/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | isakmp_ident.c | 112 ident_i1send(iph1, msg) 113 phase1_handle_t *iph1; 134 if (iph1->status != IKEV1_STATE_IDENT_I_START) { 136 "status mismatched %d.\n", iph1->status); 148 memset(&iph1->index, 0, sizeof(iph1->index)); 149 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 152 iph1 [all...] |
H A D | isakmp_agg.c | 115 agg_i1send(iph1, msg) 116 phase1_handle_t *iph1; 139 if (iph1->status != IKEV1_STATE_AGG_I_START) { 141 "status mismatched %d.\n", iph1->status); 153 memset(&iph1->index, 0, sizeof(iph1->index)); 154 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 157 if (ipsecdoi_setid1(iph1) < [all...] |
H A D | nattraversal.h | 50 #define NATT_AVAILABLE(iph1) ((iph1)->natt_flags & NAT_ANNOUNCED) 55 #define NON_ESP_MARKER_USE(iph1) ((iph1)->natt_flags & NAT_ADD_NON_ESP_MARKER) 59 #define PH1_NON_ESP_EXTRA_LEN(iph1, sendbuf) ((iph1->frag && sendbuf->l > ISAKMP_FRAG_MAXLEN) ? 0: (NON_ESP_MARKER_USE(iph1) ? NON_ESP_MARKER_LEN : 0)) 61 #define PH1_FRAG_FLAGS(iph1) (NON_ESP_MARKER_USE(iph1) ? FRAG_PUT_NON_ESP_MARKER : 0) 64 #define PH1_NON_ESP_EXTRA_LEN(iph1, sendbu [all...] |
H A D | oakley.c | 154 static int oakley_check_certid (phase1_handle_t *iph1); 533 oakley_prf(vchar_t *key, vchar_t *buf, phase1_handle_t *iph1) argument 538 if (iph1->approval == NULL) { 539 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) { 548 type = iph1->approval->hashtype; 564 oakley_hash(vchar_t *buf, phase1_handle_t *iph1) argument 569 if (iph1->approval == NULL) { 570 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) { 578 if (iph1->version == ISAKMP_VERSION_NUMBER_IKEV1) { 579 type = iph1 844 oakley_compute_hash3(phase1_handle_t *iph1, u_int32_t msgid, vchar_t *body) argument 891 oakley_compute_hash1(phase1_handle_t *iph1, u_int32_t msgid, vchar_t *body) argument 937 oakley_ph1hash_common(phase1_handle_t *iph1, int sw) argument 1017 oakley_ph1hash_base_i(phase1_handle_t *iph1, int sw) argument 1147 oakley_ph1hash_base_r(phase1_handle_t *iph1, int sw) argument 1260 oakley_verify_userid(phase1_handle_t *iph1) argument 1298 oakley_validate_auth(phase1_handle_t *iph1) argument 1623 oakley_vpncontrol_notify_ike_failed_if_mycert_invalid(phase1_handle_t *iph1, int notify_initiator) argument 1652 oakley_getmycert(phase1_handle_t *iph1) argument 1682 get_cert_fromlocal(phase1_handle_t *iph1, int my) argument 1759 oakley_getsign(phase1_handle_t *iph1) argument 1800 oakley_verify_certid(phase1_handle_t *iph1) argument 1825 oakley_get_peer_cert_from_certchain(phase1_handle_t * iph1) argument 1856 oakley_check_certid(phase1_handle_t *iph1) argument 2332 oakley_savecert(phase1_handle_t *iph1, struct isakmp_gen *gen) argument 2383 oakley_savecr(phase1_handle_t *iph1, struct isakmp_gen *gen) argument 2459 oakley_getcr(phase1_handle_t *iph1) argument 2488 oakley_checkcr(phase1_handle_t *iph1) argument 2528 oakley_getpskall(phase1_handle_t *iph1) argument 2591 