/external/ipsec-tools/src/racoon/ |
pfkey.h | 46 extern vchar_t *pfkey_dump_sadb __P((int));
|
isakmp_unity.c | 82 static vchar_t *isakmp_cfg_split(struct ph1handle *, 85 vchar_t * 91 vchar_t *reply_attr = NULL; 260 static vchar_t * 267 vchar_t *buffer;
|
oakley.c | 107 vchar_t buf; \ 127 static int oakley_check_dh_pub __P((vchar_t *, vchar_t **)); 190 vchar_t *prime, **pub0; 192 vchar_t *tmp; 193 vchar_t *pub = *pub0; 228 vchar_t *pub, *priv, *pub_p, **gxy; 282 vchar_t **pub, **priv; 374 vchar_t * 376 vchar_t *key, *buf [all...] |
nattraversal.c | 121 vchar_t * 124 vchar_t *natd; 125 vchar_t *buf; 182 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, 185 vchar_t *natd_computed; 468 isakmp_plist_append_natt_vids (struct payload_list *plist, vchar_t *vid_natt[MAX_NATT_VID_COUNT]){
|
ipsec_doi.c | 102 static vchar_t *get_ph1approval __P((struct ph1handle *, struct prop_pair **)); 116 static u_int32_t ipsecdoi_set_ld __P((vchar_t *)); 158 static vchar_t *setph2proposal0 __P((const struct ph2handle *, 161 static vchar_t *getidval __P((int, vchar_t *)); 180 vchar_t *sa; 183 vchar_t *newsa; /* new SA payload approved. */ 208 static vchar_t * 213 vchar_t *newsa; 558 vchar_t *val = NULL [all...] |
rsalist.c | 201 rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list)
|
security.c | 64 vchar_t *sa; 71 vchar_t *pbuf = NULL; 72 vchar_t *tbuf = NULL;
|
admin.c | 96 static int admin_reply __P((int, struct admin_com *, vchar_t *)); 175 vchar_t *buf = NULL; 176 vchar_t *id = NULL; 177 vchar_t *key = NULL; 506 vchar_t *buf;
|
isakmp.c | 132 static int nostate1 __P((struct ph1handle *, vchar_t *)); 133 static int nostate2 __P((struct ph2handle *, vchar_t *)); 138 __P((struct ph1handle *, vchar_t *)) = { 165 __P((struct ph2handle *, vchar_t *)) = { 179 static int isakmp_main __P((vchar_t *, struct sockaddr *, struct sockaddr *)); 180 static int ph1_main __P((struct ph1handle *, vchar_t *)); 181 static int quick_main __P((struct ph2handle *, vchar_t *)); 182 static int isakmp_ph1begin_r __P((vchar_t *, 185 static int isakmp_ph2begin_r __P((struct ph1handle *, vchar_t *)); 190 vchar_t *, struct sockaddr *, struct sockaddr *) [all...] |
dnssec.c | 60 vchar_t *id;
|
policy.h | 157 extern int get_security_context __P((vchar_t *, struct policyindex *));
|
remoteconf.c | 635 vchar_t * 637 vchar_t *path; 640 vchar_t *new_path; 641 vchar_t *new_storage; 642 vchar_t **sp;
|
isakmp_xauth.c | 123 vchar_t *buffer; 416 vchar_t *buffer; 1369 vchar_t * 1378 vchar_t *buffer = NULL; 1381 vchar_t *usr = NULL; 1382 vchar_t *pwd = NULL; [all...] |
privsep.c | 340 vchar_t *privkey; 468 vchar_t *psk; 702 vchar_t * 706 vchar_t *privkey; 889 vchar_t * 894 vchar_t *psk;
|
handler.c | 218 vchar_t * 224 vchar_t *buf; 855 vchar_t *rbuf; 857 vchar_t *hash; 934 vchar_t *sbuf, *rbuf;
|
cfparse.h | 378 vchar_t *val;
|
cfparse.y | 158 static void adminsock_conf __P((vchar_t *, vchar_t *, vchar_t *, int)); 176 vchar_t *val; 1339 vchar_t *idv; [all...] |
isakmp.h | 386 vchar_t *payload;
|
sainfo.c | 80 const vchar_t *loc, *rmt, *peer;
|
session.c | 488 vchar_t *buf;
|
pfkey.c | 284 vchar_t * 289 vchar_t *buf = NULL; [all...] |
/external/ipsec-tools/ |
setup.c | 325 static vchar_t *strtovchar(char *string) 327 vchar_t *vchar = string ? vmalloc(strlen(string) + 1) : NULL; 519 vchar_t *getpskbyaddr(struct sockaddr *addr) 524 vchar_t *getpskbyname(vchar_t *name) 571 vchar_t *privsep_eay_get_pkcs1privkey(char *file) 647 struct sainfo *getsainfo(const vchar_t *src, const vchar_t *dst, 648 const vchar_t *peer, int remoteid)
|