HomeSort by relevance Sort by last modified time
    Searched refs:lcconf (Results 1 - 20 of 20) sorted by null

  /external/ipsec-tools/src/racoon/
localconf.c 66 struct localconf *lcconf; variable in typeref:struct:localconf
73 lcconf = racoon_calloc(1, sizeof(*lcconf));
74 if (lcconf == NULL)
79 lcconf->racoon_conf = LC_DEFAULT_CF;
91 if (lcconf->pathinfo[i]) {
92 racoon_free(lcconf->pathinfo[i]);
93 lcconf->pathinfo[i] = NULL;
101 lcconf->uid = 0;
102 lcconf->gid = 0
    [all...]
main.c 202 lcconf->port_isakmp = atoi(optarg);
205 lcconf->port_isakmp_natt = atoi(optarg);
208 lcconf->racoon_conf = optarg;
240 lcconf->default_af = AF_INET;
243 lcconf->default_af = AF_INET6;
312 lcconf->racoon_conf);
backupsa.c 178 if (safefile(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 1) != 0 ||
179 (fp = fopen(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], "a")) == NULL) {
182 lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]);
210 if (safefile(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 1) == 0)
211 fp = fopen(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], "r");
217 lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]);
234 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA],
290 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA],
298 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]);
306 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA],
    [all...]
admin.c 111 so2 = accept(lcconf->sock_admin, (struct sockaddr *)&from, &fromlen);
696 lcconf->sock_admin = -1;
705 lcconf->sock_admin = socket(AF_UNIX, SOCK_STREAM, 0);
706 if (lcconf->sock_admin == -1) {
711 close_on_exec(lcconf->sock_admin);
714 if (bind(lcconf->sock_admin, (struct sockaddr *)&sunaddr,
719 (void)close(lcconf->sock_admin);
728 (void)close(lcconf->sock_admin);
736 (void)close(lcconf->sock_admin);
740 if (listen(lcconf->sock_admin, 5) != 0)
    [all...]
grabmyaddr.c 170 set_port(addr, lcconf->port_isakmp);
173 set_port(addr, lcconf->port_isakmp_natt);
245 if (!lcconf->strict_address) {
296 if (!lcconf->strict_address) {
297 lcconf->rtsock = kernel_open_socket();
298 if (lcconf->rtsock < 0)
300 monitor_fd(lcconf->rtsock, kernel_receive, NULL, 0);
302 lcconf->rtsock = -1;
314 if (lcconf->rtsock != -1) {
315 unmonitor_fd(lcconf->rtsock)
    [all...]
session.c 254 if (lcconf->pathinfo[LC_PATHTYPE_PIDFILE] == NULL)
256 else if (lcconf->pathinfo[LC_PATHTYPE_PIDFILE][0] == '/')
257 strlcpy(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN);
260 strlcat(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN);
343 pfkey_send_flush(lcconf->sock_pfkey, SADB_SATYPE_UNSPEC);
394 /* TODO: save / restore / flush old lcconf (?) / rmtree
534 pfkey_close(lcconf->sock_pfkey);
localconf.h 118 extern struct localconf *lcconf;
privsep.c 203 if (lcconf->uid == 0)
211 if ((lcconf->pathinfo[LC_PATHTYPE_CERT] == NULL) ||
212 (lcconf->pathinfo[LC_PATHTYPE_SCRIPT] == NULL)) {
234 if (lcconf->chroot != NULL) {
235 if (chdir(lcconf->chroot) != 0) {
237 "Cannot chdir(%s): %s\n", lcconf->chroot,
241 if (chroot(lcconf->chroot) != 0) {
243 "Cannot chroot(%s): %s\n", lcconf->chroot,
249 if (setgid(lcconf->gid) != 0) {
251 "Cannot setgid(%d): %s\n", lcconf->gid
    [all...]
nattraversal.c 254 opts->float_port = lcconf->port_isakmp_natt;
266 opts->float_port = lcconf->port_isakmp_natt;
274 opts->float_port = lcconf->port_isakmp_natt;
382 sched_schedule (&sc_natt, lcconf->natt_ka_interval, natt_keepalive_send);
391 if (lcconf->natt_ka_interval > 0)
392 sched_schedule (&sc_natt, lcconf->natt_ka_interval, natt_keepalive_send);
cfparse.y 305 lcconf->uid = pw->pw_uid;
308 | USER NUMBER { lcconf->uid = $2; } EOS
317 lcconf->gid = gr->gr_gid;
320 | GROUP NUMBER { lcconf->gid = $2; } EOS
321 | CHROOT QUOTEDSTRING { lcconf->chroot = $2->v; } EOS
334 if (lcconf->pathinfo[$2])
335 racoon_free(lcconf->pathinfo[$2]);
338 lcconf->pathinfo[$2] = racoon_strdup($3->v);
339 STRDUP_FATAL(lcconf->pathinfo[$2]);
347 : COMPLEX_BUNDLE SWITCH { lcconf->complex_bundle = $2; } EO
    [all...]
pfkey.c 321 if ((bufsiz = pfkey_set_buffer_size(s, lcconf->pfkey_buffer_size)) < 0) {
324 lcconf->pfkey_buffer_size, ipsec_strerror());
326 } else if (bufsiz < lcconf->pfkey_buffer_size) {
329 bufsiz, lcconf->pfkey_buffer_size);
401 if (pfkey_send_flush(lcconf->sock_pfkey, satype) < 0) {
434 if ((lcconf->sock_pfkey = pfkey_open()) < 0) {
439 if ((bufsiz = pfkey_set_buffer_size(lcconf->sock_pfkey,
440 lcconf->pfkey_buffer_size)) < 0) {
443 lcconf->pfkey_buffer_size, ipsec_strerror());
445 } else if (bufsiz < lcconf->pfkey_buffer_size)
    [all...]
handler.c 1070 r->local, r->remote, lcconf->count_persend);
1100 if (lcconf->retry_counter == 0) {
1141 new->retry_counter = lcconf->retry_counter;
1181 diff.tv_sec = lcconf->retry_counter * lcconf->retry_interval;
1200 time_t lt = lcconf->retry_counter * lcconf->retry_interval;
isakmp.c 1185 if(extract_port(local) == lcconf->port_isakmp_natt)
    [all...]
isakmp_inf.c 1193 pfkey_send_delete(lcconf->sock_pfkey,
1269 if (pfkey_send_delete_all(lcconf->sock_pfkey,
1284 if (pfkey_send_delete_all(lcconf->sock_pfkey,
    [all...]
proposal.c 1051 if (lcconf->complex_bundle)
1107 if (lcconf->complex_bundle) {
oakley.c     [all...]
remoteconf.c 1120 script_dir = lcconf->pathinfo[LC_PATHTYPE_SCRIPT];
isakmp_quick.c 169 sched_schedule(&iph2->sce, lcconf->wait_ph2complete,
    [all...]
ipsec_doi.c 619 if (lcconf->gss_id_enc == LC_GSSENC_LATIN1) {
    [all...]
  /external/ipsec-tools/
setup.c 68 struct localconf *lcconf = &localconf; variable in typeref:struct:localconf

Completed in 282 milliseconds