/netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_quick.c | 114 quick_timeover(iph2) in quick_timeover() argument 115 struct ph2handle *iph2; in quick_timeover() 119 saddrwop2str(iph2->dst)); 122 if (iph2->side == INITIATOR) 123 pk_sendeacquire(iph2); 125 remph2(iph2); 126 delph2(iph2); 136 quick_i1prep(iph2, msg) in quick_i1prep() argument 137 struct ph2handle *iph2; in quick_i1prep() 143 if (iph2->status != PHASE2ST_STATUS2) { [all …]
|
H A D | handler.c | 665 struct ph2handle *iph2; local 668 LIST_FOREACH(iph2, &ph2tree, chain) { 669 if (iph2->proposal == NULL && iph2->approval == NULL) 671 if (iph2->approval != NULL) { 672 for (pr = iph2->approval->head; pr != NULL; 677 return iph2; 679 } else if (iph2->proposal != NULL) { 680 for (pr = iph2->proposal->head; pr != NULL; 685 return iph2; 699 struct ph2handle *iph2 = NULL; in newph2() local [all …]
|
H A D | isakmp.c | 656 struct ph2handle *iph2; local 691 iph2 = getph2bymsgid(iph1, msgid); 692 if (iph2 == NULL) { 708 iph2->flags |= ISAKMP_FLAG_C; 711 if (quick_main(iph2, msg) < 0) { 714 remph2(iph2); 715 delph2(iph2); 963 quick_main(iph2, msg) in quick_main() argument 964 struct ph2handle *iph2; in quick_main() 974 if (iph2->status == PHASE2ST_ESTABLISHED [all …]
|
H A D | pfkey.c | 893 pk_sendgetspi(iph2) in pk_sendgetspi() argument 894 struct ph2handle *iph2; in pk_sendgetspi() 904 if (iph2->side == INITIATOR) 905 pp = iph2->proposal; 907 pp = iph2->approval; 909 if (iph2->sa_src && iph2->sa_dst) { 911 src = dupsaddr(iph2->sa_src); 912 dst = dupsaddr(iph2->sa_dst); 915 src = dupsaddr(iph2->src); 916 dst = dupsaddr(iph2->dst); [all …]
|
H A D | isakmp_inf.c | 616 isakmp_info_send_d2(iph2) in isakmp_info_send_d2() argument 617 struct ph2handle *iph2; in isakmp_info_send_d2() 627 if (iph2->status != PHASE2ST_ESTABLISHED) 634 iph1 = getph1byaddr(iph2->src, iph2->dst, 0); 642 for (pr = iph2->approval->head; pr != NULL; pr = pr->next) { 820 isakmp_info_send_n2(iph2, type, data) in isakmp_info_send_n2() argument 821 struct ph2handle *iph2; in isakmp_info_send_n2() 825 struct ph1handle *iph1 = iph2->ph1; 832 if (!iph2->approval) 835 pr = iph2->approval->head; [all …]
|
H A D | admin.c | 489 struct ph2handle *iph2; local 517 iph2 = getph2byid(src, dst, sp_out->id); 518 if (iph2 != NULL) { 519 event_list = &iph2->evt_listeners; 520 if (iph2->status == PHASE2ST_ESTABLISHED) 550 iph2 = newph2(); 551 if (iph2 == NULL) { 556 iph2->side = INITIATOR; 557 iph2->satype = admin2pfkey_proto(com->ac_proto); 558 iph2->spid = sp_out->id; [all …]
|
H A D | isakmp_cfg.c | 1162 struct ph2handle *iph2 = NULL; local 1181 iph2 = newph2(); 1182 if (iph2 == NULL) 1185 iph2->dst = dupsaddr(iph1->remote); 1186 if (iph2->dst == NULL) { 1187 delph2(iph2); 1190 iph2->src = dupsaddr(iph1->local); 1191 if (iph2->src == NULL) { 1192 delph2(iph2); 1196 iph2->side = INITIATOR; [all …]
|
H A D | proposal.c | 1032 set_proposal_from_policy(iph2, sp_main, sp_sub) in set_proposal_from_policy() argument 1033 struct ph2handle *iph2; in set_proposal_from_policy() 1047 newpp->lifetime = iph2->sainfo->lifetime; 1048 newpp->lifebyte = iph2->sainfo->lifebyte; 1049 newpp->pfs_group = iph2->sainfo->pfs_group; 1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1065 encmodesv += iph2->ph1->natt_options->mode_udp_diff; 1088 if (iph2->side == INITIATOR) 1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1112 iph2->ph1->natt_options->mode_udp_diff; [all …]
|
H A D | ipsec_doi.c | 741 ipsecdoi_selectph2proposal(iph2) in ipsecdoi_selectph2proposal() argument 742 struct ph2handle *iph2; in ipsecdoi_selectph2proposal() 749 pair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2, 755 ret = get_ph2approval(iph2, pair); 762 iph2->sa_ret = get_sabyproppair(doitype, sittype, ret); 764 if (iph2->sa_ret == NULL) 778 ipsecdoi_checkph2proposal(iph2) in ipsecdoi_checkph2proposal() argument 779 struct ph2handle *iph2; in ipsecdoi_checkph2proposal() 789 spair = get_proppair_and_doi_sit(iph2->sa, IPSECDOI_TYPE_PH2, 800 rpair = get_proppair(iph2->sa_ret, IPSECDOI_TYPE_PH2); [all …]
|
H A D | security.c | 164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument 165 struct ph2handle *iph2; in set_secctx_in_proposal() 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
H A D | policy.c | 108 getsp_r(spidx, iph2) in getsp_r() argument 110 struct ph2handle *iph2; 141 saddr2str(iph2->src)); 145 if (cmpsaddr(iph2->src, (struct sockaddr *) &spidx->src) != CMPSADDR_MATCH || 150 saddr2str(iph2->dst)); 154 if (cmpsaddr(iph2->dst, (struct sockaddr *) &spidx->dst) != CMPSADDR_MATCH ||
|
H A D | oakley.c | 481 oakley_compute_keymat(iph2, side) in oakley_compute_keymat() argument 482 struct ph2handle *iph2; in oakley_compute_keymat() 488 if (iph2->approval->pfs_group && iph2->dhpub_p) { 489 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub, 490 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0) 495 if (oakley_compute_keymat_x(iph2, side, INBOUND_SA) < 0 496 || oakley_compute_keymat_x(iph2, side, OUTBOUND_SA) < 0) 517 oakley_compute_keymat_x(iph2, side, sa_dir) in oakley_compute_keymat_x() argument 518 struct ph2handle *iph2; in oakley_compute_keymat_x() 532 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0); [all …]
|
H A D | ipsec_doi.h | 222 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
|
H A D | racoonctl.c | 1148 struct ph2handle *iph2; local 1171 iph2 = (struct ph2handle *)buf; 1172 addr = (struct sockaddr *)(++iph2);
|
H A D | handler.h | 500 int (* enum_func)(struct ph2handle *iph2, void *arg),
|
/netbsd-src/crypto/dist/ipsec-tools/ |
H A D | ChangeLog.old | 27 * src/racoon/isakmp_quick.c: Fixed iph2->id / id_p checks in 1026 * src/racoon/isakmp_inf.c: use iph2->generated_spidx to check if 1028 * src/racoon/isakmp_quick.c: sets iph2->generated_spidx for
|