1->mode_cfg->ivm == NULL || 173 iph1->mode_cfg->last_msgid != packet->msgid ) 174 iph1->mode_cfg->ivm = 175 isakmp_cfg_newiv(iph1, packet->msgid); 176 ivm = iph1->mode_cfg->ivm; 178 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive); 230 if ((check = oakley_compute_hash1(iph1, 253 isakmp_cfg_attr_r(iph1, packet->msgid, attrpl) [all...] |
handler.c | 114 int (* enum_func)(struct ph1handle *iph1, void *arg); 239 resolveph1rmconf(iph1) 240 struct ph1handle *iph1; 245 if (iph1->side == INITIATOR) 248 rmconf = getrmconf_by_ph1(iph1); 254 if (iph1->rmconf != NULL) { 255 if (rmconf != iph1->rmconf) { 261 iph1->rmconf = rmconf; 290 * the iph1 is new, migrate all phase2s that belong to a dying or dead ph1 292 void migrate_dying_ph12(iph1) 316 struct ph1handle *iph1; local 355 struct ph1handle *iph1; local 1243 struct ph1handle *iph1; local [all...] |
gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) 162 sa = remote ? iph1->remote : iph1->local; 187 gssapi_init(struct ph1handle *iph1) 203 gssapi_set_state(iph1, gps); 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 212 gssapi_free_state(iph1); 216 gssapi_get_default_name(iph1, 0, &princ) [all...] |
isakmp.c | 401 struct ph1handle *iph1; local 456 iph1 = getph1byindex(index); 457 if (iph1 != NULL) { 460 iph1->side == INITIATOR) { 469 if (NATT_AVAILABLE(iph1) && 470 ! (iph1->natt_flags & NAT_PORTS_CHANGED) && 471 ((cmpsaddr(iph1->remote, remote) != CMPSADDR_MATCH) || 472 (cmpsaddr(iph1->local, local) != CMPSADDR_MATCH))) 475 racoon_free(iph1->remote); 476 racoon_free(iph1->local) 1040 struct ph1handle *iph1; local 1137 struct ph1handle *iph1; local 1825 struct ph1handle *iph1 = container_of(p, struct ph1handle, scr); local 2158 struct ph1handle *iph1 = NULL; local 2354 struct ph1handle *iph1; local [all...] |
nattraversal.c | 123 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr) 132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE) 136 saddr2str(addr), iph1->approval->hashtype, 163 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t)); 167 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t)); 180 natd = oakley_hash (buf, iph1); 187 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, 194 if (iph1->rmconf != NULL && 195 iph1->rmconf->nat_traversal == NATT_FORCE [all...] |
nattraversal.h | 78 vchar_t *natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr); 79 int natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, int natd_seq); 82 void natt_float_ports (struct ph1handle *iph1); 83 void natt_handle_vendorid (struct ph1handle *iph1, int vid_numeric); 93 int natt_keepalive_add_ph1 (struct ph1handle *iph1);
|
isakmp_unity.c | 86 isakmp_unity_req(iph1, attr) 87 struct ph1handle *iph1; 93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) { 144 reply_attr = isakmp_cfg_string(iph1, attr, buf); 150 reply_attr = isakmp_cfg_short(iph1, attr, 155 reply_attr = isakmp_cfg_short(iph1, attr, 160 reply_attr = isakmp_cfg_copy(iph1, attr); 164 reply_attr = isakmp_cfg_string(iph1, 170 reply_attr = isakmp_cfg_split(iph1, attr, 178 reply_attr = isakmp_cfg_split(iph1, attr [all...] |
isakmp_frag.c | 82 isakmp_sendfrags(iph1, buf) 83 struct ph1handle *iph1; 134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG); 151 if (isakmp_send(iph1, frag) < 0) { 177 isakmp_frag_extract(iph1, msg) 178 struct ph1handle *iph1; 231 if (iph1->frag_chain == NULL) { 232 iph1->frag_chain = item; 236 current = iph1->frag_chain; 248 item = iph1->frag_chain [all...] |
isakmp_xauth.c | 121 xauth_sendreq(iph1) 122 struct ph1handle *iph1; 129 struct xauth_state *xst = &iph1->mode_cfg->xauth; 133 if (iph1->status < PHASE1ST_ESTABLISHED) { 176 isakmp_cfg_send(iph1, buffer, 187 xauth_attr_reply(iph1, attr, id) 188 struct ph1handle *iph1; 195 struct xauth_state *xst = &iph1->mode_cfg->xauth; 197 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) { 266 strncpy(iph1->mode_cfg->login, usr, LOGINLEN) 363 struct ph1handle *iph1; local [all...] |
rsalist.c | 187 struct ph1handle *iph1; member in struct:lookup_result 199 local_score = naddr_score(key->src, req->iph1->local); 200 remote_score = naddr_score(key->dst, req->iph1->remote); 222 rsa_lookup_keys(struct ph1handle *iph1, int my) 228 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote)); 230 r.iph1 = iph1; 235 list = iph1->rmconf->rsa_private; 237 list = iph1->rmconf->rsa_public [all...] |
vendorid.c | 252 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen) 260 iph1->vendorid_mask |= BIT(vid_numeric); 264 natt_handle_vendorid(iph1, vid_numeric); 269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH; 272 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY; 280 (iph1->rmconf == NULL || iph1->rmconf->dpd)) { 281 iph1->dpd_support = 1;
|
admin.c | 170 static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg) 172 if (iph1->status >= PHASE1ST_ESTABLISHED) 173 isakmp_info_send_d1(iph1); 174 purge_remote(iph1); 257 struct ph1handle *iph1; local 268 iph1 = getph1byaddr(src, dst, 0); 269 if (iph1 == NULL) { 274 if (iph1->cert_p != NULL) { 276 tmp.v = iph1->cert_p->v + 1; 277 tmp.l = iph1->cert_p->l - 1 330 struct ph1handle *iph1; local 352 struct ph1handle *iph1; local [all...] |
rsalist.h | 60 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
|
remoteconf.c | 294 void rmconf_selector_from_ph1(rmsel, iph1) 296 struct ph1handle *iph1; 300 rmsel->remote = iph1->remote; 301 rmsel->etype = iph1->etype; 302 rmsel->approval = iph1->approval; 303 rmsel->identity = iph1->id_p; 304 rmsel->certificate_request = iph1->cr_p; 427 getrmconf_by_ph1(iph1) 428 struct ph1handle *iph1; 433 rmconf_selector_from_ph1(&ctx.sel, iph1); [all...] |
ipsec_doi.c | 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 174 ipsecdoi_checkph1proposal(sa, iph1) 176 struct ph1handle *iph1; 189 newsa = get_ph1approval(iph1, doitype, sittype, pair); 195 iph1->sa_ret = newsa; 241 get_ph1approval(iph1, doitype, sittype, pair) 242 struct ph1handle *iph1; 254 rmsel.remote = iph1->remote; 256 if (iph1->approval) { 257 delisakmpsa(iph1->approval) [all...] |
remoteconf.h | 187 struct ph1handle *iph1)); 200 extern struct remoteconf *getrmconf_by_ph1 __P((struct ph1handle *iph1));
|
isakmp_var.h | 123 struct ph1handle *iph1));
|
handler.h | 467 int (* enum_func)(struct ph1handle *iph1, void *arg), 487 extern void migrate_dying_ph12 __P((struct ph1handle *iph1));
|
pfkey.c | 2985 struct ph1handle *iph1; local 3316 struct ph1handle *iph1; local 3371 struct ph1handle *iph1; local [all...] |