/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_ident.c | 108 ident_i1send(iph1, msg) 109 struct ph1handle *iph1; 134 if (iph1->status != PHASE1ST_START) { 136 "status mismatched %d.\n", iph1->status); 141 memset(&iph1->index, 0, sizeof(iph1->index)); 142 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 145 iph1 [all...] |
H A D | isakmp_agg.c | 111 agg_i1send(iph1, msg) 112 struct ph1handle *iph1; 142 if (iph1->status != PHASE1ST_START) { 144 "status mismatched %d.\n", iph1->status); 149 memset(&iph1->index, 0, sizeof(iph1->index)); 150 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 153 if (ipsecdoi_setid1(iph1) < [all...] |
H A D | isakmp_base.c | 103 base_i1send(iph1, msg) 104 struct ph1handle *iph1; 131 if (iph1->status != PHASE1ST_START) { 133 "status mismatched %d.\n", iph1->status); 138 memset(&iph1->index, 0, sizeof(iph1->index)); 139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 142 if (ipsecdoi_setid1(iph1) < [all...] |
H A D | isakmp_newg.c | 69 isakmp_newgroup_r(iph1, msg) 70 struct ph1handle *iph1; 102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 103 plog(LLV_ERROR, LOCATION, iph1->remote, 113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 114 plog(LLV_ERROR, LOCATION, iph1->remote, 126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 127 plog(LLV_ERROR, LOCATION, iph1->remote, 138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 139 plog(LLV_ERROR, LOCATION, iph1 [all...] |
H A D | isakmp_inf.c | 123 isakmp_info_recv(iph1, msg0) 124 struct ph1handle *iph1; 149 if (iph1->ivm == NULL) { 150 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n"); 155 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid); 159 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive); 188 if (iph1->status != PHASE1ST_ESTABLISHED && 189 iph1->status != PHASE1ST_DYING) { 232 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload); 265 switch (iph1 624 struct ph1handle *iph1; local 698 struct ph1handle *iph1 = NULL; local 829 struct ph1handle *iph1 = iph2->ph1; local 1083 struct ph1handle *iph1; local 1495 struct ph1handle *iph1 = container_of(sc, struct ph1handle, dpd_r_u); local [all...] |
H A D | oakley.c | 126 static int oakley_check_certid __P((struct ph1handle *iph1)); 422 oakley_prf(key, buf, iph1) 424 struct ph1handle *iph1; 429 if (iph1->approval == NULL) { 436 type = iph1->approval->hashtype; 452 oakley_hash(buf, iph1) 454 struct ph1handle *iph1; 459 if (iph1->approval == NULL) { 466 type = iph1->approval->hashtype; 730 oakley_compute_hashx(struct ph1handle *iph1, argument 2247 struct ph1handle *iph1; member in struct:append_cr_ctx [all...] |
H A D | isakmp_cfg.c | 139 isakmp_cfg_r(iph1, msg) 140 struct ph1handle *iph1; 170 if (iph1->mode_cfg->ivm == NULL || 171 iph1->mode_cfg->last_msgid != packet->msgid ) 172 iph1->mode_cfg->ivm = 173 isakmp_cfg_newiv(iph1, packet->msgid); 174 ivm = iph1->mode_cfg->ivm; 176 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive); 228 if ((check = oakley_compute_hash1(iph1, 251 isakmp_cfg_attr_r(iph1, packe [all...] |
H A D | handler.c | 114 int (* enum_func)(struct ph1handle *iph1, void *arg); 239 resolveph1rmconf(iph1) 240 struct ph1handle *iph1; 245 if (iph1->side == INITIATOR) 248 rmconf = getrmconf_by_ph1(iph1); 254 if (iph1->rmconf != NULL) { 255 if (rmconf != iph1->rmconf) { 261 iph1->rmconf = rmconf; 290 * the iph1 is new, migrate all phase2s that belong to a dying or dead ph1 292 void migrate_dying_ph12(iph1) 316 struct ph1handle *iph1; local 355 struct ph1handle *iph1; local 1247 struct ph1handle *iph1; local 1463 remove_ph1(struct ph1handle *iph1) argument [all...] |
