Searched refs:iph1 (Results 1 - 21 of 21) sorted by relevance

/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Disakmp_ident.c112 ident_i1send(iph1, msg)
113 phase1_handle_t *iph1;
134 if (iph1->status != IKEV1_STATE_IDENT_I_START) {
136 "status mismatched %d.\n", iph1->status);
148 memset(&iph1->index, 0, sizeof(iph1->index));
149 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
152 iph1
[all...]
H A Disakmp_agg.c115 agg_i1send(iph1, msg)
116 phase1_handle_t *iph1;
139 if (iph1->status != IKEV1_STATE_AGG_I_START) {
141 "status mismatched %d.\n", iph1->status);
153 memset(&iph1->index, 0, sizeof(iph1->index));
154 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
157 if (ipsecdoi_setid1(iph1) <
[all...]
H A Dnattraversal.h50 #define NATT_AVAILABLE(iph1) ((iph1)->natt_flags & NAT_ANNOUNCED)
55 #define NON_ESP_MARKER_USE(iph1) ((iph1)->natt_flags & NAT_ADD_NON_ESP_MARKER)
59 #define PH1_NON_ESP_EXTRA_LEN(iph1, sendbuf) ((iph1->frag && sendbuf->l > ISAKMP_FRAG_MAXLEN) ? 0: (NON_ESP_MARKER_USE(iph1) ? NON_ESP_MARKER_LEN : 0))
61 #define PH1_FRAG_FLAGS(iph1) (NON_ESP_MARKER_USE(iph1) ? FRAG_PUT_NON_ESP_MARKER : 0)
64 #define PH1_NON_ESP_EXTRA_LEN(iph1, sendbu
[all...]
H A Doakley.c154 static int oakley_check_certid (phase1_handle_t *iph1);
533 oakley_prf(vchar_t *key, vchar_t *buf, phase1_handle_t *iph1) argument
538 if (iph1->approval == NULL) {
539 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) {
548 type = iph1->approval->hashtype;
564 oakley_hash(vchar_t *buf, phase1_handle_t *iph1) argument
569 if (iph1->approval == NULL) {
570 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) {
578 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) {
579 type = iph1
844 oakley_compute_hash3(phase1_handle_t *iph1, u_int32_t msgid, vchar_t *body) argument
891 oakley_compute_hash1(phase1_handle_t *iph1, u_int32_t msgid, vchar_t *body) argument
937 oakley_ph1hash_common(phase1_handle_t *iph1, int sw) argument
1017 oakley_ph1hash_base_i(phase1_handle_t *iph1, int sw) argument
1147 oakley_ph1hash_base_r(phase1_handle_t *iph1, int sw) argument
1260 oakley_verify_userid(phase1_handle_t *iph1) argument
1298 oakley_validate_auth(phase1_handle_t *iph1) argument
1623 oakley_vpncontrol_notify_ike_failed_if_mycert_invalid(phase1_handle_t *iph1, int notify_initiator) argument
1652 oakley_getmycert(phase1_handle_t *iph1) argument
1682 get_cert_fromlocal(phase1_handle_t *iph1, int my) argument
1759 oakley_getsign(phase1_handle_t *iph1) argument
1800 oakley_verify_certid(phase1_handle_t *iph1) argument
1825 oakley_get_peer_cert_from_certchain(phase1_handle_t * iph1) argument
1856 oakley_check_certid(phase1_handle_t *iph1) argument
2332 oakley_savecert(phase1_handle_t *iph1, struct isakmp_gen *gen) argument
2383 oakley_savecr(phase1_handle_t *iph1, struct isakmp_gen *gen) argument
2459 oakley_getcr(phase1_handle_t *iph1) argument
2488 oakley_checkcr(phase1_handle_t *iph1) argument
2528 oakley_getpskall(phase1_handle_t *iph1) argument
2591 oakley_skeyid(phase1_handle_t *iph1) argument
2708 oakley_skeyid_dae(phase1_handle_t *iph1) argument
2822 oakley_compute_enckey(phase1_handle_t *iph1) argument
3010 oakley_newiv(phase1_handle_t *iph1) argument
3095 oakley_newiv2(phase1_handle_t *iph1, u_int32_t msgid) argument
3184 oakley_do_ikev1_decrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivdp, vchar_t *ivep) argument
3294 oakley_do_decrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivdp, vchar_t *ivep) argument
3308 oakley_do_ikev1_encrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivep, vchar_t *ivp) argument
3414 oakley_do_encrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivep, vchar_t *ivp) argument
[all...]
