/external/ipsec-tools/src/racoon/ |
D | isakmp_quick.c | 102 quick_i1prep(iph2, msg) in quick_i1prep() argument 103 struct ph2handle *iph2; in quick_i1prep() 109 if (iph2->status != PHASE2ST_STATUS2) { 111 "status mismatched %d.\n", iph2->status); 115 iph2->msgid = isakmp_newmsgid2(iph2->ph1); 116 iph2->ivm = oakley_newiv2(iph2->ph1, iph2->msgid); 117 if (iph2->ivm == NULL) 120 iph2->status = PHASE2ST_GETSPISENT; 129 if (pk_sendgetspi(iph2) < 0) 134 iph2->sce = sched_new(lcconf->wait_ph2complete, [all …]
|
D | handler.c | 543 struct ph2handle *iph2; local 546 LIST_FOREACH(iph2, &ph2tree, chain) { 547 if (iph2->proposal == NULL && iph2->approval == NULL) 549 if (iph2->approval != NULL) { 550 for (pr = iph2->approval->head; pr != NULL; 555 return iph2; 557 } else if (iph2->proposal != NULL) { 558 for (pr = iph2->proposal->head; pr != NULL; 563 return iph2; 577 struct ph2handle *iph2 = NULL; in newph2() local [all …]
|
D | pfkey.c | 811 pfkey_timeover(iph2) in pfkey_timeover() argument 812 struct ph2handle *iph2; in pfkey_timeover() 816 saddrwop2str(iph2->dst)); 817 SCHED_KILL(iph2->sce); 820 if (iph2->side == INITIATOR) 821 pk_sendeacquire(iph2); 823 unbindph12(iph2); 824 remph2(iph2); 825 delph2(iph2); 838 pk_sendgetspi(iph2) in pk_sendgetspi() argument [all …]
|
D | isakmp.c | 661 struct ph2handle *iph2; local 695 iph2 = getph2bymsgid(iph1, msgid); 696 if (iph2 == NULL) { 712 iph2->flags |= ISAKMP_FLAG_C; 715 if (quick_main(iph2, msg) < 0) { 718 unbindph12(iph2); 719 remph2(iph2); 720 delph2(iph2); 945 quick_main(iph2, msg) in quick_main() argument 946 struct ph2handle *iph2; in quick_main() [all …]
|
D | isakmp_inf.c | 461 struct ph2handle *iph2; local 625 isakmp_info_send_d2(iph2) in isakmp_info_send_d2() argument 626 struct ph2handle *iph2; in isakmp_info_send_d2() 636 if (iph2->status != PHASE2ST_ESTABLISHED) 643 iph1 = getph1byaddr(iph2->src, iph2->dst, 0); 651 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 838 isakmp_info_send_n2(iph2, type, data) in isakmp_info_send_n2() argument 839 struct ph2handle *iph2; in isakmp_info_send_n2() 843 struct ph1handle *iph1 = iph2->ph1; 850 if (!iph2->approval) [all …]
|
D | isakmp_cfg.c | 1120 struct ph2handle *iph2 = NULL; local 1139 iph2 = newph2(); 1140 if (iph2 == NULL) 1143 iph2->dst = dupsaddr(iph1->remote); 1144 if (iph2->dst == NULL) { 1145 delph2(iph2); 1148 iph2->src = dupsaddr(iph1->local); 1149 if (iph2->src == NULL) { 1150 delph2(iph2); 1155 if (set_port(iph2->dst, 0) == NULL || [all …]
|
D | proposal.c | 1032 set_proposal_from_policy(iph2, sp_main, sp_sub) in set_proposal_from_policy() argument 1033 struct ph2handle *iph2; in set_proposal_from_policy() 1047 newpp->lifetime = iph2->sainfo->lifetime; 1048 newpp->lifebyte = iph2->sainfo->lifebyte; 1049 newpp->pfs_group = iph2->sainfo->pfs_group; 1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff; 1088 if (iph2->side == INITIATOR) 1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1112 iph2->ph1->natt_options->mode_udp_diff; [all …]
|
D | security.c | 164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument 165 struct ph2handle *iph2; in set_secctx_in_proposal() 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
D | ipsec_doi.c | 889 ipsecdoi_selectph2proposal(iph2) in ipsecdoi_selectph2proposal() argument 890 struct ph2handle *iph2; in ipsecdoi_selectph2proposal() 896 pair = get_proppair(iph2->sa, IPSECDOI_TYPE_PH2); 901 ret = get_ph2approval(iph2, pair); 908 iph2->sa_ret = get_sabyproppair(ret, iph2->ph1); 910 if (iph2->sa_ret == NULL) 924 ipsecdoi_checkph2proposal(iph2) in ipsecdoi_checkph2proposal() argument 925 struct ph2handle *iph2; in ipsecdoi_checkph2proposal() 934 spair = get_proppair(iph2->sa, IPSECDOI_TYPE_PH2); 944 rpair = get_proppair(iph2->sa_ret, IPSECDOI_TYPE_PH2); [all …]
|
D | policy.c | 104 getsp_r(spidx, iph2) in getsp_r() argument 106 struct ph2handle *iph2; 137 saddr2str(iph2->src)); 140 if (cmpsaddrwop(iph2->src, (struct sockaddr *)&spidx->src) 145 saddr2str(iph2->dst)); 148 if (cmpsaddrwop(iph2->dst, (struct sockaddr *)&spidx->dst)
|
D | oakley.c | 433 oakley_compute_keymat(iph2, side) in oakley_compute_keymat() argument 434 struct ph2handle *iph2; in oakley_compute_keymat() 440 if (iph2->approval->pfs_group && iph2->dhpub_p) { 441 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub, 442 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0) 447 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < 0 448 || oakley_compute_keymat_x(iph2, side, OUTBOUND_SA) < 0) 469 oakley_compute_keymat_x(iph2, side, sa_dir) in oakley_compute_keymat_x() argument 470 struct ph2handle *iph2; in oakley_compute_keymat_x() 484 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0); [all …]
|
D | ipsec_doi.h | 213 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
|
D | racoonctl.c | 1218 struct ph2handle *iph2; local 1241 iph2 = (struct ph2handle *)buf; 1242 addr = (struct sockaddr *)(++iph2);
|
/external/ipsec-tools/ |
D | ChangeLog | 294 * src/racoon/handler.c: search a ph1 by address if iph2->ph1 is
|