Searched refs:rmconf (Results 1 - 25 of 25) sorted by relevance

/external/ipsec-tools/src/racoon/
H A Dremoteconf.c268 duprmconf (rmconf)
269 struct remoteconf *rmconf;
276 memcpy (new, rmconf, sizeof (*new));
285 genlist_foreach(rmconf->idvl_p, dupidvl, new->idvl_p);
298 delrmconf(rmconf)
299 struct remoteconf *rmconf;
302 if (rmconf->xauth)
303 xauth_rmconf_delete(&rmconf->xauth);
305 if (rmconf->etypes){
306 deletypes(rmconf
[all...]
H A Dadmin.c407 struct remoteconf *rmconf; local
415 rmconf = getrmconf(dst);
416 if (rmconf == NULL) {
427 port = extract_port(rmconf->remote);
442 if (xauth_rmconf_used(&rmconf->xauth) == -1)
445 if (rmconf->xauth->login != NULL) {
446 vfree(rmconf->xauth->login);
447 rmconf->xauth->login = NULL;
449 if (rmconf->xauth->pass != NULL) {
450 vfree(rmconf
[all...]
H A Doakley.h229 (((iph1)->rmconf->xauth && \
233 (((iph1)->rmconf->xauth && \
234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
240 #define RMAUTHMETHOD(iph1) (iph1)->rmconf->proposal->authmethod
H A Disakmp_agg.c160 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
165 if (iph1->rmconf->dhgrp == NULL) {
172 if (oakley_dh_generate(iph1->rmconf->dhgrp,
177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
204 if (iph1->rmconf->ike_frag) {
216 if (iph1->rmconf->send_cr
217 && oakley_needcr(iph1->rmconf->proposal->authmethod)
218 && iph1->rmconf->peerscertfile == NULL) {
229 s_oakley_attr_method(iph1->rmconf->proposal->authmethod));
266 if (iph1->rmconf
[all...]
H A Dremoteconf.h118 struct remoteconf *inherited_from; /* the original rmconf
153 struct remoteconf *rmconf; /* backpointer to remoteconf */ member in struct:isakmpsa
161 typedef struct remoteconf * (rmconf_func_t)(struct remoteconf *rmconf, void *data);
H A Dnattraversal.c132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":"");
166 if (iph1->rmconf->nat_traversal == NATT_FORCE)
189 if (iph1->rmconf->nat_traversal == NATT_FORCE)
455 natt_enabled_in_rmconf_stub (struct remoteconf *rmconf, void *data) argument
457 return (rmconf->nat_traversal ? rmconf : NULL);
H A Disakmp_ident.c144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
153 if (iph1->rmconf->nat_traversal)
185 if (iph1->rmconf->ike_frag) {
198 if(iph1->rmconf->dpd){
213 iph1->retry_counter = iph1->rmconf->retry_counter;
375 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
395 iph1->retry_counter = iph1->rmconf->retry_counter;
636 iph1->retry_counter = iph1->rmconf->retry_counter;
1038 if(iph1->rmconf->dpd){
1066 iph1->retry_counter = iph1->rmconf
[all...]
H A Disakmp_base.c146 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal);
151 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
178 if (iph1->rmconf->ike_frag) {
190 if (iph1->rmconf->nat_traversal) {
234 if (iph1->rmconf->dpd) {
253 iph1->retry_counter = iph1->rmconf->retry_counter;
493 if (iph1->cert && iph1->rmconf->send_cert)
555 iph1->retry_counter = iph1->rmconf->retry_counter;
944 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
991 if (iph1->dpd_support && iph1->rmconf
[all...]
H A Drsalist.c176 list = iph1->rmconf->rsa_private;
178 list = iph1->rmconf->rsa_public;
H A Disakmp_xauth.c1415 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login) {
1421 dlen = iph1->rmconf->xauth->login->l - 1;
1422 iph1->rmconf->xauth->state |= XAUTH_SENT_USERNAME;
1429 if (!iph1->rmconf->xauth || !iph1->rmconf->xauth->login)
1433 usr = vmalloc(iph1->rmconf->xauth->login->l - 1 + skip);
1441 iph1->rmconf->xauth->login->v,
1442 iph1->rmconf->xauth->login->l - 1);
1444 if (iph1->rmconf
[all...]
H A Doakley.c1347 switch (iph1->rmconf->getcert_method) {
1356 switch (iph1->rmconf->certtype) {
1358 if (iph1->rmconf->peerscertfile == NULL) {
1387 if (iph1->rmconf->peerscertfile != NULL) {
1411 iph1->rmconf->getcert_method);
1416 if (iph1->rmconf->verify_cert &&
1421 if (iph1->rmconf->verify_cert
1422 && iph1->rmconf->getcert_method == ISAKMP_GETCERT_PAYLOAD) {
1423 certtype = iph1->rmconf->certtype;
1439 if (iph1->rmconf
[all...]
