HomeSort by: relevance | last modified time | path
    Searched refs:rmconf (Results 1 - 22 of 22) sorted by relevancy

  /src/crypto/dist/ipsec-tools/src/racoon/
remoteconf.c 95 rmconf_match_identity(struct remoteconf *rmconf, vchar_t *id_p)
105 if (!genlist_next(rmconf->idvl_p, 0))
108 for (id = genlist_next(rmconf->idvl_p, &gpb); id; id = genlist_next(0, &gpb)) {
157 if (rmconf->verify_identifier)
164 rmconf_match_etype_and_approval(struct remoteconf *rmconf, int etype,
167 if (check_etypeok(rmconf, (void *) (intptr_t) etype) == 0)
174 approval->dh_group != rmconf->dh_group)
177 if (checkisakmpsa(rmconf->pcheck_level, approval,
178 rmconf->proposal) == NULL)
194 rmconf_match_type(struct rmconfselector *rmsel, struct remoteconf *rmconf)
333 struct remoteconf *rmconf; member in struct:rmconf_find_context
598 struct remoteconf *rmconf; local
    [all...]
remoteconf.h 149 struct remoteconf *inherited_from; /* the original rmconf
167 #define RMCONF_NONCE_SIZE(rmconf) \
168 (rmconf != NULL ? rmconf->nonce_size : DEFAULT_NONCE_SIZE)
189 int (* enum_func)(struct remoteconf *rmconf, void *arg), void *enum_arg);
196 extern int rmconf_match_identity(struct remoteconf *rmconf, vchar_t *id_p);
nattraversal.c 132 if (iph1->rmconf != NULL && iph1->rmconf->nat_traversal == NATT_FORCE)
194 if (iph1->rmconf != NULL &&
195 iph1->rmconf->nat_traversal == NATT_FORCE)
312 natt_is_enabled(struct remoteconf *rmconf, void *args __unused)
314 if (rmconf->nat_traversal)
322 if (iph1->rmconf == NULL) {
324 struct rmconfselector rmconf; local
325 rmconf_selector_from_ph1(&rmconf, iph1);
326 if (enumrmconf(&rmconf, natt_is_enabled, NULL) == 0
    [all...]
isakmp_agg.c 155 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->rmconf->proposal);
160 if (iph1->rmconf->dhgrp == NULL) {
167 if (oakley_dh_generate(iph1->rmconf->dhgrp,
172 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
178 switch (iph1->rmconf->proposal->authmethod) {
199 if (iph1->rmconf->ike_frag) {
211 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
213 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
230 if (iph1->rmconf->proposal->authmethod == OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB)
    [all...]
admin.c 425 struct remoteconf *rmconf; local
442 rmconf = getrmconf(dst, 0);
444 rmconf = getrmconf_by_name(name);
445 if (rmconf == NULL) {
453 /* XXX This overwrites rmconf information globally. */
456 if (xauth_rmconf_used(&rmconf->xauth) == -1)
459 if (rmconf->xauth->login != NULL) {
460 vfree(rmconf->xauth->login);
461 rmconf->xauth->login = NULL;
463 if (rmconf->xauth->pass != NULL)
    [all...]
handler.c 234 struct remoteconf *rmconf; local
236 /* INITIATOR is always expected to know the exact rmconf. */
240 rmconf = getrmconf_by_ph1(iph1);
241 if (rmconf == NULL)
243 if (rmconf == RMCONF_ERR_MULTIPLE)
246 if (iph1->rmconf != NULL) {
247 if (rmconf != iph1->rmconf) {
249 "unexpected rmconf switch; killing ph1\n");
253 iph1->rmconf = rmconf
1451 struct remoteconf *rmconf; local
    [all...]
oakley.c 1350 certtype = oakley_get_certtype(iph1->rmconf->peerscert);
1360 if (!iph1->rmconf->verify_cert)
1368 if (iph1->rmconf->cacertfile != NULL) {
1371 iph1->rmconf->cacertfile);
1397 if (iph1->rmconf->peerscert == NULL) {
1408 iph1->cert_p = vdup(iph1->rmconf->peerscert);
1434 oakley_get_certtype(iph1->rmconf->peerscert));
1443 if (iph1->rmconf->verify_cert) {
1474 certtype = oakley_get_certtype(iph1->rmconf->peerscert);
1526 if (iph1->rmconf->xauth
    [all...]
cfparse.y 289 struct remoteconf *rmconf;
2644 insspspec(struct remoteconf *rmconf, struct secprotospec *spspec)
2646 if (rmconf->spspec != NULL)
2647 rmconf->spspec->prev = spspec;
2648 spspec->next = rmconf->spspec;
2649 rmconf->spspec = spspec;
2710 flushspspec(struct remoteconf *rmconf)
2714 while(rmconf->spspec != NULL) {
2715 p = rmconf->spspec;
2716 rmconf->spspec = p->next
    [all...]
isakmp_base.c 144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf,
145 iph1->rmconf->proposal);
150 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
156 switch (iph1->rmconf->proposal->authmethod) {
177 if (iph1->rmconf->ike_frag) {
189 if (iph1->rmconf->nat_traversal) {
233 if (iph1->rmconf->dpd) {
482 if (iph1->cert && iph1->rmconf->send_cert)
918 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
965 if (iph1->dpd_support && iph1->rmconf->dpd)
    [all...]
