/netbsd/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_quick.c | 149 iph2->msgid = isakmp_newmsgid2(iph2->ph1); 150 iph2->ivm = oakley_newiv2(iph2->ph1, iph2->msgid); 237 &iph2->dhpub, &iph2->dhpriv) < 0) { 427 msg = oakley_do_decrypt(iph2->ph1, msg0, iph2->ivm->iv, iph2->ivm->ive); 814 memcpy(tmp->v + iph2->nonce->l, iph2->nonce_p->v, iph2->nonce_p->l); 846 iph2->sendbuf = oakley_do_encrypt(iph2->ph1, buf, iph2->ivm->ive, iph2->ivm->iv); 945 msg = oakley_do_decrypt(iph2->ph1, msg0, iph2->ivm->iv, iph2->ivm->ive); 1690 if (add_recvdpkt(iph2->ph1->remote, iph2->ph1->local, iph2->sendbuf, iph2->msg1) == -1) { 1802 memcpy(tmp->v + iph2->nonce_p->l, iph2->nonce->v, iph2->nonce->l); 1913 iph2->sendbuf = oakley_do_encrypt(iph2->ph1, buf, iph2->ivm->ive, iph2->ivm->iv); [all …]
|
H A D | handler.c | 669 if (iph2->proposal == NULL && iph2->approval == NULL) 702 iph2 = racoon_calloc(1, sizeof(*iph2)); in newph2() 787 delph2(iph2) in delph2() argument 831 insph2(iph2) in insph2() argument 840 remph2(iph2) in remph2() argument 893 for (iph2 = LIST_FIRST(&ph2tree); iph2 != NULL; iph2 = next) { 895 if (iph2->proposal == NULL && iph2->approval == NULL) 1252 iph2->sainfo = getsainfo(iph2->sainfo->idsrc, in revalidate_ph2() 1253 iph2->sainfo->iddst, iph2->sainfo->id_i, in revalidate_ph2() 1296 iph1=getph1byaddr(iph2->src, iph2->dst, 0); in revalidate_ph2() [all …]
|
H A D | isakmp.c | 992 [iph2->status])(iph2, msg); 996 iph2->side, iph2->status); 1022 [iph2->status])(iph2, msg) != 0) { 1025 iph2->side, iph2->status); 1307 [iph2->status])(iph2, NULL) < 0) { 1347 iph2->ivm = oakley_newiv2(iph1, iph2->msgid); 1386 [iph2->status])(iph2, msg); 1390 iph2->side, iph2->status); 1406 [iph2->status])(iph2, msg) < 0) { 1409 iph2->side, iph2->status); [all …]
|
H A D | pfkey.c | 909 if (iph2->sa_src && iph2->sa_dst) { 1052 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 1119 if (iph2->sa_src && iph2->sa_dst) { 1358 "phase2", "quick", timedelta(&iph2->start, &iph2->end)); 1368 sched_schedule(&iph2->sce, iph2->approval->lifetime, 1402 if (iph2->sa_src && iph2->sa_dst) { 2094 if (iph2->sa_src && iph2->sa_dst) { 2993 if (iph2->sa_src == NULL && iph2->sa_dst == NULL) { 2994 iph2->sa_src = iph2->src; 2995 iph2->sa_dst = iph2->dst; [all …]
|
H A D | admin.c | 489 struct ph2handle *iph2; local 518 if (iph2 != NULL) { 550 iph2 = newph2(); 551 if (iph2 == NULL) { 556 iph2->side = INITIATOR; 558 iph2->spid = sp_out->id; 580 if (iph2->dst == NULL || iph2->src == NULL) { 588 delph2(iph2); 592 insph2(iph2); 594 remph2(iph2); [all …]
|
H A D | isakmp_inf.c | 634 iph1 = getph1byaddr(iph2->src, iph2->dst, 0); 892 delph2(iph2); 897 delph2(iph2); 906 iph2->ivm = oakley_newiv2(iph1, iph2->msgid); 908 delph2(iph2); 934 insph2(iph2); 981 tmp = oakley_do_encrypt(iph2->ph1, iph2->sendbuf, iph2->ivm->ive, 990 if (isakmp_send(iph2->ph1, iph2->sendbuf) < 0) { 1014 remph2(iph2); 1015 delph2(iph2); [all …]
|
