HomeSort by relevance Sort by last modified time
    Searched refs:rmconf (Results 1 - 25 of 25) sorted by null

  /external/ipsec-tools/src/racoon/
remoteconf.c 268 duprmconf (rmconf)
269 struct remoteconf *rmconf;
276 memcpy (new, rmconf, sizeof (*new));
285 genlist_foreach(rmconf->idvl_p, dupidvl, new->idvl_p);
298 delrmconf(rmconf)
299 struct remoteconf *rmconf;
302 if (rmconf->xauth)
303 xauth_rmconf_delete(&rmconf->xauth);
305 if (rmconf->etypes){
306 deletypes(rmconf->etypes)
    [all...]
admin.c 407 struct remoteconf *rmconf; local
415 rmconf = getrmconf(dst);
416 if (rmconf == NULL) {
427 port = extract_port(rmconf->remote);
442 if (xauth_rmconf_used(&rmconf->xauth) == -1)
445 if (rmconf->xauth->login != NULL) {
446 vfree(rmconf->xauth->login);
447 rmconf->xauth->login = NULL;
449 if (rmconf->xauth->pass != NULL) {
450 vfree(rmconf->xauth->pass)
    [all...]
oakley.h 229 (((iph1)->rmconf->xauth && \
233 (((iph1)->rmconf->xauth && \
234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
isakmp_agg.c 160 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
165 if (iph1->rmconf->dhgrp == NULL) {
172 if (oakley_dh_generate(iph1->rmconf->dhgrp,
177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
204 if (iph1->rmconf->ike_frag) {
216 if (iph1->rmconf->send_cr
217 && oakley_needcr(iph1->rmconf->proposal->authmethod)
218 && iph1->rmconf->peerscertfile == NULL) {
229 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
266 if (iph1->rmconf->nat_traversal)
    [all...]
remoteconf.h 118 struct remoteconf *inherited_from; /* the original rmconf
153 struct remoteconf *rmconf; /* backpointer to remoteconf */ member in struct:isakmpsa
161 typedef struct remoteconf * (rmconf_func_t)(struct remoteconf *rmconf, void *data);
nattraversal.c 132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":"");
166 if (iph1->rmconf->nat_traversal == NATT_FORCE)
189 if (iph1->rmconf->nat_traversal == NATT_FORCE)
455 natt_enabled_in_rmconf_stub (struct remoteconf *rmconf, void *data)
457 return (rmconf->nat_traversal ? rmconf : NULL);
isakmp_ident.c 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
153 if (iph1->rmconf->nat_traversal)
185 if (iph1->rmconf->ike_frag) {
198 if(iph1->rmconf->dpd){
213 iph1->retry_counter = iph1->rmconf->retry_counter;
375 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
395 iph1->retry_counter = iph1->rmconf->retry_counter;
636 iph1->retry_counter = iph1->rmconf->retry_counter;
1038 if(iph1->rmconf->dpd){
1066 iph1->retry_counter = iph1->rmconf->retry_counter
    [all...]
isakmp_base.c 146 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
151 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
178 if (iph1->rmconf->ike_frag) {
190 if (iph1->rmconf->nat_traversal) {
234 if (iph1->rmconf->dpd) {
253 iph1->retry_counter = iph1->rmconf->retry_counter;
493 if (iph1->cert && iph1->rmconf->send_cert)
555 iph1->retry_counter = iph1->rmconf->retry_counter;
944 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
991 if (iph1->dpd_support && iph1->rmconf->dpd)
    [all...]
rsalist.c 176 list = iph1->rmconf->rsa_private;
178 list = iph1->rmconf->rsa_public;
isakmp_inf.c 494 if(!iph1->rmconf->weak_phase1_check && !encrypted) {
700 struct remoteconf *rmconf;
708 rmconf = getrmconf(remote);
709 if (rmconf == NULL) {
723 iph1->rmconf = rmconf;
738 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0)
816 n->doi = htonl(iph1->rmconf->doitype);
699 struct remoteconf *rmconf; local
    [all...]
isakmp_xauth.c     [all...]
handler.c 1123 * Note: we must have an updated ph1->rmconf before doing that,
1133 if(iph1 != NULL && iph1->rmconf != NULL) {
1134 check_level = iph1->rmconf->pcheck_level;
1137 plog(LLV_DEBUG, LOCATION, NULL, "No phase1 rmconf found !\n");
1331 p->rmconf = NULL;
1334 /* Do not free old rmconf, it is just a pointer to an entry in rmtree
1336 p->rmconf=newrmconf;
1344 p->approval->rmconf=newrmconf;
1354 /* rmconf is already updated here
1362 iph1->rmconf == NULL
    [all...]
oakley.c 1347 switch (iph1->rmconf->getcert_method) {
1356 switch (iph1->rmconf->certtype) {
1358 if (iph1->rmconf->peerscertfile == NULL) {
1387 if (iph1->rmconf->peerscertfile != NULL)
    [all...]
isakmp.c 881 iph1->rmconf->ini_contact = 0;
890 if(iph1->dpd_support && iph1->rmconf->dpd_interval)
897 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) {
918 !iph1->rmconf->mode_cfg) {
1022 isakmp_ph1begin_i(rmconf, remote, local)
1023 struct remoteconf *rmconf;
1037 iph1->rmconf = rmconf;
1054 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE)
1063 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0)
1123 struct remoteconf *rmconf; local
2150 struct remoteconf *rmconf; local
    [all...]
vendorid.c 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
gssapi.c 205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
692 if (iph1->rmconf->proposal->gssid != NULL)
693 return (vdup(iph1->rmconf->proposal->gssid));
ipsec_doi.c 234 iph1->rmconf->proposal, &tsa,
235 iph1->rmconf->pcheck_level)) != NULL)
254 iph1->rmconf->proposal);
290 if (iph1->rmconf->proposal->gssid != NULL)
291 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
    [all...]
cfparse.y 177 struct remoteconf *rmconf;
    [all...]
isakmp_quick.c 180 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
226 && iph2->ph1->rmconf->support_proxy == 0
288 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
623 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
1215 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
1354 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
    [all...]
cfparse.h 379 struct remoteconf *rmconf; member in union:YYSTYPE
handler.h 120 /* XXX copy from rmconf due to anonymous configuration.
123 struct remoteconf *rmconf; /* pointer to remote configuration */ member in struct:ph1handle
proposal.c 217 switch (ph1->rmconf->pcheck_level) {
477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
pfkey.c 850 proxy = iph2->ph1->rmconf->support_proxy;
1040 proxy = iph2->ph1->rmconf->support_proxy;
1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1327 proxy = iph2->ph1->rmconf->support_proxy;
    [all...]
isakmp_cfg.c 450 iph1->rmconf->mode_cfg) {
748 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))
    [all...]
  /external/ipsec-tools/
setup.c 310 p->rmconf = remoteconf;

Completed in 812 milliseconds