Lines Matching defs:isr

1734 ipsec_get_reqlevel(isr)
1735 struct ipsecrequest *isr;
1741 if (isr == NULL || isr->sp == NULL)
1743 if (((struct sockaddr *)&isr->sp->spidx.src)->sa_family
1744 != ((struct sockaddr *)&isr->sp->spidx.dst)->sa_family)
1760 switch (((struct sockaddr *)&isr->sp->spidx.src)->sa_family) {
1779 ((struct sockaddr *)&isr->sp->spidx.src)->sa_family);
1785 switch (isr->level) {
1787 switch (isr->saidx.proto) {
1789 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1795 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1810 isr->saidx.proto);
1816 level = isr->level;
1824 isr->level);
1841 struct ipsecrequest *isr;
1872 for (isr = sp->req; isr != NULL; isr = isr->next) {
1875 level = ipsec_get_reqlevel(isr);
1877 switch (isr->saidx.proto) {
1883 /* this won't work with multiple input threads - isr->sav would change
1889 * isr->sav has been removed.
1893 if (isr->sav != NULL
1894 && isr->sav->flags == SADB_X_EXT_NONE
1895 && isr->sav->alg_auth != SADB_AALG_NONE)
2054 struct ipsecrequest *isr;
2080 for (isr = sp->req; isr != NULL; isr = isr->next) {
2084 switch (isr->saidx.proto) {
2087 clen = esp_hdrsiz(isr);
2093 clen = ah_hdrsiz(isr);
2100 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
2101 switch (((struct sockaddr *)&isr->saidx.dst)->sa_family) {
2113 ((struct sockaddr *)&isr->saidx.dst)->sa_family));
2998 struct ipsecrequest *isr = NULL;
3021 for (isr = sp->req; isr != NULL; isr = isr->next) {
3029 if (isr->saidx.mode == IPSEC_MODE_TRANSPORT
3036 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3037 saidx.mode = isr->saidx.mode;
3038 saidx.reqid = isr->saidx.reqid;
3058 isr->saidx.mode == IPSEC_MODE_TRANSPORT) {
3087 if ((error = key_checkrequest(isr, &saidx, &sav)) != 0) {
3101 switch (ipsec_get_reqlevel(isr)) {
3129 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3212 switch (isr->saidx.proto) {
3241 isr->saidx.proto));
3284 struct ipsecrequest *isr = NULL;
3311 for (isr = sp->req; isr; isr = isr->next) {
3312 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3319 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3320 saidx.mode = isr->saidx.mode;
3321 saidx.reqid = isr->saidx.reqid;
3349 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3376 switch (ipsec_get_reqlevel(isr)) {
3396 switch (isr->saidx.proto) {
3413 "unknown ipsec protocol %d\n", isr->saidx.proto));
3436 if (isr != NULL)
3461 struct ipsecrequest *isr = NULL;
3486 for (isr = sp->req; isr; isr = isr->next) {
3487 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
3491 for (/* already initialized */; isr; isr = isr->next) {
3492 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3494 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3500 saidx.proto = isr->saidx.proto;
3501 saidx.mode = isr->saidx.mode;
3502 saidx.reqid = isr->saidx.reqid;
3533 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3548 switch (ipsec_get_reqlevel(isr)) {
3568 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3596 * must be last isr because encapsulated IPv6 packet
3599 if (isr->next) {
3648 switch (isr->saidx.proto) {
3690 isr->saidx.proto));
3791 switch (isr->saidx.proto) {
3808 "unknown ipsec protocol %d\n", isr->saidx.proto));