gssapi.c 195 if (iph1->rmconf == NULL) {
210 if (iph1->rmconf->proposal->gssid != NULL) {
211 id_token.length = iph1->rmconf->proposal->gssid->l;
212 id_token.value = iph1->rmconf->proposal->gssid->v;
697 if (iph1->rmconf->proposal->gssid != NULL)
698 return (vdup(iph1->rmconf->proposal->gssid));
rsalist.c 237 list = iph1->rmconf->rsa_private;
239 list = iph1->rmconf->rsa_public;
vendorid.c 277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
isakmp_xauth.c 1509 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) {
1515 dlen = iph1->rmconf->xauth->login->l - 1;
1516 iph1->rmconf->xauth->state |= XAUTH_SENT_USERNAME;
1520 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login)
1524 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip);
1532 iph1->rmconf->xauth->login->v,
1533 iph1->rmconf->xauth->login->l - 1);
1535 if (iph1->rmconf->xauth->pass)
    [all...]
isakmp_ident.c 143 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf,
144 iph1->rmconf->proposal);
153 if (iph1->rmconf->nat_traversal)
158 switch (iph1->rmconf->proposal->authmethod) {
186 if (iph1->rmconf->ike_frag) {
199 if(iph1->rmconf->dpd){
370 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
974 gss_sa = ipsecdoi_setph1proposal(iph1->rmconf, iph1->approval);
1247 iph1->nonce = eay_set_random(RMCONF_NONCE_SIZE(iph1->rmconf));
1756 if (iph1->cert != NULL && iph1->rmconf->send_cert
    [all...]
isakmp.c 884 iph1->rmconf->ini_contact = 0;
887 if (iph1->rmconf->mode_cfg)
897 if(iph1->dpd_support && iph1->rmconf->dpd_interval)
904 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) {
927 !iph1->rmconf->mode_cfg) {
945 if ((iph1->rmconf->mode_cfg) &&
1035 isakmp_ph1begin_i(struct remoteconf *rmconf,
1049 iph1->rmconf = rmconf;
1066 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE
2124 struct remoteconf *rmconf; local
    [all...]
isakmp_inf.c 482 if((iph1 == NULL || !iph1->rmconf->weak_phase1_check) && !encrypted) {
785 n->doi = htonl(iph1->rmconf->doitype);
1452 * Such iph1 have rmconf=NULL, so return before the if
1458 if (iph1->dpd_fails >= iph1->rmconf->dpd_maxfails) {
1514 "rescheduling send_r_u (%d).\n", iph1->rmconf->dpd_retry);
1522 iph1->rmconf == NULL)
1527 iph1->rmconf->dpd_interval == 0)
1531 sched_schedule(&iph1->dpd_r_u, iph1->rmconf->dpd_retry,
1534 sched_schedule(&iph1->dpd_r_u, iph1->rmconf->dpd_interval,
ipsec_doi.c 267 if (iph1->rmconf != NULL) {
268 if (get_ph1approvalx(iph1->rmconf, &ctx))
311 if (iph1->rmconf->proposal->gssid != NULL)
312 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
345 get_ph1approvalx(struct remoteconf *rmconf, void *ctx)
351 sa = checkisakmpsa(rmconf->pcheck_level, pctx->sa, rmconf->proposal);
358 switch (rmconf->pcheck_level) {
2554 ipsecdoi_setph1proposal(struct remoteconf *rmconf, struct isakmpsa *props)
2573 ((struct ipsecdoi_sa_b *)mysa->v)->doi = htonl(rmconf->doitype)
    [all...]
handler.h 123 /* XXX copy from rmconf due to anonymous configuration.
126 struct remoteconf *rmconf; /* pointer to remote configuration */ member in struct:ph1handle
pfkey.c 1174 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1459 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
2839 struct remoteconf *rmconf; local
2859 rmconf = getrmconf(ma->remote, 0);
2860 if (rmconf == NULL || !rmconf->passive) {
2878 isakmp_ph1begin_i(rmconf, ma->local, ma->remote);
3019 struct remoteconf *rmconf; local
3027 if (iph2->ph1 && iph2->ph1->rmconf)
3028 rmconf = iph2->ph1->rmconf
    [all...]
isakmp_quick.c 214 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
262 iph2->ph1->rmconf->support_proxy == 0 &&
1493 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
2174 iph2->sainfo = getsainfo(idsrc, iddst, iph2->ph1->id_p, client, iph2->ph1->rmconf->ph1id);
2427 if (iph2->ph1->rmconf->gen_policy) {
2447 if (iph2->ph1->rmconf->gen_policy) {
2536 if (iph1 != NULL && iph1->rmconf != NULL) {
2537 check_level = iph1->rmconf->pcheck_level;
2541 "No phase1 rmconf found !\n");
proposal.c 209 switch (ph1->rmconf->pcheck_level) {
468 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
1201 if (iph2->ph1->rmconf->gen_policy == GENERATE_POLICY_UNIQUE){
isakmp_cfg.c 436 iph1->rmconf->mode_cfg) {
732 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))

Completed in 46 milliseconds