Home
last modified time | relevance | path

Searched refs:rmconf (Results 1 – 25 of 25) sorted by relevance

/external/ipsec-tools/src/racoon/
Dremoteconf.c268 duprmconf (rmconf) in duprmconf() argument
269 struct remoteconf *rmconf; in duprmconf()
276 memcpy (new, rmconf, sizeof (*new));
285 genlist_foreach(rmconf->idvl_p, dupidvl, new->idvl_p);
298 delrmconf(rmconf) in delrmconf() argument
299 struct remoteconf *rmconf; in delrmconf()
302 if (rmconf->xauth)
303 xauth_rmconf_delete(&rmconf->xauth);
305 if (rmconf->etypes){
306 deletypes(rmconf->etypes);
[all …]
Dadmin.c407 struct remoteconf *rmconf; local
415 rmconf = getrmconf(dst);
416 if (rmconf == NULL) {
427 port = extract_port(rmconf->remote);
442 if (xauth_rmconf_used(&rmconf->xauth) == -1)
445 if (rmconf->xauth->login != NULL) {
446 vfree(rmconf->xauth->login);
447 rmconf->xauth->login = NULL;
449 if (rmconf->xauth->pass != NULL) {
450 vfree(rmconf->xauth->pass);
[all …]
Disakmp_agg.c160 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
165 if (iph1->rmconf->dhgrp == NULL) {
172 if (oakley_dh_generate(iph1->rmconf->dhgrp,
177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
204 if (iph1->rmconf->ike_frag) {
216 if (iph1->rmconf->send_cr
217 && oakley_needcr(iph1->rmconf->proposal->authmethod)
218 && iph1->rmconf->peerscertfile == NULL) {
229 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
266 if (iph1->rmconf->nat_traversal)
[all …]
Doakley.h229 (((iph1)->rmconf->xauth && \
233 (((iph1)->rmconf->xauth && \
234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
Disakmp_base.c146 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
151 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
178 if (iph1->rmconf->ike_frag) {
190 if (iph1->rmconf->nat_traversal) {
234 if (iph1->rmconf->dpd) {
253 iph1->retry_counter = iph1->rmconf->retry_counter;
347 if (iph1->rmconf->nat_traversal && natt_vendorid(vid_numeric))
367 if (vid_numeric == VENDORID_DPD && iph1->rmconf->dpd) {
520 if (iph1->cert && iph1->rmconf->send_cert)
582 iph1->retry_counter = iph1->rmconf->retry_counter;
[all …]
Disakmp_ident.c144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
153 if (iph1->rmconf->nat_traversal)
185 if (iph1->rmconf->ike_frag) {
198 if(iph1->rmconf->dpd){
213 iph1->retry_counter = iph1->rmconf->retry_counter;
304 if (iph1->rmconf->nat_traversal && natt_vendorid(vid_numeric))
324 if (vid_numeric == VENDORID_DPD && iph1->rmconf->dpd)
399 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
419 iph1->retry_counter = iph1->rmconf->retry_counter;
660 iph1->retry_counter = iph1->rmconf->retry_counter;
[all …]
Doakley.c1344 switch (iph1->rmconf->getcert_method) {
1353 switch (iph1->rmconf->certtype) {
1355 if (iph1->rmconf->peerscertfile == NULL) {
1384 if (iph1->rmconf->peerscertfile != NULL) {
1408 iph1->rmconf->getcert_method);
1413 if (iph1->rmconf->verify_cert &&
1418 if (iph1->rmconf->verify_cert
1419 && iph1->rmconf->getcert_method == ISAKMP_GETCERT_PAYLOAD) {
1420 certtype = iph1->rmconf->certtype;
1436 if (iph1->rmconf->cacertfile != NULL) {
[all …]
Disakmp.c881 iph1->rmconf->ini_contact = 0;
890 if(iph1->dpd_support && iph1->rmconf->dpd_interval)
897 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) {
918 !iph1->rmconf->mode_cfg) {
1022 isakmp_ph1begin_i(rmconf, remote, local) in isakmp_ph1begin_i() argument
1023 struct remoteconf *rmconf; in isakmp_ph1begin_i()
1037 iph1->rmconf = rmconf;
1054 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE)
1063 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0) {
1071 iph1->etype = rmconf->etypes->type;
[all …]
Dnattraversal.c132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":""); in natt_hash_addr()
166 if (iph1->rmconf->nat_traversal == NATT_FORCE) in natt_hash_addr()
189 if (iph1->rmconf->nat_traversal == NATT_FORCE) in natt_compare_addr_hash()
455 natt_enabled_in_rmconf_stub (struct remoteconf *rmconf, void *data) in natt_enabled_in_rmconf_stub() argument
457 return (rmconf->nat_traversal ? rmconf : NULL); in natt_enabled_in_rmconf_stub()
Disakmp_xauth.c1411 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) {
1417 dlen = iph1->rmconf->xauth->login->l - 1;
1418 iph1->rmconf->xauth->state |= XAUTH_SENT_USERNAME;
1422 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login)