H A Disakmp.c881 iph1->rmconf->ini_contact = 0;
890 if(iph1->dpd_support && iph1->rmconf->dpd_interval)
897 && iph1->rmconf->ini_contact && !getcontacted(iph1->remote)) {
918 !iph1->rmconf->mode_cfg) {
1022 isakmp_ph1begin_i(rmconf, remote, local)
1023 struct remoteconf *rmconf;
1037 iph1->rmconf = rmconf;
1054 if(rmconf->ike_frag == ISAKMP_FRAG_FORCE)
1063 if (copy_ph1addresses(iph1, rmconf, remot
1123 struct remoteconf *rmconf; local
2150 struct remoteconf *rmconf; local
[all...]
H A Dvendorid.c277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
H A Disakmp_inf.c494 if(!iph1->rmconf->weak_phase1_check && !encrypted) {
700 struct remoteconf *rmconf;
708 rmconf = getrmconf(remote);
709 if (rmconf == NULL) {
723 iph1->rmconf = rmconf;
738 if (copy_ph1addresses(iph1, rmconf, remote, local) < 0)
816 n->doi = htonl(iph1->rmconf->doitype);
1628 if (iph1->dpd_fails >= iph1->rmconf->dpd_maxfails) {
1688 "rescheduling send_r_u (%d).\n", iph1->rmconf
699 struct remoteconf *rmconf; local
[all...]
H A Dgssapi.c205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
692 if (iph1->rmconf->proposal->gssid != NULL)
693 return (vdup(iph1->rmconf->proposal->gssid));
H A Dhandler.c1123 * Note: we must have an updated ph1->rmconf before doing that,
1133 if(iph1 != NULL && iph1->rmconf != NULL) {
1134 check_level = iph1->rmconf->pcheck_level;
1137 plog(LLV_DEBUG, LOCATION, NULL, "No phase1 rmconf found !\n");
1331 p->rmconf = NULL;
1334 /* Do not free old rmconf, it is just a pointer to an entry in rmtree
1336 p->rmconf=newrmconf;
1344 p->approval->rmconf=newrmconf;
1354 /* rmconf is already updated here
1362 iph1->rmconf
[all...]
H A Dipsec_doi.c234 iph1->rmconf->proposal, &tsa,
235 iph1->rmconf->pcheck_level)) != NULL)
254 iph1->rmconf->proposal);
290 if (iph1->rmconf->proposal->gssid != NULL)
291 iph1->gi_i = vdup(iph1->rmconf->proposal->gssid);
1591 ((struct ipsecdoi_sa_b *)bp)->doi = htonl(iph1->rmconf->doitype);
1592 ((struct ipsecdoi_sa_b *)bp)->sit = htonl(iph1->rmconf->sittype);
2661 ((struct ipsecdoi_sa_b *)mysa->v)->doi = htonl(props->rmconf->doitype);
2662 ((struct ipsecdoi_sa_b *)mysa->v)->sit = htonl(props->rmconf->sittype);
3674 if (genlist_next(iph1->rmconf
[all...]
H A Dcfparse.y177 struct remoteconf *rmconf;
2241 set_isakmp_proposal(rmconf, prspec)
2242 struct remoteconf *rmconf;
2261 saddr2str(rmconf->remote));
2312 rmconf);
2322 if (rmconf->proposal == NULL) {
2342 rmconf)
2350 struct remoteconf *rmconf;
2416 } else if (rmconf->xauth == NULL) {
2429 insisakmpsa(new, rmconf);
[all...]
H A Disakmp_quick.c180 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
226 && iph2->ph1->rmconf->support_proxy == 0
288 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
623 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
1215 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
1354 iph2->retry_counter = iph2->ph1->rmconf->retry_counter;
1865 plog(LLV_DEBUG, LOCATION, NULL, "Warning: no valid rmconf !\n");
2107 if (iph2->ph1->rmconf->gen_policy) {
2127 if (iph2->ph1->rmconf->gen_policy) {
H A Dcfparse.h379 struct remoteconf *rmconf; member in union:YYSTYPE
H A Dhandler.h120 /* XXX copy from rmconf due to anonymous configuration.
123 struct remoteconf *rmconf; /* pointer to remote configuration */ member in struct:ph1handle
H A Dproposal.c217 switch (ph1->rmconf->pcheck_level) {
477 if (cmpsatrns(pr1->proto_id, tr1, tr2, ph1->rmconf->pcheck_level) == 0)
H A Dpfkey.c850 proxy = iph2->ph1->rmconf->support_proxy;
1040 proxy = iph2->ph1->rmconf->support_proxy;
1116 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1327 proxy = iph2->ph1->rmconf->support_proxy;
1407 sa_args.l_natt_frag = iph2->ph1->rmconf->esp_frag;
1866 plog(LLV_DEBUG, LOCATION, NULL, "Warning: no valid rmconf !\n");
H A Disakmp_cfg.c450 iph1->rmconf->mode_cfg) {
748 if ((iph1 != NULL) && (iph1->rmconf->mode_cfg) && (error == 0))
/external/ipsec-tools/
H A Dsetup.c310 p->rmconf = remoteconf;

Completed in 431 milliseconds