• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.9.5/xnu-2422.115.4/bsd/netkey/

Lines Matching defs:proto

428 (idx)->proto = (p);                                                  \
976 if ((satype = key_proto2satype(sav->sah->saidx.proto)) == 0)
977 panic("key_do_allocsa_policy: invalid proto is passed.\n");
1171 u_int proto,
1215 if (proto != sav->sah->saidx.proto)
1336 saidx.proto = outsav->sah->saidx.proto;
1841 "key_msg2sp: invalid proto type=%u\n",
1847 (*p_isr)->saidx.proto = xisr->sadb_x_ipsecrequest_proto;
2062 xisr->sadb_x_ipsecrequest_proto = isr->saidx.proto;
2394 if (newsp->req->saidx.mode != IPSEC_MODE_TUNNEL || newsp->req->saidx.proto != IPPROTO_ESP
2409 if (newsp->req->saidx.mode != IPSEC_MODE_TUNNEL || newsp->req->saidx.proto != IPPROTO_ESP
4617 switch (sav->sah->saidx.proto) {
4632 switch (sav->sah->saidx.proto) {
5430 if (saidx0->proto != saidx1->proto)
6369 u_int16_t proto)
6371 switch (proto) {
6408 u_int8_t proto;
6443 /* map satype to proto */
6444 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
6484 KEY_SETSECASIDX(proto, mode, reqid, src0 + 1, dst0 + 1, &saidx);
6606 u_int8_t proto,
6617 KEY_SETSECASIDX(proto, mode, reqid, src, dst, &saidx);
6686 if (saidx->proto == IPPROTO_IPCOMP) {
6761 u_int16_t proto;
6772 /* map satype to proto */
6773 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
6814 KEY_SETSECASIDX(proto, mode, reqid, src0 + 1, dst0 + 1, &saidx);
6854 if (sav->sah->saidx.proto != proto) {
6858 sav->sah->saidx.proto, proto));
6985 u_int16_t proto;
6996 /* map satype to proto */
6997 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
7038 KEY_SETSECASIDX(proto, mode, reqid, src0 + 1, dst0 + 1, &saidx);
7256 u_int16_t proto;
7264 /* map satype to proto */
7265 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
7292 return key_delete_all(so, m, mhp, proto);
7304 KEY_SETSECASIDX(proto, IPSEC_MODE_ANY, 0, src0 + 1, dst0 + 1, &saidx);
7363 u_int16_t proto)
7377 KEY_SETSECASIDX(proto, IPSEC_MODE_ANY, 0, src0 + 1, dst0 + 1, &saidx);
7459 u_int16_t proto;
7467 /* map satype to proto */
7468 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
7491 KEY_SETSECASIDX(proto, IPSEC_MODE_ANY, 0, src0 + 1, dst0 + 1, &saidx);
7517 /* map proto to satype */
7518 if ((satype = key_proto2satype(sah->saidx.proto)) == 0) {
7520 ipseclog((LOG_DEBUG, "key_get: there was invalid proto in SAD.\n"));
7833 switch (saidx->proto) {
7906 if ((satype = key_proto2satype(saidx->proto)) == 0)
7907 panic("key_acquire: invalid proto is passed.\n");
8205 u_int16_t proto;
8258 /* map satype to proto */
8259 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
8287 KEY_SETSECASIDX(proto, IPSEC_MODE_ANY, 0, src0 + 1, dst0 + 1, &saidx);
8554 if ((satype = key_proto2satype(sav->sah->saidx.proto)) == 0)
8555 panic("key_expire: invalid proto is passed.\n");
8673 u_int16_t proto;
8681 /* map satype to proto */
8682 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
8696 && proto != sah->saidx.proto)
8762 u_int16_t proto;
8776 /* map satype to proto */
8777 if ((proto = key_satype2proto(mhp->msg->sadb_msg_satype)) == 0) {
8799 && proto != sah->saidx.proto)
8802 /* map proto to satype */
8803 if ((satype = key_proto2satype(sah->saidx.proto)) == 0) {
8805 ipseclog((LOG_DEBUG, "key_dump: there was invalid proto in SAD.\n"));
9780 saidx_swap_sent_addr.proto = sav_sent->sah->saidx.proto;