/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_ident.c | 108 ident_i1send(iph1, msg) 109 struct ph1handle *iph1; 134 if (iph1->status != PHASE1ST_START) { 136 "status mismatched %d.\n", iph1->status); 141 memset(&iph1->index, 0, sizeof(iph1->index)); 142 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 145 iph1 [all...] |
H A D | isakmp_agg.c | 111 agg_i1send(iph1, msg) 112 struct ph1handle *iph1; 142 if (iph1->status != PHASE1ST_START) { 144 "status mismatched %d.\n", iph1->status); 149 memset(&iph1->index, 0, sizeof(iph1->index)); 150 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 153 if (ipsecdoi_setid1(iph1) < [all...] |
H A D | isakmp_base.c | 103 base_i1send(iph1, msg) 104 struct ph1handle *iph1; 131 if (iph1->status != PHASE1ST_START) { 133 "status mismatched %d.\n", iph1->status); 138 memset(&iph1->index, 0, sizeof(iph1->index)); 139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local); 142 if (ipsecdoi_setid1(iph1) < [all...] |
H A D | isakmp_newg.c | 69 isakmp_newgroup_r(iph1, msg) 70 struct ph1handle *iph1; 102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 103 plog(LLV_ERROR, LOCATION, iph1->remote, 113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 114 plog(LLV_ERROR, LOCATION, iph1->remote, 126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 127 plog(LLV_ERROR, LOCATION, iph1->remote, 138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL); 139 plog(LLV_ERROR, LOCATION, iph1 [all...] |
H A D | isakmp_inf.c | 121 isakmp_info_recv(iph1, msg0) 122 struct ph1handle *iph1; 147 if (iph1->ivm == NULL) { 148 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n"); 153 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid); 157 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive); 186 if (iph1->status != PHASE1ST_ESTABLISHED && 187 iph1->status != PHASE1ST_DYING) { 230 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload); 263 switch (iph1 619 struct ph1handle *iph1; local 693 struct ph1handle *iph1 = NULL; local 825 struct ph1handle *iph1 = iph2->ph1; local 1473 struct ph1handle *iph1 = container_of(sc, struct ph1handle, dpd_r_u); local [all...] |
H A D | oakley.c | 126 static int oakley_check_certid __P((struct ph1handle *iph1)); 420 oakley_prf(key, buf, iph1) 422 struct ph1handle *iph1; 427 if (iph1->approval == NULL) { 434 type = iph1->approval->hashtype; 450 oakley_hash(buf, iph1) 452 struct ph1handle *iph1; 457 if (iph1->approval == NULL) { 464 type = iph1->approval->hashtype; 728 oakley_compute_hashx(struct ph1handle *iph1, argument 2230 struct ph1handle *iph1; member in struct:append_cr_ctx [all...] |
H A D | isakmp_cfg.c | 139 isakmp_cfg_r(iph1, msg) 140 struct ph1handle *iph1; 170 if (iph1->mode_cfg->ivm == NULL || 171 iph1->mode_cfg->last_msgid != packet->msgid ) 172 iph1->mode_cfg->ivm = 173 isakmp_cfg_newiv(iph1, packet->msgid); 174 ivm = iph1->mode_cfg->ivm; 176 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive); 228 if ((check = oakley_compute_hash1(iph1, 251 isakmp_cfg_attr_r(iph1, packe [all...] |
H A D | handler.c | 114 int (* enum_func)(struct ph1handle *iph1, void *arg); 239 resolveph1rmconf(iph1) 240 struct ph1handle *iph1; 245 if (iph1->side == INITIATOR) 248 rmconf = getrmconf_by_ph1(iph1); 254 if (iph1->rmconf != NULL) { 255 if (rmconf != iph1->rmconf) { 261 iph1->rmconf = rmconf; 290 * the iph1 is new, migrate all phase2s that belong to a dying or dead ph1 292 void migrate_dying_ph12(iph1) 316 struct ph1handle *iph1; local 355 struct ph1handle *iph1; local 1246 struct ph1handle *iph1; local 1462 remove_ph1(struct ph1handle *iph1) argument [all...] |
