/openbsd/sbin/ipsecctl/ |
H A D | pfkey.c | 824 rule->satype = IPSEC_ESP; in pfkey_parse() 827 rule->satype = IPSEC_AH; in pfkey_parse() 833 rule->satype = IPSEC_IPIP; in pfkey_parse() 1119 switch (r->satype) { in pfkey_ipsec_establish() 1121 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish() 1124 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish() 1163 switch (r->satype) { in pfkey_ipsec_establish() 1165 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish() 1168 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish() 1196 switch (r->satype) { in pfkey_ipsec_establish() [all …]
|
H A D | ipsecctl.c | 82 static const char *satype[] = {"?", "esp", "ah", "ipcomp", "tcpmd5", "ipip"}; variable 268 if ((to->satype != from->satype) || in ipsecctl_merge_rules() 444 printf("flow %s %s", satype[r->satype], direction[r->direction]); in ipsecctl_print_flow() 509 printf("%s ", satype[r->satype]); in ipsecctl_print_sa() 511 if (r->satype != IPSEC_TCPMD5 && r->satype != IPSEC_IPIP) in ipsecctl_print_sa() 519 if (r->satype != IPSEC_TCPMD5) { in ipsecctl_print_sa() 528 if (r->satype == IPSEC_TCPMD5) in ipsecctl_print_sa() 536 if (r->satype == IPSEC_TCPMD5) in ipsecctl_print_sa() 549 printf("[bundle %s to ", satype[r->proto]); in ipsecctl_print_sabundle() 551 printf(" spi 0x%08x with %s to ", r->spi, satype[r->proto2]); in ipsecctl_print_sabundle()
|
H A D | parse.y | 294 %type <v.satype> satype 2285 r->satype = rule->satype; in copyrule() 2347 if (satype == IPSEC_AH) { in validate_sa() 2363 if (satype == IPSEC_ESP) { in validate_sa() 2499 r->satype = satype; in create_sa() 2528 reverse->satype = rule->satype; in reverse_sa() 2560 r->satype = proto; in create_sabundle() 2582 r->satype = satype; in create_flow() 2594 switch (satype) { in create_flow() 2841 reverse->satype = rule->satype; in reverse_rule() [all …]
|
H A D | pfkdump.c | 690 *satype = IPSEC_ESP; in parse_satype() 693 *satype = IPSEC_AH; in parse_satype() 696 *satype = IPSEC_IPCOMP; in parse_satype() 699 *satype = IPSEC_IPIP; in parse_satype() 738 r.satype = IPSEC_AH; in pfkey_print_sa() 741 r.satype = IPSEC_ESP; in pfkey_print_sa() 744 r.satype = IPSEC_IPCOMP; in pfkey_print_sa() 747 r.satype = IPSEC_TCPMD5; in pfkey_print_sa() 750 r.satype = IPSEC_IPIP; in pfkey_print_sa() 761 if (r.satype == IPSEC_IPCOMP) { in pfkey_print_sa() [all …]
|
H A D | ike.c | 184 switch (r->satype) { in ike_section_p2() 192 warnx("illegal satype %d", r->satype); in ike_section_p2() 200 if (r->satype == IPSEC_ESP) { in ike_section_p2() 287 } else if (r->satype == IPSEC_ESP) { in ike_section_p2() 415 r->satype == IPSEC_AH ? auth_alg : enc_alg); in ike_section_p2()
|
H A D | ipsecctl.h | 207 u_int8_t satype; /* encapsulating prococol */ member
|
/openbsd/usr.sbin/bgpd/ |
H A D | pfkey.c | 55 pfkey_send(fd, satype, cmd, dir, from, to, \ 146 smsg.sadb_msg_satype = satype; in pfkey_send() 625 uint8_t satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish() local 636 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish() 639 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish() 645 if (pfkey_send(pfkey_fd, satype, SADB_ADD, 0, in pfkey_ipsec_establish() 658 if (pfkey_send(pfkey_fd, satype, SADB_ADD, 0, in pfkey_ipsec_establish() 717 uint8_t satype; in pfkey_ipsec_remove() local 721 satype = SADB_SATYPE_ESP; in pfkey_ipsec_remove() 724 satype = SADB_SATYPE_AH; in pfkey_ipsec_remove() [all …]
|
/openbsd/sbin/iked/ |
H A D | pfkey.c | 282 smsg.sadb_msg_satype = satype; in pfkey_flow() 525 smsg.sadb_msg_satype = satype; in pfkey_sa() 623 satype != SADB_X_SATYPE_IPCOMP && satype != SADB_X_SATYPE_IPIP) { in pfkey_sa() 890 uint8_t satype; in pfkey_sa_lookup() local 918 smsg.sadb_msg_satype = satype; in pfkey_sa_lookup() 1457 uint8_t satype; in pfkey_flow_add() local 1476 uint8_t satype; in pfkey_flow_delete() local 1495 uint8_t satype; in pfkey_sa_init() local 1511 uint8_t satype; in pfkey_sa_add() local 1567 uint8_t satype; in pfkey_sa_update_addresses() local [all …]
|
H A D | parse.y | 409 uint8_t satype; member 452 %type <v.satype> satype 551 ikev2rule : IKEV2 name ikeflags satype af proto rdomain hosts_list peers 616 satype : /* empty */ { $$ = IKEV2_SAPROTO_ESP; }
|
/openbsd/usr.sbin/ldpd/ |
H A D | pfkey.c | 51 pfkey_send(int sd, uint8_t satype, uint8_t mtype, uint8_t dir, in pfkey_send() argument 114 smsg.sadb_msg_satype = satype; in pfkey_send()
|
/openbsd/sys/net/ |
H A D | pfkeyv2.c | 474 u_int8_t satype, int count, u_int rdomain) in pfkeyv2_sendmessage() argument 565 if (!satype) { in pfkeyv2_sendmessage() 571 if ((1 << satype) & kp->kcb_reg) in pfkeyv2_sendmessage() 1055 pfkeyv2_get_proto_alg(u_int8_t satype, u_int8_t *sproto, int *alg) in pfkeyv2_get_proto_alg() argument 1057 switch (satype) { in pfkeyv2_get_proto_alg() 1066 *alg = satype = XF_AH; in pfkeyv2_get_proto_alg() 1077 *alg = satype = XF_ESP; in pfkeyv2_get_proto_alg() 1096 *alg = satype = XF_IPCOMP; in pfkeyv2_get_proto_alg()
|
/openbsd/sys/netinet/ |
H A D | ip_ipsp.c | 603 DUMP(satype, "%d"); in tdb_printit()
|