Home
last modified time | relevance | path

Searched refs:iph2 (Results 1 – 16 of 16) sorted by relevance

/netbsd-src/crypto/dist/ipsec-tools/src/racoon/
H A Disakmp_quick.c114 quick_timeover(iph2) in quick_timeover() argument
115 struct ph2handle *iph2; in quick_timeover()
119 saddrwop2str(iph2->dst));
122 if (iph2->side == INITIATOR)
123 pk_sendeacquire(iph2);
125 remph2(iph2);
126 delph2(iph2);
136 quick_i1prep(iph2, msg) in quick_i1prep() argument
137 struct ph2handle *iph2; in quick_i1prep()
143 if (iph2->status != PHASE2ST_STATUS2) {
[all …]
H A Dhandler.c665 struct ph2handle *iph2; local
668 LIST_FOREACH(iph2, &ph2tree, chain) {
669 if (iph2->proposal == NULL && iph2->approval == NULL)
671 if (iph2->approval != NULL) {
672 for (pr = iph2->approval->head; pr != NULL;
677 return iph2;
679 } else if (iph2->proposal != NULL) {
680 for (pr = iph2->proposal->head; pr != NULL;
685 return iph2;
699 struct ph2handle *iph2 = NULL; in newph2() local
[all …]
H A Disakmp.c656 struct ph2handle *iph2; local
691 iph2 = getph2bymsgid(iph1, msgid);
692 if (iph2 == NULL) {
708 iph2->flags |= ISAKMP_FLAG_C;
711 if (quick_main(iph2, msg) < 0) {
714 remph2(iph2);
715 delph2(iph2);
963 quick_main(iph2, msg) in quick_main() argument
964 struct ph2handle *iph2; in quick_main()
974 if (iph2->status == PHASE2ST_ESTABLISHED
[all …]
H A Dpfkey.c893 pk_sendgetspi(iph2) in pk_sendgetspi() argument
894 struct ph2handle *iph2; in pk_sendgetspi()
904 if (iph2->side == INITIATOR)
905 pp = iph2->proposal;
907 pp = iph2->approval;
909 if (iph2->sa_src && iph2->sa_dst) {
911 src = dupsaddr(iph2->sa_src);
912 dst = dupsaddr(iph2->sa_dst);
915 src = dupsaddr(iph2->src);
916 dst = dupsaddr(iph2->dst);
[all …]
H A Disakmp_inf.c616 isakmp_info_send_d2(iph2) in isakmp_info_send_d2() argument
617 struct ph2handle *iph2; in isakmp_info_send_d2()
627 if (iph2->status != PHASE2ST_ESTABLISHED)
634 iph1 = getph1byaddr(iph2->src, iph2->dst, 0);
642 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) {
820 isakmp_info_send_n2(iph2, type, data) in isakmp_info_send_n2() argument
821 struct ph2handle *iph2; in isakmp_info_send_n2()
825 struct ph1handle *iph1 = iph2->ph1;
832 if (!iph2->approval)
835 pr = iph2->approval->head;
[all …]
H A Dadmin.c489 struct ph2handle *iph2; local
517 iph2 = getph2byid(src, dst, sp_out->id);
518 if (iph2 != NULL) {
519 event_list = &iph2->evt_listeners;
520 if (iph2->status == PHASE2ST_ESTABLISHED)
550 iph2 = newph2();
551 if (iph2 == NULL) {
556 iph2->side = INITIATOR;
557 iph2->satype = admin2pfkey_proto(com->ac_proto);
558 iph2->spid = sp_out->id;
[all …]
H A Disakmp_cfg.c1162 struct ph2handle *iph2 = NULL; local
1181 iph2 = newph2();
1182 if (iph2 == NULL)
1185 iph2->dst = dupsaddr(iph1->remote);
1186 if (iph2->dst == NULL) {
1187 delph2(iph2);
1190 iph2->src = dupsaddr(iph1->local);
1191 if (iph2->src == NULL) {
1192 delph2(iph2);
1196 iph2->side = INITIATOR;
[all …]
H A Dproposal.c1032 set_proposal_from_policy(iph2, sp_main, sp_sub) in set_proposal_from_policy() argument
1033 struct ph2handle *iph2; in set_proposal_from_policy()
1047 newpp->lifetime = iph2->sainfo->lifetime;
1048 newpp->lifebyte = iph2->sainfo->lifebyte;
1049 newpp->pfs_group = iph2->sainfo->pfs_group;
1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED))
1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff;
1088 if (iph2->side == INITIATOR)
1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED))
1112 iph2->ph1->natt_options->mode_udp_diff;
[all …]
H A Dipsec_doi.c741 ipsecdoi_selectph2proposal(iph2) in ipsecdoi_selectph2proposal() argument
742 struct ph2handle *iph2; in ipsecdoi_selectph2proposal()
749 pair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2,
755 ret = get_ph2approval(iph2, pair);
762 iph2->sa_ret = get_sabyproppair(doitype, sittype, ret);
764 if (iph2->sa_ret == NULL)
778 ipsecdoi_checkph2proposal(iph2) in ipsecdoi_checkph2proposal() argument
779 struct ph2handle *iph2; in ipsecdoi_checkph2proposal()
789 spair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2,
800 rpair = get_proppair(iph2->sa_ret, IPSECDOI_TYPE_PH2);
[all …]
H A Dsecurity.c164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument
165 struct ph2handle *iph2; in set_secctx_in_proposal()
168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi;
169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg;
170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen;
171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
H A Dpolicy.c108 getsp_r(spidx, iph2) in getsp_r() argument
110 struct ph2handle *iph2;
141 saddr2str(iph2->src));
145 if (cmpsaddr(iph2->src, (struct sockaddr *) &spidx->src) != CMPSADDR_MATCH ||
150 saddr2str(iph2->dst));
154 if (cmpsaddr(iph2->dst, (struct sockaddr *) &spidx->dst) != CMPSADDR_MATCH ||
H A Doakley.c481 oakley_compute_keymat(iph2, side) in oakley_compute_keymat() argument
482 struct ph2handle *iph2; in oakley_compute_keymat()
488 if (iph2->approval->pfs_group && iph2->dhpub_p) {
489 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub,
490 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0)
495 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < 0
496 || oakley_compute_keymat_x(iph2, side, OUTBOUND_SA) < 0)
517 oakley_compute_keymat_x(iph2, side, sa_dir) in oakley_compute_keymat_x() argument
518 struct ph2handle *iph2; in oakley_compute_keymat_x()
532 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0);
[all …]
H A Dipsec_doi.h222 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
H A Dracoonctl.c1148 struct ph2handle *iph2; local
1171 iph2 = (struct ph2handle *)buf;
1172 addr = (struct sockaddr *)(++iph2);
H A Dhandler.h500 int (* enum_func)(struct ph2handle *iph2, void *arg),
/netbsd-src/crypto/dist/ipsec-tools/
H A DChangeLog.old27 * src/racoon/isakmp_quick.c: Fixed iph2->id / id_p checks in
1026 * src/racoon/isakmp_inf.c: use iph2->generated_spidx to check if
1028 * src/racoon/isakmp_quick.c: sets iph2->generated_spidx for