Home
last modified time | relevance | path

Searched refs:satype (Results 1 – 12 of 12) sorted by relevance

/openbsd/sbin/ipsecctl/
H A Dpfkey.c824 rule->satype = IPSEC_ESP; in pfkey_parse()
827 rule->satype = IPSEC_AH; in pfkey_parse()
833 rule->satype = IPSEC_IPIP; in pfkey_parse()
1119 switch (r->satype) { in pfkey_ipsec_establish()
1121 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish()
1124 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish()
1163 switch (r->satype) { in pfkey_ipsec_establish()
1165 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish()
1168 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish()
1196 switch (r->satype) { in pfkey_ipsec_establish()
[all …]
H A Dipsecctl.c82 static const char *satype[] = {"?", "esp", "ah", "ipcomp", "tcpmd5", "ipip"}; variable
268 if ((to->satype != from->satype) || in ipsecctl_merge_rules()
444 printf("flow %s %s", satype[r->satype], direction[r->direction]); in ipsecctl_print_flow()
509 printf("%s ", satype[r->satype]); in ipsecctl_print_sa()
511 if (r->satype != IPSEC_TCPMD5 && r->satype != IPSEC_IPIP) in ipsecctl_print_sa()
519 if (r->satype != IPSEC_TCPMD5) { in ipsecctl_print_sa()
528 if (r->satype == IPSEC_TCPMD5) in ipsecctl_print_sa()
536 if (r->satype == IPSEC_TCPMD5) in ipsecctl_print_sa()
549 printf("[bundle %s to ", satype[r->proto]); in ipsecctl_print_sabundle()
551 printf(" spi 0x%08x with %s to ", r->spi, satype[r->proto2]); in ipsecctl_print_sabundle()
H A Dparse.y294 %type <v.satype> satype
2285 r->satype = rule->satype; in copyrule()
2347 if (satype == IPSEC_AH) { in validate_sa()
2363 if (satype == IPSEC_ESP) { in validate_sa()
2499 r->satype = satype; in create_sa()
2528 reverse->satype = rule->satype; in reverse_sa()
2560 r->satype = proto; in create_sabundle()
2582 r->satype = satype; in create_flow()
2594 switch (satype) { in create_flow()
2841 reverse->satype = rule->satype; in reverse_rule()
[all …]
H A Dpfkdump.c690 *satype = IPSEC_ESP; in parse_satype()
693 *satype = IPSEC_AH; in parse_satype()
696 *satype = IPSEC_IPCOMP; in parse_satype()
699 *satype = IPSEC_IPIP; in parse_satype()
738 r.satype = IPSEC_AH; in pfkey_print_sa()
741 r.satype = IPSEC_ESP; in pfkey_print_sa()
744 r.satype = IPSEC_IPCOMP; in pfkey_print_sa()
747 r.satype = IPSEC_TCPMD5; in pfkey_print_sa()
750 r.satype = IPSEC_IPIP; in pfkey_print_sa()
761 if (r.satype == IPSEC_IPCOMP) { in pfkey_print_sa()
[all …]
H A Dike.c184 switch (r->satype) { in ike_section_p2()
192 warnx("illegal satype %d", r->satype); in ike_section_p2()
200 if (r->satype == IPSEC_ESP) { in ike_section_p2()
287 } else if (r->satype == IPSEC_ESP) { in ike_section_p2()
415 r->satype == IPSEC_AH ? auth_alg : enc_alg); in ike_section_p2()
H A Dipsecctl.h207 u_int8_t satype; /* encapsulating prococol */ member
/openbsd/usr.sbin/bgpd/
H A Dpfkey.c55 pfkey_send(fd, satype, cmd, dir, from, to, \
146 smsg.sadb_msg_satype = satype; in pfkey_send()
625 uint8_t satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish() local
636 satype = SADB_SATYPE_ESP; in pfkey_ipsec_establish()
639 satype = SADB_SATYPE_AH; in pfkey_ipsec_establish()
645 if (pfkey_send(pfkey_fd, satype, SADB_ADD, 0, in pfkey_ipsec_establish()
658 if (pfkey_send(pfkey_fd, satype, SADB_ADD, 0, in pfkey_ipsec_establish()
717 uint8_t satype; in pfkey_ipsec_remove() local
721 satype = SADB_SATYPE_ESP; in pfkey_ipsec_remove()
724 satype = SADB_SATYPE_AH; in pfkey_ipsec_remove()
[all …]
/openbsd/sbin/iked/
H A Dpfkey.c282 smsg.sadb_msg_satype = satype; in pfkey_flow()
525 smsg.sadb_msg_satype = satype; in pfkey_sa()
623 satype != SADB_X_SATYPE_IPCOMP && satype != SADB_X_SATYPE_IPIP) { in pfkey_sa()
890 uint8_t satype; in pfkey_sa_lookup() local
918 smsg.sadb_msg_satype = satype; in pfkey_sa_lookup()
1457 uint8_t satype; in pfkey_flow_add() local
1476 uint8_t satype; in pfkey_flow_delete() local
1495 uint8_t satype; in pfkey_sa_init() local
1511 uint8_t satype; in pfkey_sa_add() local
1567 uint8_t satype; in pfkey_sa_update_addresses() local
[all …]
H A Dparse.y409 uint8_t satype; member
452 %type <v.satype> satype
551 ikev2rule : IKEV2 name ikeflags satype af proto rdomain hosts_list peers
616 satype : /* empty */ { $$ = IKEV2_SAPROTO_ESP; }
/openbsd/usr.sbin/ldpd/
H A Dpfkey.c51 pfkey_send(int sd, uint8_t satype, uint8_t mtype, uint8_t dir, in pfkey_send() argument
114 smsg.sadb_msg_satype = satype; in pfkey_send()
/openbsd/sys/net/
H A Dpfkeyv2.c474 u_int8_t satype, int count, u_int rdomain) in pfkeyv2_sendmessage() argument
565 if (!satype) { in pfkeyv2_sendmessage()
571 if ((1 << satype) & kp->kcb_reg) in pfkeyv2_sendmessage()
1055 pfkeyv2_get_proto_alg(u_int8_t satype, u_int8_t *sproto, int *alg) in pfkeyv2_get_proto_alg() argument
1057 switch (satype) { in pfkeyv2_get_proto_alg()
1066 *alg = satype = XF_AH; in pfkeyv2_get_proto_alg()
1077 *alg = satype = XF_ESP; in pfkeyv2_get_proto_alg()
1096 *alg = satype = XF_IPCOMP; in pfkeyv2_get_proto_alg()
/openbsd/sys/netinet/
H A Dip_ipsp.c603 DUMP(satype, "%d"); in tdb_printit()