oakley_skeyid(phase1_handle_t *iph1) argument 2708 oakley_skeyid_dae(phase1_handle_t *iph1) argument 2822 oakley_compute_enckey(phase1_handle_t *iph1) argument 3010 oakley_newiv(phase1_handle_t *iph1) argument 3095 oakley_newiv2(phase1_handle_t *iph1, u_int32_t msgid) argument 3184 oakley_do_ikev1_decrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivdp, vchar_t *ivep) argument 3294 oakley_do_decrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivdp, vchar_t *ivep) argument 3308 oakley_do_ikev1_encrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivep, vchar_t *ivp) argument 3414 oakley_do_encrypt(phase1_handle_t *iph1, vchar_t *msg, vchar_t *ivep, vchar_t *ivp) argument [all...] |
H A D | fsm.c | 96 fsm_ikev1_phase1_process_payloads (phase1_handle_t *iph1, vchar_t *msg) argument 106 switch (iph1->status) { 111 error = ident_i2recv(iph1, msg); 115 error = ident_i4recv(iph1, msg); 119 error = ident_i6recv(iph1, msg); 123 error = ident_r1recv(iph1, msg); 131 error = ident_r3recv(iph1, msg); 135 error = ident_r5recv(iph1, msg); 139 error = agg_r1recv(iph1, msg); 147 error = agg_i2recv(iph1, ms 193 fsm_ikev1_phase1_send_response(phase1_handle_t *iph1, vchar_t *msg) argument [all...] |
H A D | isakmp_inf.c | 126 isakmp_ph1_responder_lifetime (phase1_handle_t *iph1, struct isakmp_pl_resp_lifetime *notify) argument 187 isakmp_info_recv(phase1_handle_t *iph1, vchar_t *msg0) 212 if (iph1->ivm == NULL) { 213 plog(ASL_LEVEL_ERR, "iph1->ivm == NULL\n"); 214 IPSECSESSIONTRACEREVENT(iph1->parent_session, 222 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid); 226 IPSECSESSIONTRACEREVENT(iph1->parent_session, 233 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive); 238 IPSECSESSIONTRACEREVENT(iph1->parent_session, 268 if (!FSM_STATE_IS_ESTABLISHED(iph1 186 isakmp_info_recv(phase1_handle_t *iph1, vchar_t *msg0) argument 434 isakmp_info_recv_n(phase1_handle_t *iph1, struct isakmp_pl_n *notify, u_int32_t msgid, int encrypted) argument 557 isakmp_info_vpncontrol_notify_ike_failed(phase1_handle_t *iph1, int isakmp_info_initiator, int type, vchar_t *data) argument 619 isakmp_info_recv_d(phase1_handle_t *iph1, struct isakmp_pl_d *delete, u_int32_t msgid, int encrypted) argument 771 isakmp_info_send_d1(phase1_handle_t *iph1) argument 827 phase1_handle_t *iph1; local 928 phase1_handle_t *iph1 = NULL; local 1052 isakmp_info_send_n1(phase1_handle_t *iph1, int type, vchar_t *data) argument 1129 phase1_handle_t *iph1 = iph2->ph1; local 1190 isakmp_info_send_common(phase1_handle_t *iph1, vchar_t *payload, u_int32_t np, int flags) argument 1554 info_recv_initialcontact(phase1_handle_t *iph1) argument 1749 isakmp_check_notify(struct isakmp_gen *gen , phase1_handle_t *iph1) argument 1833 isakmp_info_recv_lb(phase1_handle_t *iph1, struct isakmp_pl_lb *n, int encrypted) argument 1880 isakmp_info_recv_r_u(phase1_handle_t *iph1, struct isakmp_pl_ru *ru, u_int32_t msgid) argument 1938 isakmp_info_recv_r_u_ack(phase1_handle_t *iph1, struct