1426 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip);
1434 iph1->rmconf->xauth->login->v,
1435 iph1->rmconf->xauth->login->l - 1);
1437 if (iph1->rmconf->xauth->pass) {
1439 pwd = iph1->rmconf->xauth->pass;
1444 iph1->rmconf->xauth->login->v);
[all …]
Disakmp_inf.c493 if(!iph1->rmconf->weak_phase1_check && !encrypted) {
699 struct remoteconf *rmconf; local
707 rmconf = getrmconf(remote);
708 if (rmconf == NULL) {
722 iph1->rmconf = rmconf;
737 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0)
815 n->doi = htonl(iph1->rmconf->doitype);
1627 if (iph1->dpd_fails >= iph1->rmconf->dpd_maxfails) {
1687 "rescheduling send_r_u (%d).\n", iph1->rmconf->dpd_retry);
1697 iph1->rmconf == NULL)
[all …]
Dhandler.c1133 if(iph1 != NULL && iph1->rmconf != NULL) { in revalidate_ph2()
1134 check_level = iph1->rmconf->pcheck_level; in revalidate_ph2()
1331 p->rmconf = NULL; in revalidate_ph1tree_rmconf()
1336 p->rmconf=newrmconf; in revalidate_ph1tree_rmconf()
1344 p->approval->rmconf=newrmconf; in revalidate_ph1tree_rmconf()
1362 iph1->rmconf == NULL) in revalidate_ph1()
1367 for (e = iph1->rmconf->etypes; e != NULL; e = e->next){ in revalidate_ph1()
1379 approval->dh_group != iph1->rmconf->dh_group){ in revalidate_ph1()
1385 for (p=iph1->rmconf->proposal; p != NULL; p=p->next){ in revalidate_ph1()
1401 switch (iph1->rmconf->pcheck_level) { in revalidate_ph1()
Dremoteconf.h153 struct remoteconf *rmconf; /* backpointer to remoteconf */ member
161 typedef struct remoteconf * (rmconf_func_t)(struct remoteconf *rmconf, void *data);
Drsalist.c176 list = iph1->rmconf->rsa_private; in rsa_lookup_keys()
178 list = iph1->rmconf->rsa_public; in rsa_lookup_keys()
Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init()
206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init()
207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init()
692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id()
693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
Dipsec_doi.c234 iph1->rmconf->proposal, &tsa,
235 iph1->rmconf->pcheck_level)) != NULL)
254 iph1->rmconf->proposal);
290 if (iph1->rmconf->proposal->gssid != NULL)
291 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
1591 ((struct ipsecdoi_sa_b *)bp)->doi = htonl(iph1->rmconf->doitype);
1592 ((struct ipsecdoi_sa_b *)bp)->sit = htonl(iph1->rmconf->sittype);
2661 ((struct ipsecdoi_sa_b *)mysa->v)->doi = htonl(props->rmconf->doitype);
2662 ((struct ipsecdoi_sa_b *)mysa->v)->sit = htonl(props->rmconf->sittype);
3674 if (genlist_next(iph1->rmconf->idvl_p, 0)) {
[all …]
Dcfparse.y177 struct remoteconf *rmconf; member
2241 set_isakmp_proposal(rmconf, prspec) in set_isakmp_proposal() argument
2242 struct remoteconf *rmconf; in set_isakmp_proposal()
2261 saddr2str(rmconf->remote));
2312 rmconf);
2322 if (rmconf->proposal == NULL) {
2342 rmconf) in expand_isakmpspec() argument
2350 struct remoteconf *rmconf;
2416 } else if (rmconf->xauth == NULL) {
2429 insisakmpsa(new, rmconf);
Disakmp_quick.c179 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
225 && iph2->ph1->rmconf->support_proxy == 0
287 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
622 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
1214 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
1353 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
2106 if (iph2->ph1->rmconf->gen_policy) {
2126 if (iph2->ph1->rmconf->gen_policy) {
Dcfparse.h379 struct remoteconf *rmconf; member
Dhandler.h123 struct remoteconf *rmconf; /* pointer to remote configuration */ member
Dpfkey.c850 proxy = iph2->ph1->rmconf->support_proxy;
1040 proxy = iph2->ph1->rmconf->support_proxy;
1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1327 proxy = iph2->ph1->rmconf->support_proxy;
1407 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
DTODO78 o local address's field in isakmpsa handler must be kicked out to rmconf.
Dproposal.c217 switch (ph1->rmconf->pcheck_level) {
477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
Disakmp_cfg.c448 iph1->rmconf->mode_cfg) {
746 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))
/external/ipsec-tools/
Dsetup.c149 p->rmconf = &remoteconf; in add_proposal()
336 struct etypes *check_etypeok(struct remoteconf *rmconf, uint8_t etype) in check_etypeok() argument
338 struct etypes *p = rmconf->etypes; in check_etypeok()