| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.c | 95 rmconf_match_identity(struct remoteconf *rmconf, vchar_t *id_p) 105 if (!genlist_next(rmconf->idvl_p, 0)) 108 for (id = genlist_next(rmconf->idvl_p, &gpb); id; id = genlist_next(0, &gpb)) { 157 if (rmconf->verify_identifier) 164 rmconf_match_etype_and_approval(struct remoteconf *rmconf, int etype, 167 if (check_etypeok(rmconf, (void *) (intptr_t) etype) == 0) 174 approval->dh_group != rmconf->dh_group) 177 if (checkisakmpsa(rmconf->pcheck_level, approval, 178 rmconf->proposal) == NULL) 194 rmconf_match_type(struct rmconfselector *rmsel, struct remoteconf *rmconf) 333 struct remoteconf *rmconf; member in struct:rmconf_find_context 598 struct remoteconf *rmconf; local [all...] |
| remoteconf.h | 149 struct remoteconf *inherited_from; /* the original rmconf 167 #define RMCONF_NONCE_SIZE(rmconf) \ 168 (rmconf != NULL ? rmconf->nonce_size : DEFAULT_NONCE_SIZE) 189 int (* enum_func)(struct remoteconf *rmconf, void *arg), void *enum_arg); 196 extern int rmconf_match_identity(struct remoteconf *rmconf, vchar_t *id_p);
|
| nattraversal.c | 132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE) 194 if (iph1->rmconf != NULL && 195 iph1->rmconf->nat_traversal == NATT_FORCE) 312 natt_is_enabled(struct remoteconf *rmconf, void *args __unused) 314 if (rmconf->nat_traversal) 322 if (iph1->rmconf == NULL) { 324 struct rmconfselector rmconf; local 325 rmconf_selector_from_ph1(&rmconf, iph1); 326 if (enumrmconf(&rmconf, natt_is_enabled, NULL) == 0 [all...] |
| isakmp_agg.c | 155 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal); 160 if (iph1->rmconf->dhgrp == NULL) { 167 if (oakley_dh_generate(iph1->rmconf->dhgrp, 172 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 178 switch (iph1->rmconf->proposal->authmethod) { 199 if (iph1->rmconf->ike_frag) { 211 s_oakley_attr_method(iph1->rmconf->proposal->authmethod)); 213 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) 230 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB) [all...] |
| admin.c | 425 struct remoteconf *rmconf; local 442 rmconf = getrmconf(dst, 0); 444 rmconf = getrmconf_by_name(name); 445 if (rmconf == NULL) { 453 /* XXX This overwrites rmconf information globally. */ 456 if (xauth_rmconf_used(&rmconf->xauth) == -1) 459 if (rmconf->xauth->login != NULL) { 460 vfree(rmconf->xauth->login); 461 rmconf->xauth->login = NULL; 463 if (rmconf->xauth->pass != NULL) [all...] |
| handler.c | 234 struct remoteconf *rmconf; local 236 /* INITIATOR is always expected to know the exact rmconf. */ 240 rmconf = getrmconf_by_ph1(iph1); 241 if (rmconf == NULL) 243 if (rmconf == RMCONF_ERR_MULTIPLE) 246 if (iph1->rmconf != NULL) { 247 if (rmconf != iph1->rmconf) { 249 "unexpected rmconf switch; killing ph1\n"); 253 iph1->rmconf = rmconf 1451 struct remoteconf *rmconf; local [all...] |
| oakley.c | 1350 certtype = oakley_get_certtype(iph1->rmconf->peerscert); 1360 if (!iph1->rmconf->verify_cert) 1368 if (iph1->rmconf->cacertfile != NULL) { 1371 iph1->rmconf->cacertfile); 1397 if (iph1->rmconf->peerscert == NULL) { 1408 iph1->cert_p = vdup(iph1->rmconf->peerscert); 1434 oakley_get_certtype(iph1->rmconf->peerscert)); 1443 if (iph1->rmconf->verify_cert) { 1474 certtype = oakley_get_certtype(iph1->rmconf->peerscert); 1526 if (iph1->rmconf->xauth [all...] |
| cfparse.y | 289 struct remoteconf *rmconf; 2644 insspspec(struct remoteconf *rmconf, struct secprotospec *spspec) 2646 if (rmconf->spspec != NULL) 2647 rmconf->spspec->prev = spspec; 2648 spspec->next = rmconf->spspec; 2649 rmconf->spspec = spspec; 2710 flushspspec(struct remoteconf *rmconf) 2714 while(rmconf->spspec != NULL) { 2715 p = rmconf->spspec; 2716 rmconf->spspec = p->next [all...] |
| isakmp_base.c | 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, 145 iph1->rmconf->proposal); 150 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 156 switch (iph1->rmconf->proposal->authmethod) { 177 if (iph1->rmconf->ike_frag) { 189 if (iph1->rmconf->nat_traversal) { 233 if (iph1->rmconf->dpd) { 482 if (iph1->cert && iph1->rmconf->send_cert) 918 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 965 if (iph1->dpd_support && iph1->rmconf->dpd) [all...] |