isakmp_pl_ru *ru, u_int32_t msgid) argument 1999 phase1_handle_t *iph1 = arg; local 2110 isakmp_info_monitor_r_u_algo_inbound_detect(phase1_handle_t *iph1) argument 2150 isakmp_info_monitor_r_u_algo_blackhole_detect(phase1_handle_t *iph1) argument 2182 phase1_handle_t *iph1 = arg; local 2198 isakmp_sched_r_u(phase1_handle_t *iph1, int retry) argument 2232 isakmp_reschedule_info_monitor_if_pending(phase1_handle_t *iph1, char *reason) argument [all...] |
H A D | isakmp_cfg.c | 132 isakmp_cfg_r(iph1, msg) 133 phase1_handle_t *iph1; 148 IPSECSESSIONTRACEREVENT(iph1->parent_session, 160 IPSECSESSIONTRACEREVENT(iph1->parent_session, 173 if (iph1->mode_cfg->ivm == NULL || 174 iph1->mode_cfg->last_msgid != packet->msgid ) 175 iph1->mode_cfg->ivm = 176 isakmp_cfg_newiv(iph1, packet->msgid); 177 ivm = iph1->mode_cfg->ivm; 179 dmsg = oakley_do_decrypt(iph1, ms 1345 isakmp_cfg_rmstate(phase1_handle_t *iph1) argument [all...] |
H A D | isakmp_xauth.c | 100 xauth_sendreq(iph1) 101 phase1_handle_t *iph1; 108 struct xauth_state *xst = &iph1->mode_cfg->xauth; 112 if (!FSM_STATE_IS_ESTABLISHED(iph1->status)) { 155 isakmp_cfg_send(iph1, buffer, 166 xauth_attr_reply(iph1, attr, id) 167 phase1_handle_t *iph1; 174 struct xauth_state *xst = &iph1->mode_cfg->xauth; 176 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) { 245 strlcpy(iph1 325 phase1_handle_t *iph1; local [all...] |
H A D | isakmp.c | 416 phase1_handle_t *iph1; local 430 iph1 = ike_session_getph1byindex(session, index); 431 if (iph1 != NULL) { 434 iph1->side == INITIATOR) { 435 IPSECSESSIONTRACEREVENT(iph1->parent_session, 447 if (NATT_AVAILABLE(iph1) && 448 ! (iph1->natt_flags & NAT_PORTS_CHANGED) && 449 ((cmpsaddrstrict(iph1->remote, remote) != 0) || 450 (cmpsaddrstrict(iph1->local, local) != 0))) 453 racoon_free(iph1 721 phase1_handle_t *iph1; local 843 phase1_handle_t *iph1; local 951 ikev1_ph2begin_i(phase1_handle_t *iph1, phase2_handle_t *iph2) argument 996 ikev1_ph2begin_r(phase1_handle_t *iph1, vchar_t *msg) argument 1115 ikev1_phase1_established(phase1_handle_t *iph1) argument 1791 phase1_handle_t *iph1; local 2316 phase1_handle_t *iph1 = NULL; local 2458 phase1_handle_t *iph1; local 3153 isakmp_plist_set_all(struct payload_list **plist, phase1_handle_t *iph1) argument [all...] |
H A D | handler.c | 293 phase1_handle_t *iph1; local 295 /* create new iph1 */ 296 iph1 = racoon_calloc(1, sizeof(*iph1)); 297 if (iph1 == NULL) 299 iph1->version = version; 302 iph1->dpd_support = 0; 303 iph1->dpd_lastack = 0; 304 iph1->dpd_seq = 0; 305 iph1 321 ike_session_delph1(phase1_handle_t *iph1) argument 521 ike_session_getph2bymsgid(phase1_handle_t *iph1, u_int32_t msgid) argument 534 ike_session_getonlyph2(phase1_handle_t *iph1) argument 913 phase1_handle_t *iph1 = NULL; local 1392 phase1_handle_t *iph1 = NULL; local 1475 phase1_handle_t *iph1 = NULL; local [all...] |