H A D | gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) argument 162 sa = remote ? iph1->remote : iph1->local; 187 gssapi_init(struct ph1handle *iph1) argument 195 if (iph1->rmconf == NULL) { 208 gssapi_set_state(iph1, gps); 210 if (iph1->rmconf->proposal->gssid != NULL) { 211 id_token.length = iph1->rmconf->proposal->gssid->l; 212 id_token.value = iph1->rmconf->proposal->gssid->v; 217 gssapi_free_state(iph1); 280 gssapi_get_itoken(struct ph1handle *iph1, int *lenp) argument 351 gssapi_get_rtoken(struct ph1handle *iph1, int *lenp) argument 406 gssapi_save_received_token(struct ph1handle *iph1, vchar_t *token) argument 428 gssapi_get_token_to_send(struct ph1handle *iph1, vchar_t **token) argument 449 gssapi_get_itokens(struct ph1handle *iph1, vchar_t **tokens) argument 484 gssapi_get_rtokens(struct ph1handle *iph1, vchar_t **tokens) argument 522 gssapi_wraphash(struct ph1handle *iph1) argument 582 gssapi_unwraphash(struct ph1handle *iph1) argument 627 gssapi_set_id_sent(struct ph1handle *iph1) argument 637 gssapi_id_sent(struct ph1handle *iph1) argument 647 gssapi_set_id_rcvd(struct ph1handle *iph1) argument 657 gssapi_id_rcvd(struct ph1handle *iph1) argument 667 gssapi_free_state(struct ph1handle *iph1) argument 689 gssapi_get_id(struct ph1handle *iph1) argument [all...] |
H A D | isakmp.c | 399 struct ph1handle *iph1; local 454 iph1 = getph1byindex(index); 455 if (iph1 != NULL) { 458 iph1->side == INITIATOR) { 467 if (NATT_AVAILABLE(iph1) && 468 ! (iph1->natt_flags & NAT_PORTS_CHANGED) && 469 ((cmpsaddr(iph1->remote, remote) != CMPSADDR_MATCH) || 470 (cmpsaddr(iph1->local, local) != CMPSADDR_MATCH))) 473 racoon_free(iph1->remote); 474 racoon_free(iph1 1046 struct ph1handle *iph1; local 1144 struct ph1handle *iph1; local 1832 struct ph1handle *iph1 = container_of(p, struct ph1handle, scr); local 2163 struct ph1handle *iph1 = NULL; local 2359 struct ph1handle *iph1; local 2653 set_isakmp_header(vchar_t *vbuf, struct ph1handle *iph1, int nptype, u_int8_t etype, u_int8_t flags, u_int32_t msgid) argument 3028 isakmp_plist_set_all(struct payload_list **plist, struct ph1handle *iph1) argument [all...] |
H A D | nattraversal.c | 123 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr) argument 132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE) 136 saddr2str(addr), iph1->approval->hashtype, 163 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t)); 167 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t)); 180 natd = oakley_hash (buf, iph1); 187 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, argument 194 if (iph1->rmconf != NULL && 195 iph1 293 natt_float_ports(struct ph1handle *iph1) argument 319 natt_handle_vendorid(struct ph1handle *iph1, int vid_numeric) argument 434 natt_keepalive_add_ph1(struct ph1handle *iph1) argument [all...] |
H A D | isakmp_frag.c | 82 isakmp_sendfrags(iph1, buf) 83 struct ph1handle *iph1; 134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG); 151 if (isakmp_send(iph1, frag) < 0) { 177 isakmp_frag_insert(struct ph1handle *iph1, struct isakmp_frag_item *item) argument 180 struct isakmp_frag_item *citem = iph1->frag_chain; 183 if (iph1->frag_chain == NULL) { 184 iph1->frag_chain = item; 199 iph1->frag_chain = item; 214 isakmp_frag_extract(iph1, ms [all...] |
H A D | nattraversal.h | 79 vchar_t *natt_hash_addr(struct ph1handle *iph1, struct sockaddr *addr); 80 int natt_compare_addr_hash(struct ph1handle *iph1, vchar_t *natd_received, int natd_seq); 83 void natt_float_ports(struct ph1handle *iph1); 84 void natt_handle_vendorid(struct ph1handle *iph1, int vid_numeric); 92 int natt_keepalive_add_ph1(struct ph1handle *iph1);
|
