/freebsd-12-stable/sys/netipsec/ |
H A D | key.h | 40 struct secpolicy; 51 struct secpolicy *key_newsp(void); 52 struct secpolicy *key_allocsp(struct secpolicyindex *, u_int); 53 struct secpolicy *key_msg2sp(struct sadb_x_policy *, size_t, int *); 54 int key_sp2msg(struct secpolicy *, void *, size_t *); 55 void key_addref(struct secpolicy *); 56 void key_freesp(struct secpolicy **); 57 int key_spdacquire(struct secpolicy *); 66 struct secasvar *key_allocsa_policy(struct secpolicy *, 75 int key_register_ifnet(struct secpolicy **, u_in [all...] |
H A D | xform.h | 54 struct secpolicy; 72 struct secpolicy *sp; /* security policy */ 96 struct secpolicy *, struct secasvar *, u_int, int, int);
|
H A D | ipsec.h | 76 struct secpolicy { struct 77 TAILQ_ENTRY(secpolicy) chain; 78 LIST_ENTRY(secpolicy) idhash; 79 LIST_ENTRY(secpolicy) drainq; 119 struct secpolicy *sp_in; 120 struct secpolicy *sp_out; 320 struct secpolicy *ipsec4_checkpolicy(const struct mbuf *, struct inpcb *, 323 u_int ipsec_get_reqlevel(struct secpolicy *, u_int); 346 int ipsec4_process_packet(struct mbuf *, struct secpolicy *, struct inpcb *); 347 int ipsec_process_done(struct mbuf *, struct secpolicy *, struc [all...] |
H A D | ipsec6.h | 64 struct secpolicy *ipsec6_checkpolicy(const struct mbuf *, 76 int ipsec6_process_packet(struct mbuf *, struct secpolicy *, struct inpcb *);
|
H A D | key_debug.h | 77 struct secpolicy; 91 void kdebug_secpolicy(struct secpolicy *);
|
H A D | ipsec.c | 126 VNET_DEFINE_STATIC(struct secpolicy *, def_policy) = NULL; 288 static int ipsec_in_reject(struct secpolicy *, struct inpcb *, 305 static struct secpolicy * 316 struct secpolicy *sp; 335 ipsec_cachepolicy(struct inpcb *inp, struct secpolicy *sp, u_int dir) 415 static struct secpolicy * 416 ipsec_checkpolicy(struct secpolicy *sp, struct inpcb *inp, int *error) 444 static struct secpolicy * 447 struct secpolicy *sp; 579 static struct secpolicy * [all...] |
H A D | ipsec_pcb.c | 187 static struct secpolicy * 188 ipsec_deepcopy_pcbpolicy(struct secpolicy *src) 190 struct secpolicy *dst; 231 struct secpolicy *sp; 276 struct secpolicy **spp, *newsp; 363 struct secpolicy *sp;
|
H A D | ipsec_output.c | 110 ipsec4_allocsa(struct mbuf *m, struct secpolicy *sp, u_int *pidx, int *error) 186 ipsec4_perform_request(struct mbuf *m, struct secpolicy *sp, 288 ipsec4_process_packet(struct mbuf *m, struct secpolicy *sp, 298 struct secpolicy *sp; 410 ipsec6_allocsa(struct mbuf *m, struct secpolicy *sp, u_int *pidx, int *error) 498 ipsec6_perform_request(struct mbuf *m, struct secpolicy *sp, 590 ipsec6_process_packet(struct mbuf *m, struct secpolicy *sp, 600 struct secpolicy *sp; 688 ipsec_process_done(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav,
|
H A D | key.c | 147 TAILQ_HEAD(secpolicy_queue, secpolicy); 148 LIST_HEAD(secpolicy_list, secpolicy); 179 struct secpolicy *sp; /* cached policy to be used */ 625 static void key_unlink(struct secpolicy *); 626 static struct secpolicy *key_do_allocsp(struct secpolicyindex *spidx, u_int dir); 627 static struct secpolicy *key_getsp(struct secpolicyindex *); 628 static struct secpolicy *key_getspbyid(u_int32_t); 644 static struct mbuf *key_setdumpsp(struct secpolicy *, 646 static struct mbuf *key_sp2mbuf(struct secpolicy *); 647 static size_t key_getspreqmsglen(struct secpolicy *); [all...] |
H A D | xform_ah.c | 865 ah_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav, 1105 struct secpolicy *sp;
|
H A D | xform_esp.c | 670 esp_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav, 927 struct secpolicy *sp;
|
H A D | xform_ipcomp.c | 391 ipcomp_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav, 531 struct secpolicy *sp;
|
H A D | key_debug.c | 722 kdebug_secpolicy(struct secpolicy *sp)
|
/freebsd-12-stable/sys/net/ |
H A D | if_ipsec.c | 91 struct secpolicy *sp[IPSEC_SPCOUNT]; 319 static struct secpolicy * 343 struct secpolicy *sp; 356 struct secpolicy *sp; 843 ipsec_newpolicies(struct ipsec_softc *sc, struct secpolicy *sp[IPSEC_SPCOUNT], 849 memset(sp, 0, sizeof(struct secpolicy *) * IPSEC_SPCOUNT); 1018 struct secpolicy *sp[IPSEC_SPCOUNT];
|
/freebsd-12-stable/contrib/wpa/src/ap/ |
H A D | ap_config.h | 86 } secpolicy; typedef in typeref:enum:hostap_security_policy 97 secpolicy security_policy;
|
/freebsd-12-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/ |
H A D | zfs_ioctl.c | 67 * zfs_secpolicy_func_t *secpolicy 731 * use that name for the secpolicy/zone checks. 3561 * logging. The secpolicy func already checked that it is set. 6184 zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, 6195 vec->zvec_secpolicy = secpolicy; 6207 zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, 6223 vec->zvec_secpolicy = secpolicy; 6232 zfs_secpolicy_func_t *secpolicy, boolean_t log_history, 6235 zfs_ioctl_register_legacy(ioc, func, secpolicy, 6241 zfs_secpolicy_func_t *secpolicy, zfs_ioc_poolcheck_ 6183 zfs_ioctl_register_legacy(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, boolean_t log_history, zfs_ioc_poolcheck_t pool_check) argument 6206 zfs_ioctl_register(const char *name, zfs_ioc_t ioc, zfs_ioc_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, zfs_ioc_poolcheck_t pool_check, boolean_t smush_outnvlist, boolean_t allow_log) argument 6231 zfs_ioctl_register_pool(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, boolean_t log_history, zfs_ioc_poolcheck_t pool_check) argument 6240 zfs_ioctl_register_dataset_nolog(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_poolcheck_t pool_check) argument 6255 zfs_ioctl_register_pool_meta(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument 6263 zfs_ioctl_register_dataset_read_secpolicy(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument 6278 zfs_ioctl_register_dataset_modify(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument [all...] |