H A D | nattraversal.c | 117 natt_hash_addr (phase1_handle_t *iph1, struct sockaddr_storage *addr) argument 125 if (iph1->approval) { 127 saddr2str((struct sockaddr *)addr), iph1->approval->hashtype, 128 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":""); 155 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t)); 159 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t)); 163 if (iph1->rmconf->nat_traversal == NATT_FORCE) 172 natd = oakley_hash (buf, iph1); 179 natt_compare_addr_hash (phase1_handle_t *iph1, vchar_t *natd_received, argument 186 if (iph1 443 natt_float_ports(phase1_handle_t *iph1) argument 470 natt_handle_vendorid(phase1_handle_t *iph1, int vid_numeric) argument [all...] |
H A D | isakmp_unity.c | 86 isakmp_unity_req(iph1, attr) 87 phase1_handle_t *iph1; 93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) { 144 reply_attr = isakmp_cfg_string(iph1, attr, buf); 150 reply_attr = isakmp_cfg_short(iph1, attr, 155 reply_attr = isakmp_cfg_short(iph1, attr, 160 reply_attr = isakmp_cfg_copy(iph1, attr); 164 reply_attr = isakmp_cfg_string(iph1, 170 reply_attr = isakmp_cfg_split(iph1, attr, 178 reply_attr = isakmp_cfg_split(iph1, att [all...] |
H A D | ike_session.c | 314 ike_session_init_traffic_cop_params (phase1_handle_t *iph1) argument 316 if (!iph1 || 317 !iph1->rmconf || 318 (!iph1->rmconf->idle_timeout && !iph1->rmconf->dpd_interval)) { 322 if (!iph1->parent_session->traffic_monitor.interv_idle) { 323 iph1->parent_session->traffic_monitor.interv_idle = iph1->rmconf->idle_timeout; 325 if (!iph1->parent_session->traffic_monitor.dir_idle) { 326 iph1 414 ike_session_link_phase1(ike_session_t *session, phase1_handle_t *iph1) argument 481 ike_session_link_ph2_to_ph1(phase1_handle_t *iph1, phase2_handle_t *iph2) argument 511 ike_session_unlink_phase1(phase1_handle_t *iph1) argument 566 ike_session_update_ph1_ph2tree(phase1_handle_t *iph1) argument 596 phase1_handle_t *iph1; local 616 phase1_handle_t *p, *iph1 = NULL; local 658 ike_session_has_other_established_ph1(ike_session_t *session, phase1_handle_t *iph1) argument 678 ike_session_has_other_negoing_ph1(ike_session_t *session, phase1_handle_t *iph1) argument 743 ike_session_ikev1_float_ports(phase1_handle_t *iph1) argument 887 ike_session_cleanup_ph1(phase1_handle_t *iph1) argument 1147 ike_session_purge_ph2s_by_ph1(phase1_handle_t *iph1) argument 1311 phase1_handle_t *iph1 = NULL; local 1434 phase1_handle_t *iph1 = NULL; local 1464 ike_session_is_client_ph1_rekey(phase1_handle_t *iph1) argument 1476 ike_session_is_client_ph1(phase1_handle_t *iph1) argument 1496 ike_session_start_xauth_timer(phase1_handle_t *iph1) argument 1510 ike_session_stop_xauth_timer(phase1_handle_t *iph1) argument 1787 ike_session_update_natt_version(phase1_handle_t *iph1) argument 1799 ike_session_get_natt_version(phase1_handle_t *iph1) argument 1912 phase1_handle_t *iph1 = NULL; local 2027 ike_session_ph1_retransmits(phase1_handle_t *iph1) argument 2048 ike_session_bindph12(phase1_handle_t *iph1, phase2_handle_t *iph2) argument 2089 ike_session_unbind_all_ph2_from_ph1(phase1_handle_t *iph1) argument [all...] |