| gssapi.c | 195 if (iph1->rmconf == NULL) { 210 if (iph1->rmconf->proposal->gssid != NULL) { 211 id_token.length = iph1->rmconf->proposal->gssid->l; 212 id_token.value = iph1->rmconf->proposal->gssid->v; 697 if (iph1->rmconf->proposal->gssid != NULL) 698 return (vdup(iph1->rmconf->proposal->gssid));
|
| rsalist.c | 237 list = iph1->rmconf->rsa_private; 239 list = iph1->rmconf->rsa_public;
|
| vendorid.c | 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
|
| isakmp_xauth.c | 1509 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) { 1515 dlen = iph1->rmconf->xauth->login->l - 1; 1516 iph1->rmconf->xauth->state |= XAUTH_SENT_USERNAME; 1520 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) 1524 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip); 1532 iph1->rmconf->xauth->login->v, 1533 iph1->rmconf->xauth->login->l - 1); 1535 if (iph1->rmconf->xauth->pass) [all...] |
| isakmp_ident.c | 143 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, 144 iph1->rmconf->proposal); 153 if (iph1->rmconf->nat_traversal) 158 switch (iph1->rmconf->proposal->authmethod) { 186 if (iph1->rmconf->ike_frag) { 199 if(iph1->rmconf->dpd){ 370 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 974 gss_sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->approval); 1247 iph1->nonce = eay_set_random(RMCONF_NONCE_SIZE(iph1->rmconf)); 1756 if (iph1->cert != NULL && iph1->rmconf->send_cert [all...] |
| isakmp.c | 884 iph1->rmconf->ini_contact = 0; 887 if (iph1->rmconf->mode_cfg) 897 if(iph1->dpd_support && iph1->rmconf->dpd_interval) 904 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) { 927 !iph1->rmconf->mode_cfg) { 945 if ((iph1->rmconf->mode_cfg) && 1035 isakmp_ph1begin_i(struct remoteconf *rmconf, 1049 iph1->rmconf = rmconf; 1066 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE 2124 struct remoteconf *rmconf; local [all...] |
| isakmp_inf.c | 482 if((iph1 == NULL || !iph1->rmconf->weak_phase1_check) && !encrypted) { 785 n->doi = htonl(iph1->rmconf->doitype); 1452 * Such iph1 have rmconf=NULL, so return before the if 1458 if (iph1->dpd_fails >= iph1->rmconf->dpd_maxfails) { 1514 "rescheduling send_r_u (%d).\n", iph1->rmconf->dpd_retry); 1522 iph1->rmconf == NULL) 1527 iph1->rmconf->dpd_interval == 0) 1531 sched_schedule(&iph1->dpd_r_u, iph1->rmconf->dpd_retry, 1534 sched_schedule(&iph1->dpd_r_u, iph1->rmconf->dpd_interval,
|
| ipsec_doi.c | 267 if (iph1->rmconf != NULL) { 268 if (get_ph1approvalx(iph1->rmconf, &ctx)) 311 if (iph1->rmconf->proposal->gssid != NULL) 312 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid); 345 get_ph1approvalx(struct remoteconf *rmconf, void *ctx) 351 sa = checkisakmpsa(rmconf->pcheck_level, pctx->sa, rmconf->proposal); 358 switch (rmconf->pcheck_level) { 2554 ipsecdoi_setph1proposal(struct remoteconf *rmconf, struct isakmpsa *props) 2573 ((struct ipsecdoi_sa_b *)mysa->v)->doi = htonl(rmconf->doitype) [all...] |
| handler.h | 123 /* XXX copy from rmconf due to anonymous configuration. 126 struct remoteconf *rmconf; /* pointer to remote configuration */ member in struct:ph1handle
|
| pfkey.c | 1174 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag; 1459 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag; 2839 struct remoteconf *rmconf; local 2859 rmconf = getrmconf(ma->remote, 0); 2860 if (rmconf == NULL || !rmconf->passive) { 2878 isakmp_ph1begin_i(rmconf, ma->local, ma->remote); 3019 struct remoteconf *rmconf; local 3027 if (iph2->ph1 && iph2->ph1->rmconf) 3028 rmconf = iph2->ph1->rmconf [all...] |
| isakmp_quick.c | 214 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 262 iph2->ph1->rmconf->support_proxy == 0 && 1493 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 2174 iph2->sainfo = getsainfo(idsrc, iddst, iph2->ph1->id_p, client, iph2->ph1->rmconf->ph1id); 2427 if (iph2->ph1->rmconf->gen_policy) { 2447 if (iph2->ph1->rmconf->gen_policy) { 2536 if (iph1 != NULL && iph1->rmconf != NULL) { 2537 check_level = iph1->rmconf->pcheck_level; 2541 "No phase1 rmconf found !\n");
|
| proposal.c | 209 switch (ph1->rmconf->pcheck_level) { 468 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0) 1201 if (iph2->ph1->rmconf->gen_policy == GENERATE_POLICY_UNIQUE){
|
| isakmp_cfg.c | 436 iph1->rmconf->mode_cfg) { 732 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))
|