/external/ipsec-tools/src/racoon/ |
D | proposal.c | 388 if (pr1->proto_id == pr2->proto_id) 396 if (pr2->proto_id == pr1->proto_id) 405 if (pr1->proto_id != pr2->proto_id) { 409 s_ipsecdoi_proto(pr2->proto_id), 410 s_ipsecdoi_proto(pr1->proto_id)); 416 else if (pr1->proto_id == IPSECDOI_PROTO_IPCOMP) { 477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0) 491 newpr->proto_id = pr1->proto_id; 580 cmpsatrns(proto_id, tr1, tr2, check_level) in cmpsatrns() argument 581 int proto_id; in cmpsatrns() [all …]
|
D | ipsec_doi.c | 346 prop->p_no, s_ipsecdoi_proto(prop->proto_id), 352 s_ipsecdoi_trns(prop->proto_id, trns->t_id)); 1058 if (p->prop->proto_id != r->prop->proto_id) { 1061 r->prop->proto_id, p->prop->proto_id); 1203 if (sp->proto_id == p->prop->proto_id) 1367 if (check_protocol[mode](prop->proto_id) < 0) 1371 if (check_spi_size(prop->proto_id, prop->spi_size) < 0) 1499 if (prop->proto_id >= ARRAYLEN(check_transform)) { 1502 prop->proto_id); 1505 if (prop->proto_id >= ARRAYLEN(check_attributes)) { [all …]
|
D | isakmp_inf.c | 416 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 491 s_ipsecdoi_proto(delete->proto_id)); 500 switch (delete->proto_id) { 506 delete->spi_size, delete->proto_id); 532 delete->spi_size, delete->proto_id); 537 purge_ipsec_spi(iph1->remote, delete->proto_id, 553 delete->spi_size, delete->proto_id); 556 purge_ipsec_spi(iph1->remote, delete->proto_id, 564 delete->proto_id); 604 d->proto_id = IPSECDOI_PROTO_ISAKMP; [all …]
|
D | isakmp.h | 205 u_int8_t proto_id; /* Protocol */ member 314 u_int8_t proto_id; /* Protocol-ID */ member 378 u_int8_t proto_id; /* Protocol-Id */ member 421 u_int8_t proto_id; /* Protocol-Id */ member
|
D | pfkey.c | 721 pfkey_convertfromipsecdoi(proto_id, t_id, hashtype, in pfkey_convertfromipsecdoi() argument 723 u_int proto_id; in pfkey_convertfromipsecdoi() 733 switch (proto_id) { 870 satype = ipsecdoi2pfkey_proto(pr->proto_id); 873 "invalid proto_id %d\n", pr->proto_id); 935 int proto_id; local 980 proto_id = pfkey2ipsecdoi_proto(msg->sadb_msg_satype); 984 if (pr->proto_id == proto_id && pr->spi == 0) { 1063 sa_args.satype = ipsecdoi2pfkey_proto(pr->proto_id); 1066 "invalid proto_id %d\n", pr->proto_id); [all …]
|
D | handler.c | 538 getph2bysaidx(src, dst, proto_id, spi) in getph2bysaidx() argument 540 u_int proto_id; 552 if (proto_id != pr->proto_id) 560 if (proto_id != pr->proto_id) 740 deleteallph2(src, dst, proto_id) in deleteallph2() argument 742 u_int proto_id; 754 if (proto_id == pr->proto_id) 760 if (proto_id == pr->proto_id) 1289 purge_ipsec_spi(iph2->dst, iph2->approval->head->proto_id, in remove_ph2()
|
D | proposal.h | 74 int proto_id; member
|
D | ipsec_doi.h | 164 u_int8_t proto_id; /* Protocol ID */ member
|
D | isakmp_quick.c | 223 if (id->proto_id == 0 224 && id_p->proto_id == 0 1538 n->proto_id = iph2->approval->head->proto_id;
|
D | cfparse.y | 113 int proto_id; /* for ipsec (isakmp?) */ member 1325 id_b->proto_id = 0; 1354 id_b->proto_id = 0;
|
D | isakmp.c | 3196 u_int proto_id; local 3268 proto_id = pfkey2ipsecdoi_proto(msg->sadb_msg_satype); 3269 iph2 = getph2bysaidx(src, dst, proto_id, sa->sadb_sa_spi);
|
D | oakley.c | 510 p[0] = pr->proto_id; 536 switch (pr->proto_id) {
|
/external/tcpdump/ |
D | print-eigrp.c | 147 u_int8_t proto_id; member 184 u_int8_t proto_id; member 376 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_ip_ext->proto_id), in eigrp_print() 439 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_at_ext->proto_id), in eigrp_print()
|
D | oakley.h | 114 u_int8_t proto_id; /* OAKLEY */
|
D | ipsec_doi.h | 128 u_int8_t proto_id; /* Protocol ID */ member
|
D | print-isakmp.c | 717 if (id.proto_id) { in isakmp_id_print() 722 pe = getprotobynumber(id.proto_id); in isakmp_id_print()
|
/external/ipsec-tools/ |
D | ChangeLog | 343 * src/racoon/ipsec_doi.c: checks proto_id in ipsecdoi_chkcmpids()
|