HomeSort by relevance Sort by last modified time
    Searched refs:iph1 (Results 1 - 25 of 26) sorted by null

1 2

  /external/ipsec-tools/src/racoon/
isakmp_ident.c 108 ident_i1send(iph1, msg)
109 struct ph1handle *iph1;
134 if (iph1->status != PHASE1ST_START) {
136 "status mismatched %d.\n", iph1->status);
141 memset(&iph1->index, 0, sizeof(iph1->index));
142 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
145 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf
    [all...]
isakmp_agg.c 111 agg_i1send(iph1, msg)
112 struct ph1handle *iph1;
142 if (iph1->status != PHASE1ST_START) {
144 "status mismatched %d.\n", iph1->status);
149 memset(&iph1->index, 0, sizeof(iph1->index));
150 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
153 if (ipsecdoi_setid1(iph1) < 0
    [all...]
isakmp_base.c 103 base_i1send(iph1, msg)
104 struct ph1handle *iph1;
131 if (iph1->status != PHASE1ST_START) {
133 "status mismatched %d.\n", iph1->status);
138 memset(&iph1->index, 0, sizeof(iph1->index));
139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
142 if (ipsecdoi_setid1(iph1) < 0
    [all...]
isakmp_newg.c 69 isakmp_newgroup_r(iph1, msg)
70 struct ph1handle *iph1;
102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
103 plog(LLV_ERROR, LOCATION, iph1->remote,
113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
114 plog(LLV_ERROR, LOCATION, iph1->remote,
126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
127 plog(LLV_ERROR, LOCATION, iph1->remote,
138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
139 plog(LLV_ERROR, LOCATION, iph1->remote
    [all...]
isakmp_inf.c 123 isakmp_info_recv(iph1, msg0)
124 struct ph1handle *iph1;
149 if (iph1->ivm == NULL) {
150 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n");
155 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid);
159 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive);
188 if (iph1->status != PHASE1ST_ESTABLISHED &&
189 iph1->status != PHASE1ST_DYING) {
232 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload);
265 switch (iph1->etype)
624 struct ph1handle *iph1; local
698 struct ph1handle *iph1 = NULL; local
829 struct ph1handle *iph1 = iph2->ph1; local
1083 struct ph1handle *iph1; local
1495 struct ph1handle *iph1 = container_of(sc, struct ph1handle, dpd_r_u); local
    [all...]
oakley.c 126 static int oakley_check_certid __P((struct ph1handle *iph1));
422 oakley_prf(key, buf, iph1)
424 struct ph1handle *iph1;
429 if (iph1->approval == NULL) {
436 type = iph1->approval->hashtype;
452 oakley_hash(buf, iph1)
454 struct ph1handle *iph1;
459 if (iph1->approval == NULL) {
466 type = iph1->approval->hashtype;
730 oakley_compute_hashx(struct ph1handle *iph1, ...
2257 struct ph1handle *iph1; member in struct:append_cr_ctx
    [all...]
isakmp_cfg.c 141 isakmp_cfg_r(iph1, msg)
142 struct ph1handle *iph1;
172 if (iph1->mode_cfg->ivm == NULL ||
173 iph1->mode_cfg->last_msgid != packet->msgid )
174 iph1->mode_cfg->ivm =
175 isakmp_cfg_newiv(iph1, packet->msgid);
176 ivm = iph1->mode_cfg->ivm;
178 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive);
230 if ((check = oakley_compute_hash1(iph1,
253 isakmp_cfg_attr_r(iph1, packet->msgid, attrpl)
    [all...]
handler.c 114 int (* enum_func)(struct ph1handle *iph1, void *arg);
239 resolveph1rmconf(iph1)
240 struct ph1handle *iph1;
245 if (iph1->side == INITIATOR)
248 rmconf = getrmconf_by_ph1(iph1);
254 if (iph1->rmconf != NULL) {
255 if (rmconf != iph1->rmconf) {
261 iph1->rmconf = rmconf;
290 * the iph1 is new, migrate all phase2s that belong to a dying or dead ph1
292 void migrate_dying_ph12(iph1)
316 struct ph1handle *iph1; local
355 struct ph1handle *iph1; local
1243 struct ph1handle *iph1; local
    [all...]
gssapi.c 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service)
162 sa = remote ? iph1->remote : iph1->local;
187 gssapi_init(struct ph1handle *iph1)
203 gssapi_set_state(iph1, gps);
205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
212 gssapi_free_state(iph1);
216 gssapi_get_default_name(iph1, 0, &princ)
    [all...]
isakmp.c 401 struct ph1handle *iph1; local
456 iph1 = getph1byindex(index);
457 if (iph1 != NULL) {
460 iph1->side == INITIATOR) {
469 if (NATT_AVAILABLE(iph1) &&
470 ! (iph1->natt_flags & NAT_PORTS_CHANGED) &&
471 ((cmpsaddr(iph1->remote, remote) != CMPSADDR_MATCH) ||
472 (cmpsaddr(iph1->local, local) != CMPSADDR_MATCH)))
475 racoon_free(iph1->remote);
476 racoon_free(iph1->local)
1040 struct ph1handle *iph1; local
1137 struct ph1handle *iph1; local
1825 struct ph1handle *iph1 = container_of(p, struct ph1handle, scr); local
2158 struct ph1handle *iph1 = NULL; local
2354 struct ph1handle *iph1; local
    [all...]
