/external/ipsec-tools/src/racoon/ |
localconf.c | 66 struct localconf *lcconf; variable in typeref:struct:localconf 73 lcconf = racoon_calloc(1, sizeof(*lcconf)); 74 if (lcconf == NULL) 79 lcconf->racoon_conf = LC_DEFAULT_CF; 91 if (lcconf->pathinfo[i]) { 92 racoon_free(lcconf->pathinfo[i]); 93 lcconf->pathinfo[i] = NULL; 101 lcconf->uid = 0; 102 lcconf->gid = 0 [all...] |
backupsa.c | 178 if (safefile(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 1) != 0 || 179 (fp = fopen(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], "a")) == NULL) { 182 lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]); 210 if (safefile(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 1) == 0) 211 fp = fopen(lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], "r"); 217 lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]); 234 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 290 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], 298 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA]); 306 line, lcconf->pathinfo[LC_PATHTYPE_BACKUPSA], [all...] |
main.c | 202 lcconf->port_isakmp = atoi(optarg); 205 lcconf->port_isakmp_natt = atoi(optarg); 208 lcconf->racoon_conf = optarg; 240 lcconf->default_af = AF_INET; 243 lcconf->default_af = AF_INET6; 312 lcconf->racoon_conf);
|
session.c | 254 if (lcconf->pathinfo[LC_PATHTYPE_PIDFILE] == NULL) 256 else if (lcconf->pathinfo[LC_PATHTYPE_PIDFILE][0] == '/') 257 strlcpy(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN); 260 strlcat(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN); 343 pfkey_send_flush(lcconf->sock_pfkey, SADB_SATYPE_UNSPEC); 394 /* TODO: save / restore / flush old lcconf (?) / rmtree 534 pfkey_close(lcconf->sock_pfkey);
|
admin.c | 111 so2 = accept(lcconf->sock_admin, (struct sockaddr *)&from, &fromlen); 696 lcconf->sock_admin = -1; 705 lcconf->sock_admin = socket(AF_UNIX, SOCK_STREAM, 0); 706 if (lcconf->sock_admin == -1) { 711 close_on_exec(lcconf->sock_admin); 714 if (bind(lcconf->sock_admin, (struct sockaddr *)&sunaddr, 719 (void)close(lcconf->sock_admin); 728 (void)close(lcconf->sock_admin); 736 (void)close(lcconf->sock_admin); 740 if (listen(lcconf->sock_admin, 5) != 0) [all...] |
grabmyaddr.c | 170 set_port(addr, lcconf->port_isakmp); 173 set_port(addr, lcconf->port_isakmp_natt); 245 if (!lcconf->strict_address) { 296 if (!lcconf->strict_address) { 297 lcconf->rtsock = kernel_open_socket(); 298 if (lcconf->rtsock < 0) 300 monitor_fd(lcconf->rtsock, kernel_receive, NULL, 0); 302 lcconf->rtsock = -1; 314 if (lcconf->rtsock != -1) { 315 unmonitor_fd(lcconf->rtsock) [all...] |
privsep.c | 203 if (lcconf->uid == 0) 211 if ((lcconf->pathinfo[LC_PATHTYPE_CERT] == NULL) || 212 (lcconf->pathinfo[LC_PATHTYPE_SCRIPT] == NULL)) { 234 if (lcconf->chroot != NULL) { 235 if (chdir(lcconf->chroot) != 0) { 237 "Cannot chdir(%s): %s\n", lcconf->chroot, 241 if (chroot(lcconf->chroot) != 0) { 243 "Cannot chroot(%s): %s\n", lcconf->chroot, 249 if (setgid(lcconf->gid) != 0) { 251 "Cannot setgid(%d): %s\n", lcconf->gid [all...] |
cfparse.y | 305 lcconf->uid = pw->pw_uid; 308 | USER NUMBER { lcconf->uid = $2; } EOS 317 lcconf->gid = gr->gr_gid; 320 | GROUP NUMBER { lcconf->gid = $2; } EOS 321 | CHROOT QUOTEDSTRING { lcconf->chroot = $2->v; } EOS 334 if (lcconf->pathinfo[$2]) 335 racoon_free(lcconf->pathinfo[$2]); 338 lcconf->pathinfo[$2] = racoon_strdup($3->v); 339 STRDUP_FATAL(lcconf->pathinfo[$2]); 347 : COMPLEX_BUNDLE SWITCH { lcconf->complex_bundle = $2; } EO [all...] |
nattraversal.c | 254 opts->float_port = lcconf->port_isakmp_natt; 266 opts->float_port = lcconf->port_isakmp_natt; 274 opts->float_port = lcconf->port_isakmp_natt; 382 sched_schedule (&sc_natt, lcconf->natt_ka_interval, natt_keepalive_send); 391 if (lcconf->natt_ka_interval > 0) 392 sched_schedule (&sc_natt, lcconf->natt_ka_interval, natt_keepalive_send);
|
pfkey.c | 321 if ((bufsiz = pfkey_set_buffer_size(s, lcconf->pfkey_buffer_size)) < 0) { 324 lcconf->pfkey_buffer_size, ipsec_strerror()); 326 } else if (bufsiz < lcconf->pfkey_buffer_size) { 329 bufsiz, lcconf->pfkey_buffer_size); 401 if (pfkey_send_flush(lcconf->sock_pfkey, satype) < 0) { 434 if ((lcconf->sock_pfkey = pfkey_open()) < 0) { 439 if ((bufsiz = pfkey_set_buffer_size(lcconf->sock_pfkey, 440 lcconf->pfkey_buffer_size)) < 0) { 443 lcconf->pfkey_buffer_size, ipsec_strerror()); 445 } else if (bufsiz < lcconf->pfkey_buffer_size) [all...] |
localconf.h | 118 extern struct localconf *lcconf;
|
handler.c | 1070 r->local, r->remote, lcconf->count_persend); 1100 if (lcconf->retry_counter == 0) { 1141 new->retry_counter = lcconf->retry_counter; 1181 diff.tv_sec = lcconf->retry_counter * lcconf->retry_interval; 1200 time_t lt = lcconf->retry_counter * lcconf->retry_interval;
|
isakmp.c | 1185 if(extract_port(local) == lcconf->port_isakmp_natt) [all...] |
isakmp_inf.c | 1193 pfkey_send_delete(lcconf->sock_pfkey, 1269 if (pfkey_send_delete_all(lcconf->sock_pfkey, 1284 if (pfkey_send_delete_all(lcconf->sock_pfkey, [all...] |
oakley.c | [all...] |
proposal.c | 1051 if (lcconf->complex_bundle) 1107 if (lcconf->complex_bundle) {
|
isakmp_quick.c | 169 sched_schedule(&iph2->sce, lcconf->wait_ph2complete, [all...] |
remoteconf.c | 1120 script_dir = lcconf->pathinfo[LC_PATHTYPE_SCRIPT];
|
ipsec_doi.c | 619 if (lcconf->gss_id_enc == LC_GSSENC_LATIN1) { [all...] |
/external/ipsec-tools/ |
setup.c | 68 struct localconf *lcconf = &localconf; variable in typeref:struct:localconf
|
ChangeLog | 647 * src/racoon/main.c: Argument parsing needs lcconf initialized. [all...] |