Home
last modified time | relevance | path

Searched refs:ph1 (Results 1 – 13 of 13) sorted by relevance

/external/ipsec-tools/src/racoon/
Disakmp_quick.c115 iph2->msgid = isakmp_newmsgid2(iph2->ph1);
116 iph2->ivm = oakley_newiv2(iph2->ph1, iph2->msgid);
179 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
225 && iph2->ph1->rmconf->support_proxy == 0
277 hash = oakley_compute_hash1(iph2->ph1, iph2->msgid, body);
287 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
334 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
338 msg = oakley_do_decrypt(iph2->ph1, msg0, iph2->ivm->iv, iph2->ivm->ive);
356 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
372 plog(LLV_WARNING, LOCATION, iph2->ph1->remote,
[all …]
Dproposal.c194 cmpsaprop_alloc(ph1, pp1, pp2, side) in cmpsaprop_alloc() argument
195 struct ph1handle *ph1; in cmpsaprop_alloc()
217 switch (ph1->rmconf->pcheck_level) {
443 if ((ph1->natt_flags & NAT_DETECTED) &&
448 s_ipsecdoi_encmode(pr2->encmode - ph1->natt_options->mode_udp_diff));
449 pr2->encmode -= ph1->natt_options->mode_udp_diff;
453 if ((ph1->natt_flags & NAT_DETECTED) &&
459 s_ipsecdoi_encmode(pr1->encmode - ph1->natt_options->mode_udp_diff),
460 pr1->encmode - ph1->natt_options->mode_udp_diff);
461 pr1->encmode -= ph1->natt_options->mode_udp_diff;
[all …]
Disakmp.c968 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
976 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
980 isakmp_info_send_n1(iph2->ph1, error, NULL);
1004 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
1322 iph2->ph1 = iph1;
1381 isakmp_info_send_n1(iph2->ph1, error, NULL);
1397 plog(LLV_ERROR, LOCATION, iph2->ph1->remote,
1944 if (iph2->ph1->status == PHASE1ST_EXPIRED){
1947 isakmp_pindex(&iph2->ph1->index, iph2->msgid));
1954 isakmp_pindex(&iph2->ph1->index, iph2->msgid));
[all …]
Dpfkey.c850 proxy = iph2->ph1->rmconf->support_proxy;
1040 proxy = iph2->ph1->rmconf->support_proxy;
1111 sa_args.l_natt_type = iph2->ph1->natt_options->encaps_type;
1112 sa_args.l_natt_sport = extract_port (iph2->ph1->remote);
1113 sa_args.l_natt_dport = extract_port (iph2->ph1->local);
1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1281 iph2->ph1->ph2cnt++;
1291 set_port(iph2->src, extract_port(iph2->ph1->local));
1292 set_port(iph2->dst, extract_port(iph2->ph1->remote));
1327 proxy = iph2->ph1->rmconf->support_proxy;
[all …]
Dhandler.c482 if (p->msgid == msgid && p->ph1 == iph1)
778 iph2->ph1 = iph1;
786 if (iph2->ph1 != NULL) {
787 iph2->ph1 = NULL;
1128 if (iph2->ph1 != NULL) in revalidate_ph2()
1129 iph1=iph2->ph1; in revalidate_ph2()
Dnattraversal.h45 #define NATT_AVAILABLE(ph1) ((iph1)->natt_flags & NAT_ANNOUNCED) argument
Disakmp_inf.c839 struct ph1handle *iph1 = iph2->ph1;
923 iph2->ph1 = iph1;
937 hash = oakley_compute_hash1(iph2->ph1, iph2->msgid, payload);
1005 tmp = oakley_do_encrypt(iph2->ph1, iph2->sendbuf, iph2->ivm->ive,
1014 if (isakmp_send(iph2->ph1, iph2->sendbuf) < 0) {
Dhandler.h319 struct ph1handle *ph1; /* back pointer to isakmp status */ member
Disakmp_cfg.c1163 iph2->ph1 = iph1;
1182 hash = oakley_compute_hash1(iph2->ph1, iph2->msgid, payload);
1253 tmp = oakley_do_encrypt(iph2->ph1, iph2->sendbuf,
1262 if (isakmp_send(iph2->ph1, iph2->sendbuf) < 0) {
Doakley.c527 res = oakley_prf(iph2->ph1->skeyid_d, buf, iph2->ph1);
600 this = oakley_prf(iph2->ph1->skeyid_d, seed,
601 iph2->ph1);
Dipsec_doi.c908 iph2->sa_ret = get_sabyproppair(ret, iph2->ph1);
1000 iph2->sa_ret = get_sabyproppair(p, iph2->ph1);
1172 pr = cmpsaprop_alloc(iph2->ph1, q1, q2, iph2->side);
3187 if (iph2->ph1->natt_flags & NAT_DETECTED) {
3188 int udp_diff = iph2->ph1->natt_options->mode_udp_diff;
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/fr-FR/
Dfr-FR_nk0_kdt_mgc1.pkb18 ���ؐ��3�R:��`��$�0t~ �0OڀL+L�O@* ph1�� l�ZK�I��db��
/external/ipsec-tools/
DChangeLog205 established ph1 handles in DPD (also reported new getph1byaddr()
326 * src/racoon/handler.c: search a ph1 by address if iph2->ph1 is
356 * src/racoon/isakmp_inf.c: Store the DPD main scheduler in ph1
446 expire a ph1 handle when receiving a DELETE-SA instead of calling