/external/ipsec-tools/src/racoon/ |
D | remoteconf.c | 268 duprmconf (rmconf) in duprmconf() argument 269 struct remoteconf *rmconf; in duprmconf() 276 memcpy (new, rmconf, sizeof (*new)); 285 genlist_foreach(rmconf->idvl_p, dupidvl, new->idvl_p); 298 delrmconf(rmconf) in delrmconf() argument 299 struct remoteconf *rmconf; in delrmconf() 302 if (rmconf->xauth) 303 xauth_rmconf_delete(&rmconf->xauth); 305 if (rmconf->etypes){ 306 deletypes(rmconf->etypes); [all …]
|
D | admin.c | 407 struct remoteconf *rmconf; local 415 rmconf = getrmconf(dst); 416 if (rmconf == NULL) { 427 port = extract_port(rmconf->remote); 442 if (xauth_rmconf_used(&rmconf->xauth) == -1) 445 if (rmconf->xauth->login != NULL) { 446 vfree(rmconf->xauth->login); 447 rmconf->xauth->login = NULL; 449 if (rmconf->xauth->pass != NULL) { 450 vfree(rmconf->xauth->pass); [all …]
|
D | isakmp_agg.c | 160 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 165 if (iph1->rmconf->dhgrp == NULL) { 172 if (oakley_dh_generate(iph1->rmconf->dhgrp, 177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 204 if (iph1->rmconf->ike_frag) { 216 if (iph1->rmconf->send_cr 217 && oakley_needcr(iph1->rmconf->proposal->authmethod) 218 && iph1->rmconf->peerscertfile == NULL) { 229 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 266 if (iph1->rmconf->nat_traversal) [all …]
|
D | oakley.h | 229 (((iph1)->rmconf->xauth && \ 233 (((iph1)->rmconf->xauth && \ 234 (iph1)->rmconf->proposal->authmethod == \ 237 (iph1)->rmconf->proposal->authmethod) 240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
|
D | isakmp_base.c | 146 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 151 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 178 if (iph1->rmconf->ike_frag) { 190 if (iph1->rmconf->nat_traversal) { 234 if (iph1->rmconf->dpd) { 253 iph1->retry_counter = iph1->rmconf->retry_counter; 347 if (iph1->rmconf->nat_traversal && natt_vendorid(vid_numeric)) 367 if (vid_numeric == VENDORID_DPD && iph1->rmconf->dpd) { 520 if (iph1->cert && iph1->rmconf->send_cert) 582 iph1->retry_counter = iph1->rmconf->retry_counter; [all …]
|
D | isakmp_ident.c | 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal); 153 if (iph1->rmconf->nat_traversal) 185 if (iph1->rmconf->ike_frag) { 198 if(iph1->rmconf->dpd){ 213 iph1->retry_counter = iph1->rmconf->retry_counter; 304 if (iph1->rmconf->nat_traversal && natt_vendorid(vid_numeric)) 324 if (vid_numeric == VENDORID_DPD && iph1->rmconf->dpd) 399 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 419 iph1->retry_counter = iph1->rmconf->retry_counter; 660 iph1->retry_counter = iph1->rmconf->retry_counter; [all …]
|
D | oakley.c | 1344 switch (iph1->rmconf->getcert_method) { 1353 switch (iph1->rmconf->certtype) { 1355 if (iph1->rmconf->peerscertfile == NULL) { 1384 if (iph1->rmconf->peerscertfile != NULL) { 1408 iph1->rmconf->getcert_method); 1413 if (iph1->rmconf->verify_cert && 1418 if (iph1->rmconf->verify_cert 1419 && iph1->rmconf->getcert_method == ISAKMP_GETCERT_PAYLOAD) { 1420 certtype = iph1->rmconf->certtype; 1436 if (iph1->rmconf->cacertfile != NULL) { [all …]
|
D | isakmp.c | 881 iph1->rmconf->ini_contact = 0; 890 if(iph1->dpd_support && iph1->rmconf->dpd_interval) 897 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) { 918 !iph1->rmconf->mode_cfg) { 1022 isakmp_ph1begin_i(rmconf, remote, local) in isakmp_ph1begin_i() argument 1023 struct remoteconf *rmconf; in isakmp_ph1begin_i() 1037 iph1->rmconf = rmconf; 1054 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE) 1063 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0) { 1071 iph1->etype = rmconf->etypes->type; [all …]
|
D | nattraversal.c | 132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":""); in natt_hash_addr() 166 if (iph1->rmconf->nat_traversal == NATT_FORCE) in natt_hash_addr() 189 if (iph1->rmconf->nat_traversal == NATT_FORCE) in natt_compare_addr_hash() 455 natt_enabled_in_rmconf_stub (struct remoteconf *rmconf, void *data) in natt_enabled_in_rmconf_stub() argument 457 return (rmconf->nat_traversal ? rmconf : NULL); in natt_enabled_in_rmconf_stub()
|
D | isakmp_xauth.c | 1411 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) { 1417 dlen = iph1->rmconf->xauth->login->l - 1; 1418 iph1->rmconf->xauth->state |= XAUTH_SENT_USERNAME; 1422 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) 1426 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip); 1434 iph1->rmconf->xauth->login->v, 1435 iph1->rmconf->xauth->login->l - 1); 1437 if (iph1->rmconf->xauth->pass) { 1439 pwd = iph1->rmconf->xauth->pass; 1444 iph1->rmconf->xauth->login->v); [all …]