H A Dfsm.c96 fsm_ikev1_phase1_process_payloads (phase1_handle_t *iph1, vchar_t *msg) argument
106 switch (iph1->status) {
111 error = ident_i2recv(iph1, msg);
115 error = ident_i4recv(iph1, msg);
119 error = ident_i6recv(iph1, msg);
123 error = ident_r1recv(iph1, msg);
131 error = ident_r3recv(iph1, msg);
135 error = ident_r5recv(iph1, msg);
139 error = agg_r1recv(iph1, msg);
147 error = agg_i2recv(iph1, ms
193 fsm_ikev1_phase1_send_response(phase1_handle_t *iph1, vchar_t *msg) argument
[all...]
H A Disakmp_inf.c126 isakmp_ph1_responder_lifetime (phase1_handle_t *iph1, struct isakmp_pl_resp_lifetime *notify) argument
187 isakmp_info_recv(phase1_handle_t *iph1, vchar_t *msg0)
212 if (iph1->ivm == NULL) {
213 plog(ASL_LEVEL_ERR, "iph1->ivm == NULL\n");
214 IPSECSESSIONTRACEREVENT(iph1->parent_session,
222 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid);
226 IPSECSESSIONTRACEREVENT(iph1->parent_session,
233 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive);
238 IPSECSESSIONTRACEREVENT(iph1->parent_session,
268 if (!FSM_STATE_IS_ESTABLISHED(iph1
186 isakmp_info_recv(phase1_handle_t *iph1, vchar_t *msg0) argument
434 isakmp_info_recv_n(phase1_handle_t *iph1, struct isakmp_pl_n *notify, u_int32_t msgid, int encrypted) argument
557 isakmp_info_vpncontrol_notify_ike_failed(phase1_handle_t *iph1, int isakmp_info_initiator, int type, vchar_t *data) argument
619 isakmp_info_recv_d(phase1_handle_t *iph1, struct isakmp_pl_d *delete, u_int32_t msgid, int encrypted) argument
771 isakmp_info_send_d1(phase1_handle_t *iph1) argument
827 phase1_handle_t *iph1; local
928 phase1_handle_t *iph1 = NULL; local
1052 isakmp_info_send_n1(phase1_handle_t *iph1, int type, vchar_t *data) argument
1129 phase1_handle_t *iph1 = iph2->ph1; local
1190 isakmp_info_send_common(phase1_handle_t *iph1, vchar_t *payload, u_int32_t np, int flags) argument
1554 info_recv_initialcontact(phase1_handle_t *iph1) argument
1749 isakmp_check_notify(struct isakmp_gen *gen , phase1_handle_t *iph1) argument
1833 isakmp_info_recv_lb(phase1_handle_t *iph1, struct isakmp_pl_lb *n, int encrypted) argument
1880 isakmp_info_recv_r_u(phase1_handle_t *iph1, struct isakmp_pl_ru *ru, u_int32_t msgid) argument
1938 isakmp_info_recv_r_u_ack(phase1_handle_t *iph1, struct isakmp_pl_ru *ru, u_int32_t msgid) argument
1999 phase1_handle_t *iph1 = arg; local
2110 isakmp_info_monitor_r_u_algo_inbound_detect(phase1_handle_t *iph1) argument
2150 isakmp_info_monitor_r_u_algo_blackhole_detect(phase1_handle_t *iph1) argument
2182 phase1_handle_t *iph1 = arg; local
2198 isakmp_sched_r_u(phase1_handle_t *iph1, int retry) argument
2232 isakmp_reschedule_info_monitor_if_pending(phase1_handle_t *iph1, char *reason) argument
[all...]
H A Disakmp_cfg.c132 isakmp_cfg_r(iph1, msg)
133 phase1_handle_t *iph1;
148 IPSECSESSIONTRACEREVENT(iph1->parent_session,
160 IPSECSESSIONTRACEREVENT(iph1->parent_session,
173 if (iph1->mode_cfg->ivm == NULL ||
174 iph1->mode_cfg->last_msgid != packet->msgid )
175 iph1->mode_cfg->ivm =
176 isakmp_cfg_newiv(iph1, packet->msgid);
177 ivm = iph1->mode_cfg->ivm;
179 dmsg = oakley_do_decrypt(iph1, ms
1345 isakmp_cfg_rmstate(phase1_handle_t *iph1) argument
[all...]
H A Disakmp_xauth.c100 xauth_sendreq(iph1)
101 phase1_handle_t *iph1;
108 struct xauth_state *xst = &iph1->mode_cfg->xauth;
112 if (!FSM_STATE_IS_ESTABLISHED(iph1->status)) {
155 isakmp_cfg_send(iph1, buffer,
166 xauth_attr_reply(iph1, attr, id)
167 phase1_handle_t *iph1;
174 struct xauth_state *xst = &iph1->mode_cfg->xauth;
176 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) {
245 strlcpy(iph1
325 phase1_handle_t *iph1; local
[all...]
