/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 103 quick_i1prep(iph2, msg) 104 struct ph2handle *iph2; 110 if (iph2->status != PHASE2ST_STATUS2) { 112 "status mismatched %d.\n", iph2->status); 116 iph2->msgid = isakmp_newmsgid2(iph2->ph1); 117 iph2->ivm = oakley_newiv2(iph2->ph1, iph2->msgid); 118 if (iph2->ivm == NULL [all...] |
handler.c | 543 struct ph2handle *iph2; local 546 LIST_FOREACH(iph2, &ph2tree, chain) { 547 if (iph2->proposal == NULL && iph2->approval == NULL) 549 if (iph2->approval != NULL) { 550 for (pr = iph2->approval->head; pr != NULL; 555 return iph2; 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 563 return iph2; 577 struct ph2handle *iph2 = NULL; local 744 struct ph2handle *iph2, *next; local 1299 struct ph2handle *iph2, *iph2_next; local [all...] |
pfkey.c | 811 pfkey_timeover(iph2) 812 struct ph2handle *iph2; 816 saddrwop2str(iph2->dst)); 817 SCHED_KILL(iph2->sce); 820 if (iph2->side == INITIATOR) 821 pk_sendeacquire(iph2); 823 unbindph12(iph2); 824 remph2(iph2); 825 delph2(iph2); 838 pk_sendgetspi(iph2) 933 struct ph2handle *iph2; local 1176 struct ph2handle *iph2; local 1466 struct ph2handle *iph2; local 1531 struct ph2handle *iph2; local 1642 struct ph2handle *iph2[MAXNESTEDSA]; local 1927 struct ph2handle *iph2 = NULL; local [all...] |
isakmp.c | 661 struct ph2handle *iph2; local 695 iph2 = getph2bymsgid(iph1, msgid); 696 if (iph2 == NULL) { 712 iph2->flags |= ISAKMP_FLAG_C; 715 if (quick_main(iph2, msg) < 0) { 718 unbindph12(iph2); 719 remph2(iph2); 720 delph2(iph2); 945 quick_main(iph2, msg) 946 struct ph2handle *iph2; 1302 struct ph2handle *iph2 = 0; local 1927 struct ph2handle *iph2; local 3197 struct ph2handle *iph2; local [all...] |
isakmp_inf.c | 458 struct ph2handle *iph2; 622 isakmp_info_send_d2(iph2) 623 struct ph2handle *iph2; 633 if (iph2->status != PHASE2ST_ESTABLISHED) 640 iph1 = getph1byaddr(iph2->src, iph2->dst, 0); 648 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 835 isakmp_info_send_n2(iph2, type, data) 836 struct ph2handle *iph2; 840 struct ph1handle *iph1 = iph2->ph1 457 struct ph2handle *iph2; local 891 struct ph2handle *iph2 = NULL; local 1137 struct ph2handle *iph2; local 1292 struct ph2handle *iph2; local [all...] |
isakmp_cfg.c | 1122 struct ph2handle *iph2 = NULL; local 1141 iph2 = newph2(); 1142 if (iph2 == NULL) 1145 iph2->dst = dupsaddr(iph1->remote); 1146 if (iph2->dst == NULL) { 1147 delph2(iph2); 1150 iph2->src = dupsaddr(iph1->local); 1151 if (iph2->src == NULL) { 1152 delph2(iph2); 1157 if (set_port(iph2->dst, 0) == NULL | [all...] |
proposal.c | 1032 set_proposal_from_policy(iph2, sp_main, sp_sub) 1033 struct ph2handle *iph2; 1047 newpp->lifetime = iph2->sainfo->lifetime; 1048 newpp->lifebyte = iph2->sainfo->lifebyte; 1049 newpp->pfs_group = iph2->sainfo->pfs_group; 1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff; 1088 if (iph2->side == INITIATOR) 1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED) [all...] |
security.c | 164 set_secctx_in_proposal(iph2, spidx) 165 struct ph2handle *iph2; 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
ipsec_doi.c | 889 ipsecdoi_selectph2proposal(iph2) 890 struct ph2handle *iph2; 896 pair = get_proppair(iph2->sa, IPSECDOI_TYPE_PH2); 901 ret = get_ph2approval(iph2, pair); 908 iph2->sa_ret = get_sabyproppair(ret, iph2->ph1); 910 if (iph2->sa_ret == NULL) 924 ipsecdoi_checkph2proposal(iph2) 925 struct ph2handle *iph2; 934 spair = get_proppair(iph2->sa, IPSECDOI_TYPE_PH2) [all...] |
policy.c | 104 getsp_r(spidx, iph2) 106 struct ph2handle *iph2; 137 saddr2str(iph2->src)); 140 if (cmpsaddrwop(iph2->src, (struct sockaddr *)&spidx->src) 145 saddr2str(iph2->dst)); 148 if (cmpsaddrwop(iph2->dst, (struct sockaddr *)&spidx->dst)
|
oakley.c | 436 oakley_compute_keymat(iph2, side) 437 struct ph2handle *iph2; 443 if (iph2->approval->pfs_group && iph2->dhpub_p) { 444 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub, 445 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0) 450 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < [all...] |
ipsec_doi.h | 213 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
|
racoonctl.c | 1218 struct ph2handle *iph2; local 1241 iph2 = (struct ph2handle *)buf; 1242 addr = (struct sockaddr *)(++iph2); [all...] |