/external/ipsec-tools/src/racoon/ |
remoteconf.c | 268 duprmconf (rmconf) 269 struct remoteconf *rmconf; 276 memcpy (new, rmconf, sizeof (*new)); 285 genlist_foreach(rmconf->idvl_p, dupidvl, new->idvl_p); 298 delrmconf(rmconf) 299 struct remoteconf *rmconf; 302 if (rmconf->xauth) 303 xauth_rmconf_delete(&rmconf->xauth); 305 if (rmconf->etypes){ 306 deletypes(rmconf->etypes) [all...] |
admin.c | 407 struct remoteconf *rmconf; local 415 rmconf = getrmconf(dst); 416 if (rmconf == NULL) { 427 port = extract_port(rmconf->remote); 442 if (xauth_rmconf_used(&rmconf->xauth) == -1) 445 if (rmconf->xauth->login != NULL) { 446 vfree(rmconf->xauth->login); 447 rmconf->xauth->login = NULL; 449 if (rmconf->xauth->pass != NULL) { 450 vfree(rmconf->xauth->pass) [all...] |
oakley.h | 229 (((iph1)->rmconf->xauth && \ 233 (((iph1)->rmconf->xauth && \ 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
isakmp_agg.c | 160 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 165 if (iph1->rmconf->dhgrp == NULL) { 172 if (oakley_dh_generate(iph1->rmconf->dhgrp, 177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 204 if (iph1->rmconf->ike_frag) { 216 if (iph1->rmconf->send_cr 217 && oakley_needcr(iph1->rmconf->proposal->authmethod) 218 && iph1->rmconf->peerscertfile == NULL) { 229 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 266 if (iph1->rmconf->nat_traversal) [all...] |
remoteconf.h | 118 struct remoteconf *inherited_from; /* the original rmconf 153 struct remoteconf *rmconf; /* backpointer to remoteconf */ member in struct:isakmpsa 161 typedef struct remoteconf * (rmconf_func_t)(struct remoteconf *rmconf, void *data);
|
nattraversal.c | 132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":""); 166 if (iph1->rmconf->nat_traversal == NATT_FORCE) 189 if (iph1->rmconf->nat_traversal == NATT_FORCE) 455 natt_enabled_in_rmconf_stub (struct remoteconf *rmconf, void *data) 457 return (rmconf->nat_traversal ? rmconf : NULL);
|
isakmp_ident.c | 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 153 if (iph1->rmconf->nat_traversal) 185 if (iph1->rmconf->ike_frag) { 198 if(iph1->rmconf->dpd){ 213 iph1->retry_counter = iph1->rmconf->retry_counter; 375 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 395 iph1->retry_counter = iph1->rmconf->retry_counter; 636 iph1->retry_counter = iph1->rmconf->retry_counter; 1038 if(iph1->rmconf->dpd){ 1066 iph1->retry_counter = iph1->rmconf->retry_counter [all...] |
isakmp_base.c | 146 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 151 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 178 if (iph1->rmconf->ike_frag) { 190 if (iph1->rmconf->nat_traversal) { 234 if (iph1->rmconf->dpd) { 253 iph1->retry_counter = iph1->rmconf->retry_counter; 493 if (iph1->cert && iph1->rmconf->send_cert) 555 iph1->retry_counter = iph1->rmconf->retry_counter; 944 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 991 if (iph1->dpd_support && iph1->rmconf->dpd) [all...] |
rsalist.c | 176 list = iph1->rmconf->rsa_private; 178 list = iph1->rmconf->rsa_public;
|
isakmp_inf.c | 494 if(!iph1->rmconf->weak_phase1_check && !encrypted) { 700 struct remoteconf *rmconf; 708 rmconf = getrmconf(remote); 709 if (rmconf == NULL) { 723 iph1->rmconf = rmconf; 738 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0) 816 n->doi = htonl(iph1->rmconf->doitype); 699 struct remoteconf *rmconf; local [all...] |
isakmp_xauth.c | [all...] |
handler.c | 1123 * Note: we must have an updated ph1->rmconf before doing that, 1133 if(iph1 != NULL && iph1->rmconf != NULL) { 1134 check_level = iph1->rmconf->pcheck_level; 1137 plog(LLV_DEBUG, LOCATION, NULL, "No phase1 rmconf found !\n"); 1331 p->rmconf = NULL; 1334 /* Do not free old rmconf, it is just a pointer to an entry in rmtree 1336 p->rmconf=newrmconf; 1344 p->approval->rmconf=newrmconf; 1354 /* rmconf is already updated here 1362 iph1->rmconf == NULL [all...] |
oakley.c | 1347 switch (iph1->rmconf->getcert_method) { 1356 switch (iph1->rmconf->certtype) { 1358 if (iph1->rmconf->peerscertfile == NULL) { 1387 if (iph1->rmconf->peerscertfile != NULL) [all...] |
isakmp.c | 881 iph1->rmconf->ini_contact = 0; 890 if(iph1->dpd_support && iph1->rmconf->dpd_interval) 897 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) { 918 !iph1->rmconf->mode_cfg) { 1022 isakmp_ph1begin_i(rmconf, remote, local) 1023 struct remoteconf *rmconf; 1037 iph1->rmconf = rmconf; 1054 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE) 1063 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0) 1123 struct remoteconf *rmconf; local 2150 struct remoteconf *rmconf; local [all...] |
vendorid.c | 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
|
gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 692 if (iph1->rmconf->proposal->gssid != NULL) 693 return (vdup(iph1->rmconf->proposal->gssid));
|
ipsec_doi.c | 234 iph1->rmconf->proposal, &tsa, 235 iph1->rmconf->pcheck_level)) != NULL) 254 iph1->rmconf->proposal); 290 if (iph1->rmconf->proposal->gssid != NULL) 291 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); [all...] |
cfparse.y | 177 struct remoteconf *rmconf; [all...] |
isakmp_quick.c | 180 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 226 && iph2->ph1->rmconf->support_proxy == 0 288 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; 623 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; 1215 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 1354 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; [all...] |
cfparse.h | 379 struct remoteconf *rmconf; member in union:YYSTYPE
|
handler.h | 120 /* XXX copy from rmconf due to anonymous configuration. 123 struct remoteconf *rmconf; /* pointer to remote configuration */ member in struct:ph1handle
|
proposal.c | 217 switch (ph1->rmconf->pcheck_level) { 477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
|
pfkey.c | 850 proxy = iph2->ph1->rmconf->support_proxy; 1040 proxy = iph2->ph1->rmconf->support_proxy; 1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag; 1327 proxy = iph2->ph1->rmconf->support_proxy; [all...] |
isakmp_cfg.c | 450 iph1->rmconf->mode_cfg) { 748 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0)) [all...] |
/external/ipsec-tools/ |
setup.c | 310 p->rmconf = remoteconf;
|