/external/ipsec-tools/src/racoon/ |
D | isakmp_quick.c | 114 quick_timeover(iph2) in quick_timeover() argument 115 struct ph2handle *iph2; in quick_timeover() 119 saddrwop2str(iph2->dst)); 122 if (iph2->side == INITIATOR) 123 pk_sendeacquire(iph2); 125 remph2(iph2); 126 delph2(iph2); 136 quick_i1prep(iph2, msg) in quick_i1prep() argument 137 struct ph2handle *iph2; in quick_i1prep() 143 if (iph2->status != PHASE2ST_STATUS2) { [all …]
|
D | handler.c | 663 struct ph2handle *iph2; local 666 LIST_FOREACH(iph2, &ph2tree, chain) { 667 if (iph2->proposal == NULL && iph2->approval == NULL) 669 if (iph2->approval != NULL) { 670 for (pr = iph2->approval->head; pr != NULL; 675 return iph2; 677 } else if (iph2->proposal != NULL) { 678 for (pr = iph2->proposal->head; pr != NULL; 683 return iph2; 697 struct ph2handle *iph2 = NULL; in newph2() local [all …]
|
D | isakmp.c | 658 struct ph2handle *iph2; local 693 iph2 = getph2bymsgid(iph1, msgid); 694 if (iph2 == NULL) { 710 iph2->flags |= ISAKMP_FLAG_C; 713 if (quick_main(iph2, msg) < 0) { 716 remph2(iph2); 717 delph2(iph2); 957 quick_main(iph2, msg) in quick_main() argument 958 struct ph2handle *iph2; in quick_main() 968 if (iph2->status == PHASE2ST_ESTABLISHED [all …]
|
D | pfkey.c | 893 pk_sendgetspi(iph2) in pk_sendgetspi() argument 894 struct ph2handle *iph2; in pk_sendgetspi() 904 if (iph2->side == INITIATOR) 905 pp = iph2->proposal; 907 pp = iph2->approval; 909 if (iph2->sa_src && iph2->sa_dst) { 911 src = dupsaddr(iph2->sa_src); 912 dst = dupsaddr(iph2->sa_dst); 915 src = dupsaddr(iph2->src); 916 dst = dupsaddr(iph2->dst); [all …]
|
D | isakmp_inf.c | 459 struct ph2handle *iph2; local 621 isakmp_info_send_d2(iph2) in isakmp_info_send_d2() argument 622 struct ph2handle *iph2; in isakmp_info_send_d2() 632 if (iph2->status != PHASE2ST_ESTABLISHED) 639 iph1 = getph1byaddr(iph2->src, iph2->dst, 0); 647 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 824 isakmp_info_send_n2(iph2, type, data) in isakmp_info_send_n2() argument 825 struct ph2handle *iph2; in isakmp_info_send_n2() 829 struct ph1handle *iph1 = iph2->ph1; 836 if (!iph2->approval) [all …]
|
D | admin.c | 493 struct ph2handle *iph2; local 521 iph2 = getph2byid(src, dst, sp_out->id); 522 if (iph2 != NULL) { 523 event_list = &iph2->evt_listeners; 524 if (iph2->status == PHASE2ST_ESTABLISHED) 554 iph2 = newph2(); 555 if (iph2 == NULL) { 560 iph2->side = INITIATOR; 561 iph2->satype = admin2pfkey_proto(com->ac_proto); 562 iph2->spid = sp_out->id; [all …]
|
D | isakmp_cfg.c | 1161 struct ph2handle *iph2 = NULL; local 1180 iph2 = newph2(); 1181 if (iph2 == NULL) 1184 iph2->dst = dupsaddr(iph1->remote); 1185 if (iph2->dst == NULL) { 1186 delph2(iph2); 1189 iph2->src = dupsaddr(iph1->local); 1190 if (iph2->src == NULL) { 1191 delph2(iph2); 1195 iph2->side = INITIATOR; [all …]
|
D | proposal.c | 1032 set_proposal_from_policy(iph2, sp_main, sp_sub) in set_proposal_from_policy() argument 1033 struct ph2handle *iph2; in set_proposal_from_policy() 1047 newpp->lifetime = iph2->sainfo->lifetime; 1048 newpp->lifebyte = iph2->sainfo->lifebyte; 1049 newpp->pfs_group = iph2->sainfo->pfs_group; 1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff; 1088 if (iph2->side == INITIATOR) 1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1112 iph2->ph1->natt_options->mode_udp_diff; [all …]
|
D | ipsec_doi.c | 745 ipsecdoi_selectph2proposal(iph2) in ipsecdoi_selectph2proposal() argument 746 struct ph2handle *iph2; in ipsecdoi_selectph2proposal() 753 pair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2, 759 ret = get_ph2approval(iph2, pair); 766 iph2->sa_ret = get_sabyproppair(doitype, sittype, ret); 768 if (iph2->sa_ret == NULL) 782 ipsecdoi_checkph2proposal(iph2) in ipsecdoi_checkph2proposal() argument 783 struct ph2handle *iph2; in ipsecdoi_checkph2proposal() 793 spair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2, 804 rpair = get_proppair(iph2->sa_ret, IPSECDOI_TYPE_PH2); [all …]
|
D | security.c | 164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument 165 struct ph2handle *iph2; in set_secctx_in_proposal() 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
D | policy.c | 108 getsp_r(spidx, iph2) in getsp_r() argument 110 struct ph2handle *iph2; 141 saddr2str(iph2->src)); 145 if (cmpsaddr(iph2->src, (struct sockaddr *) &spidx->src) != CMPSADDR_MATCH || 150 saddr2str(iph2->dst)); 154 if (cmpsaddr(iph2->dst, (struct sockaddr *) &spidx->dst) != CMPSADDR_MATCH ||
|
D | oakley.c | 483 oakley_compute_keymat(iph2, side) in oakley_compute_keymat() argument 484 struct ph2handle *iph2; in oakley_compute_keymat() 490 if (iph2->approval->pfs_group && iph2->dhpub_p) { 491 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub, 492 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0) 497 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < 0 498 || oakley_compute_keymat_x(iph2, side, OUTBOUND_SA) < 0) 519 oakley_compute_keymat_x(iph2, side, sa_dir) in oakley_compute_keymat_x() argument 520 struct ph2handle *iph2; in oakley_compute_keymat_x() 534 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0); [all …]
|
D | ipsec_doi.h | 221 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
|
D | racoonctl.c | 1148 struct ph2handle *iph2; local 1171 iph2 = (struct ph2handle *)buf; 1172 addr = (struct sockaddr *)(++iph2);
|
D | handler.h | 499 int (* enum_func)(struct ph2handle *iph2, void *arg),
|
/external/ipsec-tools/ |
D | ChangeLog | 1400 * src/racoon/handler.c: search a ph1 by address if iph2->ph1 is
|