H A D | isakmp_cfg.c | 1181 iph2 = newph2(); 1187 delph2(iph2); 1192 delph2(iph2); 1208 delph2(iph2); 1216 delph2(iph2); 1235 insph2(iph2); 1279 plogdump(LLV_DEBUG, iph2->sendbuf->v, iph2->sendbuf->l); 1285 tmp = oakley_do_encrypt(iph2->ph1, iph2->sendbuf, 1294 if (isakmp_send(iph2->ph1, iph2->sendbuf) < 0) { 1313 remph2(iph2); [all …]
|
H A D | proposal.c | 1033 struct ph2handle *iph2; in set_proposal_from_policy() 1064 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1088 if (iph2->side == INITIATOR) 1110 if (iph2->ph1 && (iph2->ph1->natt_flags & NAT_DETECTED)) 1118 if (iph2->side == INITIATOR) 1141 if (iph2->side == INITIATOR) 1155 iph2->proposal = newpp; 1171 set_proposal_from_proposal(iph2) in set_proposal_from_proposal() argument 1172 struct ph2handle *iph2; in set_proposal_from_proposal() 1207 pp0->lifetime = iph2->sainfo->lifetime; [all …]
|
H A D | ipsec_doi.c | 1028 pr = cmpsaprop_alloc(iph2->ph1, q1, q2, iph2->side); 1044 iph2->approval = pr; 1519 pp = iph2->approval; 3165 iph2->sa = vrealloc(iph2->sa, iph2->sa->l + q->l); 3173 memcpy(iph2->sa->v + iph2->sa->l - q->l, q->v, q->l); 3922 ipsecdoi_setid2(iph2) in ipsecdoi_setid2() argument 3947 iph2->id = ipsecdoi_sockaddr2id(iph2->sa_src, 3951 iph2->id = ipsecdoi_sockaddr2id(iph2->src, IPSECDOI_PREFIX_HOST, 3969 iph2->id_p = ipsecdoi_sockaddr2id(iph2->sa_dst, 3973 iph2->id_p = ipsecdoi_sockaddr2id(iph2->dst, IPSECDOI_PREFIX_HOST, [all …]
|
H A D | security.c | 164 set_secctx_in_proposal(iph2, spidx) in set_secctx_in_proposal() argument 165 struct ph2handle *iph2; in set_secctx_in_proposal() 168 iph2->proposal->sctx.ctx_doi = spidx.sec_ctx.ctx_doi; 169 iph2->proposal->sctx.ctx_alg = spidx.sec_ctx.ctx_alg; 170 iph2->proposal->sctx.ctx_strlen = spidx.sec_ctx.ctx_strlen; 171 memcpy(iph2->proposal->sctx.ctx_str, spidx.sec_ctx.ctx_str,
|
H A D | policy.c | 108 getsp_r(spidx, iph2) in getsp_r() argument 110 struct ph2handle *iph2; 141 saddr2str(iph2->src)); 145 if (cmpsaddr(iph2->src, (struct sockaddr *) &spidx->src) != CMPSADDR_MATCH || 150 saddr2str(iph2->dst)); 154 if (cmpsaddr(iph2->dst, (struct sockaddr *) &spidx->dst) != CMPSADDR_MATCH ||
|
H A D | oakley.c | 488 if (iph2->approval->pfs_group && iph2->dhpub_p) { 489 if (oakley_dh_compute(iph2->pfsgrp, iph2->dhpub, 490 iph2->dhpriv, iph2->dhpub_p, &iph2->dhgxy) < 0) 532 pfs = ((iph2->approval->pfs_group && iph2->dhgxy) ? 1 : 0); 537 + iph2->nonce->l 538 + iph2->nonce_p->l); 551 memcpy(p, iph2->dhgxy->v, iph2->dhgxy->l); 562 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 566 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 575 res = oakley_prf(iph2->ph1->skeyid_d, buf, iph2->ph1); [all …]
|
H A D | ipsec_doi.h | 222 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
|
H A D | racoonctl.c | 1148 struct ph2handle *iph2; local 1171 iph2 = (struct ph2handle *)buf; 1172 addr = (struct sockaddr *)(++iph2);
|
H A D | handler.h | 500 int (* enum_func)(struct ph2handle *iph2, void *arg),
|
/netbsd/crypto/dist/ipsec-tools/ |
H A D | ChangeLog.old | 27 * src/racoon/isakmp_quick.c: Fixed iph2->id / id_p checks in 1026 * src/racoon/isakmp_inf.c: use iph2->generated_spidx to check if 1028 * src/racoon/isakmp_quick.c: sets iph2->generated_spidx for
|