H A D | gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) argument 162 sa = remote ? iph1->remote : iph1->local; 187 gssapi_init(struct ph1handle *iph1) argument 203 gssapi_set_state(iph1, gps); 205 if (iph1->rmconf->proposal->gssid != NULL) { 206 id_token.length = iph1->rmconf->proposal->gssid->l; 207 id_token.value = iph1->rmconf->proposal->gssid->v; 212 gssapi_free_state(iph1); 216 gssapi_get_default_name(iph1, 275 gssapi_get_itoken(struct ph1handle *iph1, int *lenp) argument 346 gssapi_get_rtoken(struct ph1handle *iph1, int *lenp) argument 401 gssapi_save_received_token(struct ph1handle *iph1, vchar_t *token) argument 423 gssapi_get_token_to_send(struct ph1handle *iph1, vchar_t **token) argument 444 gssapi_get_itokens(struct ph1handle *iph1, vchar_t **tokens) argument 479 gssapi_get_rtokens(struct ph1handle *iph1, vchar_t **tokens) argument 517 gssapi_wraphash(struct ph1handle *iph1) argument 577 gssapi_unwraphash(struct ph1handle *iph1) argument 622 gssapi_set_id_sent(struct ph1handle *iph1) argument 632 gssapi_id_sent(struct ph1handle *iph1) argument 642 gssapi_set_id_rcvd(struct ph1handle *iph1) argument 652 gssapi_id_rcvd(struct ph1handle *iph1) argument 662 gssapi_free_state(struct ph1handle *iph1) argument 684 gssapi_get_id(struct ph1handle *iph1) argument [all...] |
H A D | isakmp.c | 401 struct ph1handle *iph1; local 456 iph1 = getph1byindex(index); 457 if (iph1 != NULL) { 460 iph1->side == INITIATOR) { 469 if (NATT_AVAILABLE(iph1) && 470 ! (iph1->natt_flags & NAT_PORTS_CHANGED) && 471 ((cmpsaddr(iph1->remote, remote) != CMPSADDR_MATCH) || 472 (cmpsaddr(iph1->local, local) != CMPSADDR_MATCH))) 475 racoon_free(iph1->remote); 476 racoon_free(iph1 1040 struct ph1handle *iph1; local 1137 struct ph1handle *iph1; local 1825 struct ph1handle *iph1 = container_of(p, struct ph1handle, scr); local 2158 struct ph1handle *iph1 = NULL; local 2354 struct ph1handle *iph1; local 3028 isakmp_plist_set_all(struct payload_list **plist, struct ph1handle *iph1) argument [all...] |
H A D | nattraversal.c | 123 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr) argument 132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE) 136 saddr2str(addr), iph1->approval->hashtype, 163 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t)); 167 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t)); 180 natd = oakley_hash (buf, iph1); 187 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, argument 194 if (iph1->rmconf != NULL && 195 iph1 294 natt_float_ports(struct ph1handle *iph1) argument 320 natt_handle_vendorid(struct ph1handle *iph1, int vid_numeric) argument 435 natt_keepalive_add_ph1(struct ph1handle *iph1) argument [all...] |
H A D | nattraversal.h | 78 vchar_t *natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr); 79 int natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, int natd_seq); 82 void natt_float_ports (struct ph1handle *iph1); 83 void natt_handle_vendorid (struct ph1handle *iph1, int vid_numeric); 93 int natt_keepalive_add_ph1 (struct ph1handle *iph1);
|
H A D | isakmp_unity.c | 89 isakmp_unity_req(iph1, attr) 90 struct ph1handle *iph1; 96 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) { 147 reply_attr = isakmp_cfg_string(iph1, attr, buf); 153 reply_attr = isakmp_cfg_short(iph1, attr, 158 reply_attr = isakmp_cfg_short(iph1, attr, 163 reply_attr = isakmp_cfg_copy(iph1, attr); 167 reply_attr = isakmp_cfg_string(iph1, 173 reply_attr = isakmp_cfg_split(iph1, attr, 181 reply_attr = isakmp_cfg_split(iph1, att [all...] |
H A D | isakmp_frag.c | 82 isakmp_sendfrags(iph1, buf) 83 struct ph1handle *iph1; 134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG); 151 if (isakmp_send(iph1, frag) < 0) { 177 isakmp_frag_extract(iph1, msg) 178 struct ph1handle *iph1; 231 if (iph1->frag_chain == NULL) { 232 iph1->frag_chain = item; 236 current = iph1->frag_chain; 248 item = iph1 [all...] |