H A D | isakmp_unity.c | 89 isakmp_unity_req(iph1, attr) 90 struct ph1handle *iph1; 96 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) { 147 reply_attr = isakmp_cfg_string(iph1, attr, buf); 153 reply_attr = isakmp_cfg_short(iph1, attr, 158 reply_attr = isakmp_cfg_short(iph1, attr, 163 reply_attr = isakmp_cfg_copy(iph1, attr); 167 reply_attr = isakmp_cfg_string(iph1, 173 reply_attr = isakmp_cfg_split(iph1, attr, 181 reply_attr = isakmp_cfg_split(iph1, att [all...] |
H A D | isakmp_xauth.c | 121 xauth_sendreq(iph1) 122 struct ph1handle *iph1; 129 struct xauth_state *xst = &iph1->mode_cfg->xauth; 133 if (iph1->status < PHASE1ST_ESTABLISHED) { 176 isakmp_cfg_send(iph1, buffer, 187 xauth_attr_reply(iph1, attr, id) 188 struct ph1handle *iph1; 195 struct xauth_state *xst = &iph1->mode_cfg->xauth; 197 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) { 266 strncpy(iph1 363 struct ph1handle *iph1; local 375 xauth_reply(struct ph1handle *iph1, int port, int id, int res) argument [all...] |
H A D | rsalist.c | 189 struct ph1handle *iph1; member in struct:lookup_result 201 local_score = naddr_score(key->src, req->iph1->local); 202 remote_score = naddr_score(key->dst, req->iph1->remote); 224 rsa_lookup_keys(struct ph1handle *iph1, int my) argument 230 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote)); 232 r.iph1 = iph1; 237 list = iph1->rmconf->rsa_private; 239 list = iph1 [all...] |
H A D | vendorid.c | 249 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen) argument 257 iph1->vendorid_mask |= BIT(vid_numeric); 261 natt_handle_vendorid(iph1, vid_numeric); 266 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH; 269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY; 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) { 278 iph1->dpd_support = 1;
|
H A D | rsalist.h | 60 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
|
H A D | admin.c | 168 static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg) argument 170 if (iph1->status >= PHASE1ST_ESTABLISHED) 171 isakmp_info_send_d1(iph1); 172 purge_remote(iph1); 255 struct ph1handle *iph1; local 266 iph1 = getph1byaddr(src, dst, 0); 267 if (iph1 == NULL) { 272 if (iph1->cert_p != NULL) { 274 tmp.v = iph1->cert_p->v + 1; 275 tmp.l = iph1 349 struct ph1handle *iph1; local [all...] |
H A D | remoteconf.c | 288 void rmconf_selector_from_ph1(rmsel, iph1) 290 struct ph1handle *iph1; 294 rmsel->remote = iph1->remote; 295 rmsel->etype = iph1->etype; 296 rmsel->approval = iph1->approval; 297 rmsel->identity = iph1->id_p; 298 rmsel->certificate_request = iph1->cr_p; 418 getrmconf_by_ph1(iph1) 419 struct ph1handle *iph1; 424 rmconf_selector_from_ph1(&ctx.sel, iph1); [all...] |
H A D | ipsec_doi.c | 167 * the pointer to one of isakmpsa in proposal is set into iph1->approval. 174 ipsecdoi_checkph1proposal(sa, iph1) 176 struct ph1handle *iph1; 189 newsa = get_ph1approval(iph1, doitype, sittype, pair); 195 iph1->sa_ret = newsa; 239 get_ph1approval(iph1, doitype, sittype, pair) 240 struct ph1handle *iph1; 252 rmsel.remote = iph1->remote; 254 if (iph1->approval) { 255 delisakmpsa(iph1 [all...] |
H A D | remoteconf.h | 187 struct ph1handle *iph1)); 200 extern struct remoteconf *getrmconf_by_ph1 __P((struct ph1handle *iph1));
|
H A D | isakmp_var.h | 121 struct ph1handle *iph1));
|
H A D | handler.h | 468 int (* enum_func)(struct ph1handle *iph1, void *arg), 488 extern void migrate_dying_ph12 __P((struct ph1handle *iph1));
|
H A D | pfkey.c | 2847 * 6) Update of IKE addresses in Phase 1 (iph1->local and iph1->remote) 2878 migrate_ph1_ike_addresses(iph1, arg) 2879 struct ph1handle *iph1; 2887 if (cmpsaddr(iph1->local, ma->local) == CMPSADDR_MATCH && 2888 cmpsaddr(iph1->remote, ma->remote) == CMPSADDR_MATCH) 2891 if (iph1->status < PHASE1ST_ESTABLISHED) { 2905 iph1->status = PHASE1ST_EXPIRED; 2906 isakmp_ph1delete(iph1); 2928 if (iph1 2981 struct ph1handle *iph1; local 3312 struct ph1handle *iph1; local 3367 struct ph1handle *iph1; local [all...] |