H A D | oakley.h | 262 #define AUTHMETHOD(iph1) \ 263 (((iph1)->rmconf->xauth && \ 264 (iph1)->approval->authmethod == OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I) ? \ 265 FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I : (iph1)->approval->authmethod) 266 #define RMAUTHMETHOD(iph1) \ 267 (((iph1)->rmconf->xauth && \ 268 (iph1)->rmconf->proposal->authmethod == \ 271 (iph1)->rmconf->proposal->authmethod) 273 #define AUTHMETHOD(iph1) (iph1) [all...] |
H A D | isakmp_frag.c | 88 isakmp_sendfrags(iph1, buf) 89 phase1_handle_t *iph1; 104 size_t extralen = NON_ESP_MARKER_USE(iph1)? NON_ESP_MARKER_LEN : 0; 113 s = getsockmyaddr((struct sockaddr *)iph1->local); 151 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG); 187 iph1->local, iph1->remote, lcconf->count_persend) == -1) { 218 isakmp_frag_extract(iph1, msg) 219 phase1_handle_t *iph1; 284 current = iph1 [all...] |
H A D | vpn.c | 437 vpn_get_config(phase1_handle_t *iph1, struct vpnctl_status_phase_change **msg, size_t *msg_size) argument 448 if (((struct sockaddr_in *)iph1->local)->sin_family != AF_INET) { 454 if (iph1->mode_cfg->attr_list == NULL) 457 myaddr = find_myaddr((struct sockaddr *)iph1->local, 0); 466 msize += iph1->mode_cfg->attr_list->l; 477 params->outer_local_addr = ((struct sockaddr_in *)iph1->local)->sin_addr.s_addr; 484 memcpy(cptr, iph1->mode_cfg->attr_list->v, iph1->mode_cfg->attr_list->l); 499 phase1_handle_t *iph1; local 512 iph1 [all...] |
H A D | vpn_control.c | 610 vpncontrol_notify_need_authinfo(phase1_handle_t *iph1, void* attr_list, size_t attr_len) argument 620 if (!iph1) 634 if (iph1->remote->ss_family == AF_INET) 635 address = ((struct sockaddr_in *)iph1->remote)->sin_addr.s_addr; 641 if (!ike_session_is_client_ph1_rekey(iph1)) { 747 vpncontrol_notify_phase_change(int start, u_int16_t from, phase1_handle_t *iph1, phase2_handle_t *iph2) argument 756 if (iph1 && !start && iph1->mode_cfg && iph1->mode_cfg->xauth.status != XAUTHST_OK) { 757 if (vpn_get_config(iph1, 852 vpncontrol_notify_peer_resp_ph1(u_int16_t notify_code, phase1_handle_t *iph1) argument [all...] |
H A D | ipsec_doi.c | 161 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 168 ipsecdoi_checkph1proposal(sa, iph1) 170 phase1_handle_t *iph1; 181 newsa = get_ph1approval(iph1, pair); 188 iph1->sa_ret = newsa; 198 get_ph1approval(iph1, pair) 199 phase1_handle_t *iph1; 208 if (iph1->approval) { 209 delisakmpsa(iph1->approval); 210 iph1 2541 ipsecdoi_setph1proposal(phase1_handle_t *iph1) argument 2580 setph1prop(phase1_handle_t *iph1, caddr_t buf) argument [all...] |
H A D | fsm.h | 203 extern int fsm_ikev1_phase1_process_payloads (phase1_handle_t *iph1, vchar_t *msg); 205 extern int fsm_ikev1_phase1_send_response(phase1_handle_t *iph1, vchar_t *msg);
|
H A D | isakmp_var.h | 123 phase1_handle_t *iph1);
|
H A D | handler.h | 414 extern phase2_handle_t *ike_session_getonlyph2(phase1_handle_t *iph1);
|