H A D | isakmp_xauth.c | 121 xauth_sendreq(iph1) 122 struct ph1handle *iph1; 129 struct xauth_state *xst = &iph1->mode_cfg->xauth; 133 if (iph1->status < PHASE1ST_ESTABLISHED) { 176 isakmp_cfg_send(iph1, buffer, 187 xauth_attr_reply(iph1, attr, id) 188 struct ph1handle *iph1; 195 struct xauth_state *xst = &iph1->mode_cfg->xauth; 197 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) { 266 strncpy(iph1 363 struct ph1handle *iph1; local 375 xauth_reply(struct ph1handle *iph1, int port, int id, int res) argument [all...] |
H A D | rsalist.c | 187 struct ph1handle *iph1; member in struct:lookup_result 199 local_score = naddr_score(key->src, req->iph1->local); 200 remote_score = naddr_score(key->dst, req->iph1->remote); 222 rsa_lookup_keys(struct ph1handle *iph1, int my) argument 228 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote)); 230 r.iph1 = iph1; 235 list = iph1->rmconf->rsa_private; 237 list = iph1 [all...] |
H A D | vendorid.c | 252 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen) argument 260 iph1->vendorid_mask |= BIT(vid_numeric); 264 natt_handle_vendorid(iph1, vid_numeric); 269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH; 272 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY; 280 (iph1->rmconf == NULL || iph1->rmconf->dpd)) { 281 iph1->dpd_support = 1;
|
H A D | admin.c | 170 static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg) argument 172 if (iph1->status >= PHASE1ST_ESTABLISHED) 173 isakmp_info_send_d1(iph1); 174 purge_remote(iph1); 257 struct ph1handle *iph1; local 268 iph1 = getph1byaddr(src, dst, 0); 269 if (iph1 == NULL) { 274 if (iph1->cert_p != NULL) { 276 tmp.v = iph1->cert_p->v + 1; 277 tmp.l = iph1 330 struct ph1handle *iph1; local 352 struct ph1handle *iph1; local [all...] |
H A D | rsalist.h | 60 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
|
H A D | remoteconf.c | 294 void rmconf_selector_from_ph1(rmsel, iph1) 296 struct ph1handle *iph1; 300 rmsel->remote = iph1->remote; 301 rmsel->etype = iph1->etype; 302 rmsel->approval = iph1->approval; 303 rmsel->identity = iph1->id_p; 304 rmsel->certificate_request = iph1->cr_p; 427 getrmconf_by_ph1(iph1) 428 struct ph1handle *iph1; 433 rmconf_selector_from_ph1(&ctx.sel, iph1); [all...] |
H A D | ipsec_doi.c | 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 174 ipsecdoi_checkph1proposal(sa, iph1) 176 struct ph1handle *iph1; 189 newsa = get_ph1approval(iph1, doitype, sittype, pair); 195 iph1->sa_ret = newsa; 241 get_ph1approval(iph1, doitype, sittype, pair) 242 struct ph1handle *iph1; 254 rmsel.remote = iph1->remote; 256 if (iph1->approval) { 257 delisakmpsa(iph1 [all...] |
H A D | remoteconf.h | 187 struct ph1handle *iph1)); 200 extern struct remoteconf *getrmconf_by_ph1 __P((struct ph1handle *iph1));
|
H A D | isakmp_var.h | 123 struct ph1handle *iph1));
|
H A D | handler.h | 467 int (* enum_func)(struct ph1handle *iph1, void *arg), 487 extern void migrate_dying_ph12 __P((struct ph1handle *iph1));
|
H A D | pfkey.c | 2845 * 6) Update of IKE addresses in Phase 1 (iph1->local and iph1->remote) 2876 migrate_ph1_ike_addresses(iph1, arg) 2877 struct ph1handle *iph1; 2885 if (cmpsaddr(iph1->local, ma->local) == CMPSADDR_MATCH && 2886 cmpsaddr(iph1->remote, ma->remote) == CMPSADDR_MATCH) 2889 if (iph1->status < PHASE1ST_ESTABLISHED) { 2903 iph1->status = PHASE1ST_EXPIRED; 2904 isakmp_ph1delete(iph1); 2926 if (iph1 2979 struct ph1handle *iph1; local 3310 struct ph1handle *iph1; local 3365 struct ph1handle *iph1; local [all...] |