/external/ipsec-tools/src/racoon/ |
sainfo.h | 1 /* $NetBSD: sainfo.h,v 1.8 2011/02/02 15:21:34 vanhu Exp $ */ 3 /* Id: sainfo.h,v 1.5 2006/07/09 17:19:38 manubsd Exp */ 43 struct sainfo { struct 65 LIST_ENTRY(sainfo) chain; 75 extern struct sainfo *getsainfo __P((const vchar_t *, 77 extern struct sainfo *newsainfo __P((void)); 78 extern void delsainfo __P((struct sainfo *)); 79 extern void inssainfo __P((struct sainfo *)); 80 extern void remsainfo __P((struct sainfo *)); 86 extern const char * sainfo2str __P((const struct sainfo *)); [all...] |
sainfo.c | 1 /* $NetBSD: sainfo.c,v 1.14 2011/02/02 15:21:34 vanhu Exp $ */ 3 /* $KAME: sainfo.c,v 1.16 2003/06/27 07:32:39 sakane Exp $ */ 64 #include "sainfo.h" 67 typedef LIST_HEAD(_sitree, sainfo) sainfo_tailq_head_t; 77 * First pass is for sainfo from a specified peer, second for others. 79 struct sainfo * 84 struct sainfo *s = NULL; 125 "evaluating sainfo: %s\n", sainfostr); 142 * This sainfo section enforces client address 154 * with another sainfo to check for duplicate [all...] |
proposal.h | 184 struct sainfo; 198 extern int set_satrnsbysainfo __P((struct saproto *, struct sainfo *));
|
proposal.c | 63 #include "sainfo.h" 637 set_satrnsbysainfo(pr, sainfo) 639 struct sainfo *sainfo; 647 if (sainfo->algs[algclass_ipsec_auth] == NULL) { 653 for (a = sainfo->algs[algclass_ipsec_auth]; a; a = a->next) { 674 if (sainfo->algs[algclass_ipsec_enc] == NULL) { 680 for (a = sainfo->algs[algclass_ipsec_enc]; a; a = a->next) { 681 for (b = sainfo->algs[algclass_ipsec_auth]; b; b = b->next) { 700 if (sainfo->algs[algclass_ipsec_comp] == NULL) [all...] |
handler.c | 78 #include "sainfo.h" 1241 struct sainfo *sainfo; local 1246 * Get the new sainfo using values of the old one 1248 if (iph2->sainfo != NULL) { 1249 iph2->sainfo = getsainfo(iph2->sainfo->idsrc, 1250 iph2->sainfo->iddst, iph2->sainfo->id_i, 1251 NULL, iph2->sainfo->remoteid) [all...] |
handler.h | 279 * tunnel, they are compared to sainfo selectors. 320 struct sainfo *sainfo; /* place holder of sainfo */ member in struct:ph2handle
|
isakmp_quick.c | 83 #include "sainfo.h" 1344 /* get sainfo */ 1348 "failed to get sainfo.\n"); [all...] |
cfparse.y | 73 #include "sainfo.h" 142 static struct sainfo *cur_sainfo; 216 /* sainfo */ 217 %token SAINFO FROM 1225 /* sainfo */ 1227 : SAINFO 1231 yyerror("failed to allocate sainfo"); 1237 struct sainfo *check; 1265 yyerror("duplicated sainfo: %s", [all...] |
ipsec_doi.c | 77 #include "sainfo.h" [all...] |
isakmp.c | 94 #include "sainfo.h" [all...] |
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 27 sainfo anonymous {
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 35 sainfo anonymous {
|
/external/ipsec-tools/ |
setup.c | 46 #include "sainfo.h" 58 static struct sainfo sainfo; variable in typeref:struct:sainfo 80 if (!sainfo.algs[class]) { 81 sainfo.algs[class] = p; 83 struct sainfoalg *q = sainfo.algs[class]; 142 sainfo.lifetime = IPSECDOI_ATTR_SA_LD_SEC_DEFAULT; 143 sainfo.lifebyte = IPSECDOI_ATTR_SA_LD_KB_MAX; 658 /* sainfo.h */ 660 struct sainfo *getsainfo(const vchar_t *src, const vchar_t *dst [all...] |