H A Disakmp.c416 phase1_handle_t *iph1; local
430 iph1 = ike_session_getph1byindex(session, index);
431 if (iph1 != NULL) {
434 iph1->side == INITIATOR) {
435 IPSECSESSIONTRACEREVENT(iph1->parent_session,
447 if (NATT_AVAILABLE(iph1) &&
448 ! (iph1->natt_flags & NAT_PORTS_CHANGED) &&
449 ((cmpsaddrstrict(iph1->remote, remote) != 0) ||
450 (cmpsaddrstrict(iph1->local, local) != 0)))
453 racoon_free(iph1
721 phase1_handle_t *iph1; local
843 phase1_handle_t *iph1; local
951 ikev1_ph2begin_i(phase1_handle_t *iph1, phase2_handle_t *iph2) argument
996 ikev1_ph2begin_r(phase1_handle_t *iph1, vchar_t *msg) argument
1115 ikev1_phase1_established(phase1_handle_t *iph1) argument
1791 phase1_handle_t *iph1; local
2316 phase1_handle_t *iph1 = NULL; local
2458 phase1_handle_t *iph1; local
3153 isakmp_plist_set_all(struct payload_list **plist, phase1_handle_t *iph1) argument
[all...]
H A Dhandler.c293 phase1_handle_t *iph1; local
295 /* create new iph1 */
296 iph1 = racoon_calloc(1, sizeof(*iph1));
297 if (iph1 == NULL)
299 iph1->version = version;
302 iph1->dpd_support = 0;
303 iph1->dpd_lastack = 0;
304 iph1->dpd_seq = 0;
305 iph1
321 ike_session_delph1(phase1_handle_t *iph1) argument
521 ike_session_getph2bymsgid(phase1_handle_t *iph1, u_int32_t msgid) argument
534 ike_session_getonlyph2(phase1_handle_t *iph1) argument
913 phase1_handle_t *iph1 = NULL; local
1392 phase1_handle_t *iph1 = NULL; local
1475 phase1_handle_t *iph1 = NULL; local
[all...]
H A Dnattraversal.c117 natt_hash_addr (phase1_handle_t *iph1, struct sockaddr_storage *addr) argument
125 if (iph1->approval) {
127 saddr2str((struct sockaddr *)addr), iph1->approval->hashtype,
128 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":"");
155 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t));
159 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t));
163 if (iph1->rmconf->nat_traversal == NATT_FORCE)
172 natd = oakley_hash (buf, iph1);
179 natt_compare_addr_hash (phase1_handle_t *iph1, vchar_t *natd_received, argument
186 if (iph1
443 natt_float_ports(phase1_handle_t *iph1) argument
470 natt_handle_vendorid(phase1_handle_t *iph1, int vid_numeric) argument
[all...]
H A Disakmp_unity.c86 isakmp_unity_req(iph1, attr)
87 phase1_handle_t *iph1;
93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) {
144 reply_attr = isakmp_cfg_string(iph1, attr, buf);
150 reply_attr = isakmp_cfg_short(iph1, attr,
155 reply_attr = isakmp_cfg_short(iph1, attr,
160 reply_attr = isakmp_cfg_copy(iph1, attr);
164 reply_attr = isakmp_cfg_string(iph1,
170 reply_attr = isakmp_cfg_split(iph1, attr,
178 reply_attr = isakmp_cfg_split(iph1, att
[all...]
H A Dike_session.c314 ike_session_init_traffic_cop_params (phase1_handle_t *iph1) argument
316 if (!iph1 ||
317 !iph1->rmconf ||
318 (!iph1->rmconf->idle_timeout && !iph1->rmconf->dpd_interval)) {
322 if (!iph1->parent_session->traffic_monitor.interv_idle) {
323 iph1->parent_session->traffic_monitor.interv_idle = iph1->rmconf->idle_timeout;
325 if (!iph1->parent_session->traffic_monitor.dir_idle) {
326 iph1
414 ike_session_link_phase1(ike_session_t *session, phase1_handle_t *iph1) argument
481 ike_session_link_ph2_to_ph1(phase1_handle_t *iph1, phase2_handle_t *iph2) argument
511 ike_session_unlink_phase1(phase1_handle_t *iph1) argument
566 ike_session_update_ph1_ph2tree(phase1_handle_t *iph1) argument
596 phase1_handle_t *iph1; local
616 phase1_handle_t *p, *iph1 = NULL; local
658 ike_session_has_other_established_ph1(ike_session_t *session, phase1_handle_t *iph1) argument
678 ike_session_has_other_negoing_ph1(ike_session_t *session, phase1_handle_t *iph1) argument
743 ike_session_ikev1_float_ports(phase1_handle_t *iph1) argument
887 ike_session_cleanup_ph1(phase1_handle_t *iph1) argument
1147 ike_session_purge_ph2s_by_ph1(phase1_handle_t *iph1) argument
1311 phase1_handle_t *iph1 = NULL; local
1434 phase1_handle_t *iph1 = NULL; local
1464 ike_session_is_client_ph1_rekey(phase1_handle_t *iph1) argument
1476 ike_session_is_client_ph1(phase1_handle_t *iph1) argument
1496 ike_session_start_xauth_timer(phase1_handle_t *iph1) argument
1510 ike_session_stop_xauth_timer(phase1_handle_t *iph1) argument
1787 ike_session_update_natt_version(phase1_handle_t *iph1) argument
1799 ike_session_get_natt_version(phase1_handle_t *iph1) argument
1912 phase1_handle_t *iph1 = NULL; local
2027 ike_session_ph1_retransmits(phase1_handle_t *iph1) argument
2048 ike_session_bindph12(phase1_handle_t *iph1, phase2_handle_t *iph2) argument
2089 ike_session_unbind_all_ph2_from_ph1(phase1_handle_t *iph1) argument
[all...]