|
D | isakmp_inf.c | 493 if(!iph1->rmconf->weak_phase1_check && !encrypted) { 699 struct remoteconf *rmconf; local 707 rmconf = getrmconf(remote); 708 if (rmconf == NULL) { 722 iph1->rmconf = rmconf; 737 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0) 815 n->doi = htonl(iph1->rmconf->doitype); 1627 if (iph1->dpd_fails >= iph1->rmconf->dpd_maxfails) { 1687 "rescheduling send_r_u (%d).\n", iph1->rmconf->dpd_retry); 1697 iph1->rmconf == NULL) [all …]
|
D | handler.c | 1133 if(iph1 != NULL && iph1->rmconf != NULL) { in revalidate_ph2() 1134 check_level = iph1->rmconf->pcheck_level; in revalidate_ph2() 1331 p->rmconf = NULL; in revalidate_ph1tree_rmconf() 1336 p->rmconf=newrmconf; in revalidate_ph1tree_rmconf() 1344 p->approval->rmconf=newrmconf; in revalidate_ph1tree_rmconf() 1362 iph1->rmconf == NULL) in revalidate_ph1() 1367 for (e = iph1->rmconf->etypes; e != NULL; e = e->next){ in revalidate_ph1() 1379 approval->dh_group != iph1->rmconf->dh_group){ in revalidate_ph1() 1385 for (p=iph1->rmconf->proposal; p != NULL; p=p->next){ in revalidate_ph1() 1401 switch (iph1->rmconf->pcheck_level) { in revalidate_ph1()
|
D | remoteconf.h | 153 struct remoteconf *rmconf; /* backpointer to remoteconf */ member 161 typedef struct remoteconf * (rmconf_func_t)(struct remoteconf *rmconf, void *data);
|
D | rsalist.c | 176 list = iph1->rmconf->rsa_private; in rsa_lookup_keys() 178 list = iph1->rmconf->rsa_public; in rsa_lookup_keys()
|
D | gssapi.c | 205 if (iph1->rmconf->proposal->gssid != NULL) { in gssapi_init() 206 id_token.length = iph1->rmconf->proposal->gssid->l; in gssapi_init() 207 id_token.value = iph1->rmconf->proposal->gssid->v; in gssapi_init() 692 if (iph1->rmconf->proposal->gssid != NULL) in gssapi_get_id() 693 return (vdup(iph1->rmconf->proposal->gssid)); in gssapi_get_id()
|
D | ipsec_doi.c | 234 iph1->rmconf->proposal, &tsa, 235 iph1->rmconf->pcheck_level)) != NULL) 254 iph1->rmconf->proposal); 290 if (iph1->rmconf->proposal->gssid != NULL) 291 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); 1591 ((struct ipsecdoi_sa_b *)bp)->doi = htonl(iph1->rmconf->doitype); 1592 ((struct ipsecdoi_sa_b *)bp)->sit = htonl(iph1->rmconf->sittype); 2661 ((struct ipsecdoi_sa_b *)mysa->v)->doi = htonl(props->rmconf->doitype); 2662 ((struct ipsecdoi_sa_b *)mysa->v)->sit = htonl(props->rmconf->sittype); 3674 if (genlist_next(iph1->rmconf->idvl_p, 0)) { [all …]
|
D | cfparse.y | 177 struct remoteconf *rmconf; member 2241 set_isakmp_proposal(rmconf, prspec) in set_isakmp_proposal() argument 2242 struct remoteconf *rmconf; in set_isakmp_proposal() 2261 saddr2str(rmconf->remote)); 2312 rmconf); 2322 if (rmconf->proposal == NULL) { 2342 rmconf) in expand_isakmpspec() argument 2350 struct remoteconf *rmconf; 2416 } else if (rmconf->xauth == NULL) { 2429 insisakmpsa(new, rmconf);
|
D | isakmp_quick.c | 179 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 225 && iph2->ph1->rmconf->support_proxy == 0 287 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; 622 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; 1214 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 1353 iph2->retry_counter = iph2->ph1->rmconf->retry_counter; 2106 if (iph2->ph1->rmconf->gen_policy) { 2126 if (iph2->ph1->rmconf->gen_policy) {
|
D | cfparse.h | 379 struct remoteconf *rmconf; member
|
D | handler.h | 123 struct remoteconf *rmconf; /* pointer to remote configuration */ member
|
D | pfkey.c | 850 proxy = iph2->ph1->rmconf->support_proxy; 1040 proxy = iph2->ph1->rmconf->support_proxy; 1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag; 1327 proxy = iph2->ph1->rmconf->support_proxy; 1407 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
|
D | TODO | 78 o local address's field in isakmpsa handler must be kicked out to rmconf.
|
D | proposal.c | 217 switch (ph1->rmconf->pcheck_level) { 477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
|
D | isakmp_cfg.c | 448 iph1->rmconf->mode_cfg) { 746 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))
|
/external/ipsec-tools/ |
D | setup.c | 149 p->rmconf = &remoteconf; in add_proposal() 336 struct etypes *check_etypeok(struct remoteconf *rmconf, uint8_t etype) in check_etypeok() argument 338 struct etypes *p = rmconf->etypes; in check_etypeok()
|