• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netkey/

Lines Matching refs:in

8  * Redistribution and use in source and binary forms, with or without
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
60 #include <netinet/in.h>
132 * - SAs that are not in DEAD state will have (total external reference + 1)
133 * following value in reference count field. they cannot be freed and are
135 * - SAs that are in DEAD state will have (total external reference)
136 * in reference count field. they are ready to be freed. reference from
137 * SA header will be removed in key_delsav(), when the reference count
290 /* time between NATT keepalives in seconds, 0 disabled */
611 printf("*** in SPD\n");
712 * checking each request entries in SP, and acquire an SA if need.
1028 * Note that, however, we do need to keep source address in IPsec SA.
1030 * keep source address in IPsec SA. We see a tricky situation here.
1053 * the search order is important even in the inbound case.
1582 * NOTE: `state', `secpolicyindex' in secpolicy structure are not set,
2156 else { /* XXX until we have policy ordering in the kernel */
2173 /* delete the entry in spacqtree */
2177 /* reset counter in order to deletion by timehandler. */
2330 /* Is there SP in SPD ? */
2402 /* Is there SP in SPD ? */
2444 panic("length inconsistency in key_spddelete2");
2503 /* Is there SP in SPD ? */
2601 * from the user, and free all entries in secpctree.
3003 /* searching all SA registerd in the secindex. */
3493 sav->key_enc = NULL; /*just in case*/
3760 /* message generated in per-algorithm function*/
3799 /* message generated in per-algorithm function*/
3810 ipseclog((LOG_DEBUG, "key_mature: ESP not supported in this configuration\n"));
4296 * NOTE: derived ip6_input() in KAME. This is necessary to modify more.
4344 * saidx0: source, it can be in SAD.
4379 * The result must be of same reqid in this case.
4407 * spidx0: source, it is often in SPD.
4444 * spidx0: source, it is often in SPD.
4825 * message in the status of
4891 /* delete entry in DEAD */
5270 /* XXX don't free new SA index allocated in above. */
5279 /* delete the entry in acqtree */
5283 /* reset counter in order to deletion by timehandler. */
5332 panic("length inconsistency in key_getspi");
5793 * in the database on success.
6218 ipseclog((LOG_DEBUG, "key_get: there was invalid proto in SAD.\n"));
6287 panic("assumption failed in key_getcomb_esp");
6305 panic("assumption failed in key_getcomb_esp");
6371 panic("assumption failed in key_getcomb_ah");
6396 * not really an official behavior. discussed in pf_key@inner.net in Sep2000.
6417 panic("assumption failed in key_getcomb_ipcomp");
6502 * XXX for ipcomp, RFC2367 does not define how to fill in proposal.
6650 * due to the way sadb_comb is declared in RFC2367.
6804 * in first situation, is receiving
6835 * We assume that if error was occurred in IKEd, the length of PFKEY
6837 * We do not raise error even if error occurred in this function.
6864 /* reset acq counter in order to deletion by timehander. */
7101 panic("length assumption failed in key_register");
7170 panic("key_expire: Why was SA index in SA NULL.\n");
7273 * from the ikmpd, and free all entries in secastree.
7354 * dump all entries including status of DEAD in SAD.
7422 ipseclog((LOG_DEBUG, "key_dump: there was invalid proto in SAD.\n"));
7597 #if 0 /*kdebug_sadb assumes msg in linear buffer*/
7664 /* align the mbuf chain so that extensions are in contiguous region. */
7882 extlen = end; /*just in case extlen is not updated*/
8116 /* to check bytes lifetime is done in key_timehandler(). */
8121 * whenever {esp,ah}_{in,out}put is called.
8128 * in seconds. HARD and SOFT lifetime are measured by the time
8129 * difference (again in seconds) from sadb_lifetime_usetime.
8267 #include <netinet/in.h>
8632 * We want to do everything in our power to ensure that the interface