nattraversal.c 123 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr)
132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE)
136 saddr2str(addr), iph1->approval->hashtype,
163 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t));
167 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t));
180 natd = oakley_hash (buf, iph1);
187 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received,
194 if (iph1->rmconf != NULL &&
195 iph1->rmconf->nat_traversal == NATT_FORCE
    [all...]
nattraversal.h 78 vchar_t *natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr);
79 int natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, int natd_seq);
82 void natt_float_ports (struct ph1handle *iph1);
83 void natt_handle_vendorid (struct ph1handle *iph1, int vid_numeric);
93 int natt_keepalive_add_ph1 (struct ph1handle *iph1);
isakmp_unity.c 86 isakmp_unity_req(iph1, attr)
87 struct ph1handle *iph1;
93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) {
144 reply_attr = isakmp_cfg_string(iph1, attr, buf);
150 reply_attr = isakmp_cfg_short(iph1, attr,
155 reply_attr = isakmp_cfg_short(iph1, attr,
160 reply_attr = isakmp_cfg_copy(iph1, attr);
164 reply_attr = isakmp_cfg_string(iph1,
170 reply_attr = isakmp_cfg_split(iph1, attr,
178 reply_attr = isakmp_cfg_split(iph1, attr
    [all...]
isakmp_frag.c 82 isakmp_sendfrags(iph1, buf)
83 struct ph1handle *iph1;
134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG);
151 if (isakmp_send(iph1, frag) < 0) {
177 isakmp_frag_extract(iph1, msg)
178 struct ph1handle *iph1;
231 if (iph1->frag_chain == NULL) {
232 iph1->frag_chain = item;
236 current = iph1->frag_chain;
248 item = iph1->frag_chain
    [all...]
isakmp_xauth.c 121 xauth_sendreq(iph1)
122 struct ph1handle *iph1;
129 struct xauth_state *xst = &iph1->mode_cfg->xauth;
133 if (iph1->status < PHASE1ST_ESTABLISHED) {
176 isakmp_cfg_send(iph1, buffer,
187 xauth_attr_reply(iph1, attr, id)
188 struct ph1handle *iph1;
195 struct xauth_state *xst = &iph1->mode_cfg->xauth;
197 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) {
266 strncpy(iph1->mode_cfg->login, usr, LOGINLEN)
363 struct ph1handle *iph1; local
    [all...]
rsalist.c 187 struct ph1handle *iph1; member in struct:lookup_result
199 local_score = naddr_score(key->src, req->iph1->local);
200 remote_score = naddr_score(key->dst, req->iph1->remote);
222 rsa_lookup_keys(struct ph1handle *iph1, int my)
228 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote));
230 r.iph1 = iph1;
235 list = iph1->rmconf->rsa_private;
237 list = iph1->rmconf->rsa_public
    [all...]
vendorid.c 252 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen)
260 iph1->vendorid_mask |= BIT(vid_numeric);
264 natt_handle_vendorid(iph1, vid_numeric);
269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH;
272 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY;
280 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
281 iph1->dpd_support = 1;
admin.c 170 static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg)
172 if (iph1->status >= PHASE1ST_ESTABLISHED)
173 isakmp_info_send_d1(iph1);
174 purge_remote(iph1);
257 struct ph1handle *iph1; local
268 iph1 = getph1byaddr(src, dst, 0);
269 if (iph1 == NULL) {
274 if (iph1->cert_p != NULL) {
276 tmp.v = iph1->cert_p->v + 1;
277 tmp.l = iph1->cert_p->l - 1
330 struct ph1handle *iph1; local
352 struct ph1handle *iph1; local
    [all...]
rsalist.h 60 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
remoteconf.c 294 void rmconf_selector_from_ph1(rmsel, iph1)
296 struct ph1handle *iph1;
300 rmsel->remote = iph1->remote;
301 rmsel->etype = iph1->etype;
302 rmsel->approval = iph1->approval;
303 rmsel->identity = iph1->id_p;
304 rmsel->certificate_request = iph1->cr_p;
427 getrmconf_by_ph1(iph1)
428 struct ph1handle *iph1;
433 rmconf_selector_from_ph1(&ctx.sel, iph1);
    [all...]
ipsec_doi.c 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
174 ipsecdoi_checkph1proposal(sa, iph1)
176 struct ph1handle *iph1;
189 newsa = get_ph1approval(iph1, doitype, sittype, pair);
195 iph1->sa_ret = newsa;
241 get_ph1approval(iph1, doitype, sittype, pair)
242 struct ph1handle *iph1;
254 rmsel.remote = iph1->remote;
256 if (iph1->approval) {
257 delisakmpsa(iph1->approval)
    [all...]
remoteconf.h 187 struct ph1handle *iph1));
200 extern struct remoteconf *getrmconf_by_ph1 __P((struct ph1handle *iph1));
isakmp_var.h 123 struct ph1handle *iph1));
handler.h 467 int (* enum_func)(struct ph1handle *iph1, void *arg),
487 extern void migrate_dying_ph12 __P((struct ph1handle *iph1));
pfkey.c 2985 struct ph1handle *iph1; local
3316 struct ph1handle *iph1; local
3371 struct ph1handle *iph1; local
    [all...]

Completed in 7174 milliseconds

1 2