H A Doakley.h262 #define AUTHMETHOD(iph1) \
263 (((iph1)->rmconf->xauth && \
264 (iph1)->approval->authmethod == OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I) ? \
265 FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I : (iph1)->approval->authmethod)
266 #define RMAUTHMETHOD(iph1) \
267 (((iph1)->rmconf->xauth && \
268 (iph1)->rmconf->proposal->authmethod == \
271 (iph1)->rmconf->proposal->authmethod)
273 #define AUTHMETHOD(iph1) (iph1)
[all...]
H A Disakmp_frag.c88 isakmp_sendfrags(iph1, buf)
89 phase1_handle_t *iph1;
104 size_t extralen = NON_ESP_MARKER_USE(iph1)? NON_ESP_MARKER_LEN : 0;
113 s = getsockmyaddr((struct sockaddr *)iph1->local);
151 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG);
187 iph1->local, iph1->remote, lcconf->count_persend) == -1) {
218 isakmp_frag_extract(iph1, msg)
219 phase1_handle_t *iph1;
284 current = iph1
[all...]
H A Dvpn.c437 vpn_get_config(phase1_handle_t *iph1, struct vpnctl_status_phase_change **msg, size_t *msg_size) argument
448 if (((struct sockaddr_in *)iph1->local)->sin_family != AF_INET) {
454 if (iph1->mode_cfg->attr_list == NULL)
457 myaddr = find_myaddr((struct sockaddr *)iph1->local, 0);
466 msize += iph1->mode_cfg->attr_list->l;
477 params->outer_local_addr = ((struct sockaddr_in *)iph1->local)->sin_addr.s_addr;
484 memcpy(cptr, iph1->mode_cfg->attr_list->v, iph1->mode_cfg->attr_list->l);
499 phase1_handle_t *iph1; local
512 iph1
[all...]
H A Dvpn_control.c610 vpncontrol_notify_need_authinfo(phase1_handle_t *iph1, void* attr_list, size_t attr_len) argument
620 if (!iph1)
634 if (iph1->remote->ss_family == AF_INET)
635 address = ((struct sockaddr_in *)iph1->remote)->sin_addr.s_addr;
641 if (!ike_session_is_client_ph1_rekey(iph1)) {
747 vpncontrol_notify_phase_change(int start, u_int16_t from, phase1_handle_t *iph1, phase2_handle_t *iph2) argument
756 if (iph1 && !start && iph1->mode_cfg && iph1->mode_cfg->xauth.status != XAUTHST_OK) {
757 if (vpn_get_config(iph1,
852 vpncontrol_notify_peer_resp_ph1(u_int16_t notify_code, phase1_handle_t *iph1) argument
[all...]
H A Dipsec_doi.c161 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
168 ipsecdoi_checkph1proposal(sa, iph1)
170 phase1_handle_t *iph1;
181 newsa = get_ph1approval(iph1, pair);
188 iph1->sa_ret = newsa;
198 get_ph1approval(iph1, pair)
199 phase1_handle_t *iph1;
208 if (iph1->approval) {
209 delisakmpsa(iph1->approval);
210 iph1
2541 ipsecdoi_setph1proposal(phase1_handle_t *iph1) argument
2580 setph1prop(phase1_handle_t *iph1, caddr_t buf) argument
[all...]
H A Dfsm.h203 extern int fsm_ikev1_phase1_process_payloads (phase1_handle_t *iph1, vchar_t *msg);
205 extern int fsm_ikev1_phase1_send_response(phase1_handle_t *iph1, vchar_t *msg);
H A Disakmp_var.h123 phase1_handle_t *iph1);
H A Dhandler.h414 extern phase2_handle_t *ike_session_getonlyph2(phase1_handle_t *iph1);

Completed in 255 milliseconds