• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netinet6/

Lines Matching refs:isr

1669 ipsec_get_reqlevel(isr)
1670 struct ipsecrequest *isr;
1676 if (isr == NULL || isr->sp == NULL)
1678 if (((struct sockaddr *)&isr->sp->spidx.src)->sa_family
1679 != ((struct sockaddr *)&isr->sp->spidx.dst)->sa_family)
1695 switch (((struct sockaddr *)&isr->sp->spidx.src)->sa_family) {
1714 ((struct sockaddr *)&isr->sp->spidx.src)->sa_family);
1720 switch (isr->level) {
1722 switch (isr->saidx.proto) {
1724 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1730 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1745 isr->saidx.proto);
1751 level = isr->level;
1759 isr->level);
1776 struct ipsecrequest *isr;
1807 for (isr = sp->req; isr != NULL; isr = isr->next) {
1810 level = ipsec_get_reqlevel(isr);
1812 switch (isr->saidx.proto) {
1818 /* this won't work with multiple input threads - isr->sav would change
1824 * isr->sav has been removed.
1828 if (isr->sav != NULL
1829 && isr->sav->flags == SADB_X_EXT_NONE
1830 && isr->sav->alg_auth != SADB_AALG_NONE)
1989 struct ipsecrequest *isr;
2015 for (isr = sp->req; isr != NULL; isr = isr->next) {
2019 switch (isr->saidx.proto) {
2022 clen = esp_hdrsiz(isr);
2028 clen = ah_hdrsiz(isr);
2035 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
2036 switch (((struct sockaddr *)&isr->saidx.dst)->sa_family) {
2048 ((struct sockaddr *)&isr->saidx.dst)->sa_family));
2776 struct ipsecrequest *isr = NULL;
2800 for (isr = sp->req; isr != NULL; isr = isr->next) {
2808 if (isr->saidx.mode == IPSEC_MODE_TRANSPORT
2815 bcopy(&isr->saidx, &saidx, sizeof(saidx));
2816 saidx.mode = isr->saidx.mode;
2817 saidx.reqid = isr->saidx.reqid;
2837 isr->saidx.mode == IPSEC_MODE_TRANSPORT) {
2866 if ((error = key_checkrequest(isr, &saidx, &sav)) != 0) {
2880 switch (ipsec_get_reqlevel(isr)) {
2908 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
2966 switch (isr->saidx.proto) {
2995 isr->saidx.proto));
3038 struct ipsecrequest *isr = NULL;
3065 for (isr = sp->req; isr; isr = isr->next) {
3066 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3073 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3074 saidx.mode = isr->saidx.mode;
3075 saidx.reqid = isr->saidx.reqid;
3103 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3130 switch (ipsec_get_reqlevel(isr)) {
3150 switch (isr->saidx.proto) {
3167 "unknown ipsec protocol %d\n", isr->saidx.proto));
3190 if (isr != NULL)
3216 struct ipsecrequest *isr = NULL;
3242 for (isr = sp->req; isr; isr = isr->next) {
3243 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
3247 for (/* already initialized */; isr; isr = isr->next) {
3248 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3250 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3256 saidx.proto = isr->saidx.proto;
3257 saidx.mode = isr->saidx.mode;
3258 saidx.reqid = isr->saidx.reqid;
3289 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3304 switch (ipsec_get_reqlevel(isr)) {
3324 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3349 * must be last isr because encapsulated IPv6 packet
3352 if (isr->next) {
3393 switch (isr->saidx.proto) {
3423 isr->saidx.proto));
3485 switch (isr->saidx.proto) {
3502 "unknown ipsec protocol %d\n", isr->saidx.proto));