Home
last modified time | relevance | path

Searched refs:iph2 (Results 1 – 16 of 16) sorted by relevance

/external/ipsec-tools/src/racoon/
Disakmp_quick.c114 quick_timeover(iph2) in quick_timeover() argument
115 struct ph2handle *iph2; in quick_timeover()
119 saddrwop2str(iph2->dst));
122 if (iph2->side == INITIATOR)
123 pk_sendeacquire(iph2);
125 remph2(iph2);
126 delph2(iph2);
136 quick_i1prep(iph2, msg) in quick_i1prep() argument
137 struct ph2handle *iph2; in quick_i1prep()
143 if (iph2->status != PHASE2ST_STATUS2) {
[all …]
Dhandler.c663 struct ph2handle *iph2; local
666 LIST_FOREACH(iph2, &ph2tree, chain) {
667 if (iph2->proposal == NULL && iph2->approval == NULL)
669 if (iph2->approval != NULL) {
670 for (pr = iph2->approval->head; pr != NULL;
675 return iph2;
677 } else if (iph2->proposal != NULL) {
678 for (pr = iph2->proposal->head; pr != NULL;
683 return iph2;
697 struct ph2handle *iph2 = NULL; in newph2() local
[all …]
Disakmp.c658 struct ph2handle *iph2; local
693 iph2 = getph2bymsgid(iph1, msgid);
694 if (iph2 == NULL) {
710 iph2->flags |= ISAKMP_FLAG_C;
713 if (quick_main(iph2, msg) < 0) {
716 remph2(iph2);
717 delph2(iph2);
957 quick_main(iph2, msg) in quick_main() argument
958 struct ph2handle *iph2; in quick_main()
968 if (iph2->status == PHASE2ST_ESTABLISHED
[all …]
Dpfkey.c893 pk_sendgetspi(iph2) in pk_sendgetspi() argument
894 struct ph2handle *iph2; in pk_sendgetspi()
904 if (iph2->side == INITIATOR)
905 pp = iph2->proposal;
907 pp = iph2->approval;
909 if (iph2->sa_src && iph2->sa_dst) {
911 src = dupsaddr(iph2->sa_src);
912 dst = dupsaddr(iph2->sa_dst);
915 src = dupsaddr(iph2->src);
916 dst = dupsaddr(iph2->dst);
[all …]
Disakmp_inf.c459 struct ph2handle *iph2; local
621 isakmp_info_send_d2(iph2) in isakmp_info_send_d2() argument
622 struct ph2handle *iph2; in isakmp_info_send_d2()
632 if (iph2->status != PHASE2ST_ESTABLISHED)
639 iph1 = getph1byaddr(iph2->src, iph2->dst, 0);
647 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) {
824 isakmp_info_send_n2(iph2, type, data) in isakmp_info_send_n2() argument
825 struct ph2handle *iph2; in isakmp_info_send_n2()
829 struct ph1handle *iph1 = iph2->ph1;
836 if (!iph2->approval)
[all …]
Dadmin.c493 struct ph2handle *iph2; local
521 iph2 = getph2byid(src, dst, sp_out->id);
522 if (iph2 != NULL) {
523 event_list = &iph2->evt_listeners;
524 if (iph2->status == PHASE2ST_ESTABLISHED)
554 iph2 = newph2();
555 if (iph2 == NULL) {
560 iph2->side = INITIATOR;
561 iph2->satype = admin2pfkey_proto(com->ac_proto);
562 iph2->spid = sp_out->id;
[all …]
Disakmp_cfg.c1161 struct ph2handle *iph2 = NULL; local
1180 iph2 = newph2();
1181 if (iph2 == NULL)
1184 iph2->dst = dupsaddr(iph1->remote);
1185 if (iph2->dst == NULL) {
1186 delph2(iph2);
1189 iph2->src = dupsaddr(iph1->local);
1190 if (iph2->src == NULL) {
1191 delph2(iph2);
1195 iph2->side = INITIATOR;
[all …]
Dproposal.c1032 set_proposal_from_policy(iph2, sp_main, sp_sub) in set_proposal_from_policy() argument
1033 struct ph2handle *iph2; in set_proposal_from_policy()
1047 newpp->lifetime = iph2->sainfo->lifetime;
1048 newpp->lifebyte = iph2->sainfo->lifebyte;
1049 newpp->pfs_group = iph2->sainfo->pfs_group;
1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED))
1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff;
1088 if (iph2->side == INITIATOR)
1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED))
1112 iph2->ph1->natt_options->mode_udp_diff;
[all …]
Dipsec_doi.c745 ipsecdoi_selectph2proposal(iph2) in ipsecdoi_selectph2proposal() argument
746 struct ph2handle *iph2; in ipsecdoi_selectph2proposal()
753 pair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2,
759 ret = get_ph2approval(iph2, pair);
766 iph2->sa_ret = get_sabyproppair(doitype, sittype, ret);
768 if (iph2->sa_ret == NULL)
782 ipsecdoi_checkph2proposal(iph2) in ipsecdoi_checkph2proposal() argument
783 struct ph2handle *iph2; in ipsecdoi_checkph2proposal()
793 spair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2,
804 rpair = get_proppair(iph2->sa_ret, IPSECDOI_TYPE_PH2);
[all …]
Dsecurity.c164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument
165 struct ph2handle *iph2; in set_secctx_in_proposal()
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
Dpolicy.c108 getsp_r(spidx, iph2) in getsp_r() argument
110 struct ph2handle *iph2;
141 saddr2str(iph2->src));
145 if (cmpsaddr(iph2->src, (struct sockaddr *) &spidx->src) != CMPSADDR_MATCH ||
150 saddr2str(iph2->dst));
154 if (cmpsaddr(iph2->dst, (struct sockaddr *) &spidx->dst) != CMPSADDR_MATCH ||
Doakley.c483 oakley_compute_keymat(iph2, side) in oakley_compute_keymat() argument
484 struct ph2handle *iph2; in oakley_compute_keymat()
490 if (iph2->approval->pfs_group && iph2->dhpub_p) {
491 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub,
492 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0)
497 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < 0
498 || oakley_compute_keymat_x(iph2, side, OUTBOUND_SA) < 0)
519 oakley_compute_keymat_x(iph2, side, sa_dir) in oakley_compute_keymat_x() argument
520 struct ph2handle *iph2; in oakley_compute_keymat_x()
534 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0);
[all …]
Dipsec_doi.h221 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
Dracoonctl.c1148 struct ph2handle *iph2; local
1171 iph2 = (struct ph2handle *)buf;
1172 addr = (struct sockaddr *)(++iph2);
Dhandler.h499 int (* enum_func)(struct ph2handle *iph2, void *arg),
/external/ipsec-tools/
DChangeLog1400 * src/racoon/handler.c: search a ph1 by address if iph2->ph1 is