/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | proposal.c | 396 * with the same proto_id 403 if (pr1->proto_id == pr2->proto_id) 411 if (pr2->proto_id == pr1->proto_id) 420 if (pr1->proto_id != pr2->proto_id) { 422 "proto_id mismatched: " 424 s_ipsecdoi_proto(pr2->proto_id), 425 s_ipsecdoi_proto(pr1->proto_id)); [all...] |
H A D | isakmp.h | 210 u_int8_t proto_id; /* Protocol */ member in struct:isakmp_pl_p 319 u_int8_t proto_id; /* Protocol-ID */ member in struct:isakmp_pl_n 385 u_int8_t proto_id; /* Protocol-Id */ member in struct:isakmp_pl_d 441 u_int8_t proto_id; /* Protocol-Id */ member in struct:isakmp_pl_ru 453 u_int8_t proto_id; /* Protocol-Id */ member in struct:isakmp_pl_lb 465 u_int8_t proto_id; /* Protocol-Id */ member in struct:isakmp_pl_resp_lifetime
|
H A D | ipsec_doi.c | 310 prop->p_no, s_ipsecdoi_proto(prop->proto_id), 316 s_ipsecdoi_trns(prop->proto_id, trns->t_id)); 953 if (p->prop->proto_id != r->prop->proto_id) { 955 "proto_id mismathed: my:%d peer:%d\n", 956 r->prop->proto_id, p->prop->proto_id); 960 if (p->prop->proto_id != r->prop->proto_id) { 963 p->prop->proto_id); [all...] |
H A D | isakmp_inf.c | 140 "doi=%d proto_id=%d spi=%s(size=%d).\n", 141 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 171 "doi=%d proto_id=%d spi=%s(size=%d).\n", 172 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 528 "doi=%d proto_id=%d spi=%s(size=%d).\n", 530 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 658 s_ipsecdoi_proto(delete->proto_id)); 667 switch (delete->proto_id) { 672 "size %d(proto_id:%d)\n", 673 delete->spi_size, delete->proto_id); 1554 int proto_id, i; local [all...] |
H A D | pfkey_racoon.c | 771 pfkey_convertfromipsecdoi(iph2, proto_id, t_id, hashtype, 774 u_int proto_id; 784 switch (proto_id) { 918 satype = ipsecdoi2pfkey_proto(pr->proto_id); 921 "invalid proto_id %d\n", pr->proto_id); 975 int proto_id; local 1043 proto_id = pfkey2ipsecdoi_proto(msg->sadb_msg_satype); 1047 if (pr->proto_id == proto_id 1248 u_int proto_id, encmode, sa_mode; local 1647 u_int proto_id, sa_mode; local 2016 u_int proto_id; local [all...] |
H A D | proposal.h | 38 * A. chained list of transform, only for single proto_id 70 int proto_id; member in struct:saproto
|
H A D | handler.c | 607 ike_session_getph2bysaidx(struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int proto_id, u_int32_t spi) argument 620 if (proto_id != pr->proto_id) 628 if (proto_id != pr->proto_id) 641 ike_session_getph2bysaidx2(struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int proto_id, u_int32_t spi, u_int32_t *opposite_spi) argument 654 if (proto_id != pr->proto_id) 666 if (proto_id != pr->proto_id) 864 ike_session_deleteallph2(struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int proto_id) argument [all...] |
H A D | ipsec_doi.h | 161 u_int8_t proto_id; /* Protocol ID */ member in struct:ipsecdoi_pl_id::ipsecdoi_id_b
|
H A D | remoteconf.h | 65 int proto_id; /* for ipsec (isakmp?) */ member in struct:secprotospec
|
H A D | vpn.c | 251 u_int8_t proto_id; /* Protocol ID */ member in struct:id 314 id_ptr->proto_id = selector_ptr->ul_protocol; 325 id_ptr->proto_id = selector_ptr->ul_protocol;
|
H A D | handler.h | 422 extern phase2_handle_t *ike_session_getph2bysaidx2(struct sockaddr_storage *src, struct sockaddr_storage *dst, u_int proto_id, u_int32_t spi, u_int32_t *opposite_spi);
|
H A D | ike_session.c | 1044 ipsecdoi2pfkey_proto(pr->proto_id), 1213 if (pr->ok && pr->proto_id == IPSECDOI_PROTO_IPSEC_ESP) { 1524 u_int8_t proto_id; /* Protocol ID */ member in struct:id 1550 u_int8_t proto_id; /* Protocol ID */ member in struct:id 1572 u_int8_t proto_id; /* Protocol ID */ member in struct:id 1940 ipsecdoi2pfkey_proto(pr->proto_id),
|
H A D | isakmp_quick.c | 254 if (id->proto_id == 0 255 && id_p->proto_id == 0 558 || (idp_ptr->b.proto_id != 0 && idp_ptr->b.proto_id != id_ptr->proto_id) 1974 n->proto_id = iph2->approval->head->proto_id;
|
H A D | isakmp.c | 2260 ipsecdoi2pfkey_proto(pr->proto_id), 3259 u_int proto_id; 3330 proto_id = pfkey2ipsecdoi_proto(msg->sadb_msg_satype); 3331 iph2 = ike_session_getph2bysaidx(src, dst, proto_id, sa->sadb_sa_spi); 3675 np.proto_id = IPSECDOI_PROTO_ISAKMP; 3258 u_int proto_id; local
|
H A D | cfparse.y | 1105 id_b->proto_id = 0; 1135 id_b->proto_id = 0;
|
H A D | oakley.c | 681 p[0] = pr->proto_id; 706 switch (pr->proto_id) {
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | oakley.h | 114 u_int8_t proto_id; /* OAKLEY */
|
H A D | ipsec_doi.h | 128 u_int8_t proto_id; /* Protocol ID */ member in struct:ipsecdoi_id
|
H A D | print-eigrp.c | 147 u_int8_t proto_id; member in struct:eigrp_tlv_ip_ext_t 184 u_int8_t proto_id; member in struct:eigrp_tlv_at_ext_t 376 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_ip_ext->proto_id), 439 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_at_ext->proto_id),
|
H A D | print-isakmp.c | 916 if (id.proto_id) { 920 pe = getprotobynumber(id.proto_id);
|