Lines Matching defs:isr

1909 ipsec_get_reqlevel(isr)
1910 struct ipsecrequest *isr;
1916 if (isr == NULL || isr->sp == NULL)
1918 if (((struct sockaddr *)&isr->sp->spidx.src)->sa_family
1919 != ((struct sockaddr *)&isr->sp->spidx.dst)->sa_family)
1935 switch (((struct sockaddr *)&isr->sp->spidx.src)->sa_family) {
1954 ((struct sockaddr *)&isr->sp->spidx.src)->sa_family);
1960 switch (isr->level) {
1962 switch (isr->saidx.proto) {
1964 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1970 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
1985 isr->saidx.proto);
1991 level = isr->level;
1999 isr->level);
2016 struct ipsecrequest *isr;
2047 for (isr = sp->req; isr != NULL; isr = isr->next) {
2050 level = ipsec_get_reqlevel(isr);
2052 switch (isr->saidx.proto) {
2058 /* this won't work with multiple input threads - isr->sav would change
2064 * isr->sav has been removed.
2068 if (isr->sav != NULL
2069 && isr->sav->flags == SADB_X_EXT_NONE
2070 && isr->sav->alg_auth != SADB_AALG_NONE)
2231 struct ipsecrequest *isr;
2257 for (isr = sp->req; isr != NULL; isr = isr->next) {
2261 switch (isr->saidx.proto) {
2264 clen = esp_hdrsiz(isr);
2270 clen = ah_hdrsiz(isr);
2277 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
2278 switch (((struct sockaddr *)&isr->saidx.dst)->sa_family) {
2290 ((struct sockaddr *)&isr->saidx.dst)->sa_family));
3169 struct ipsecrequest *isr = NULL;
3192 for (isr = sp->req; isr != NULL; isr = isr->next) {
3200 if (isr->saidx.mode == IPSEC_MODE_TRANSPORT
3207 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3208 saidx.mode = isr->saidx.mode;
3209 saidx.reqid = isr->saidx.reqid;
3229 isr->saidx.mode == IPSEC_MODE_TRANSPORT) {
3258 if ((error = key_checkrequest(isr, &saidx, &sav)) != 0) {
3272 switch (ipsec_get_reqlevel(isr)) {
3300 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3378 switch (isr->saidx.proto) {
3407 isr->saidx.proto));
3450 struct ipsecrequest *isr = NULL;
3477 for (isr = sp->req; isr; isr = isr->next) {
3478 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3485 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3486 saidx.mode = isr->saidx.mode;
3487 saidx.reqid = isr->saidx.reqid;
3515 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3542 switch (ipsec_get_reqlevel(isr)) {
3562 switch (isr->saidx.proto) {
3579 "unknown ipsec protocol %d\n", isr->saidx.proto));
3602 if (isr != NULL)
3627 struct ipsecrequest *isr = NULL;
3652 for (isr = sp->req; isr; isr = isr->next) {
3653 if (isr->saidx.mode == IPSEC_MODE_TUNNEL)
3657 for (/* already initialized */; isr; isr = isr->next) {
3658 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3660 bcopy(&isr->saidx, &saidx, sizeof(saidx));
3666 saidx.proto = isr->saidx.proto;
3667 saidx.mode = isr->saidx.mode;
3668 saidx.reqid = isr->saidx.reqid;
3699 if (key_checkrequest(isr, &saidx, &sav) == ENOENT) {
3714 switch (ipsec_get_reqlevel(isr)) {
3734 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) {
3762 * must be last isr because encapsulated IPv6 packet
3765 if (isr->next) {
3810 switch (isr->saidx.proto) {
3844 isr->saidx.proto));
3936 switch (isr->saidx.proto) {
3953 "unknown ipsec protocol %d\n", isr->saidx.proto));