Searched refs:secpolicy (Results 1 - 16 of 16) sorted by relevance

/freebsd-12-stable/sys/netipsec/
H A Dkey.h40 struct secpolicy;
51 struct secpolicy *key_newsp(void);
52 struct secpolicy *key_allocsp(struct secpolicyindex *, u_int);
53 struct secpolicy *key_msg2sp(struct sadb_x_policy *, size_t, int *);
54 int key_sp2msg(struct secpolicy *, void *, size_t *);
55 void key_addref(struct secpolicy *);
56 void key_freesp(struct secpolicy **);
57 int key_spdacquire(struct secpolicy *);
66 struct secasvar *key_allocsa_policy(struct secpolicy *,
75 int key_register_ifnet(struct secpolicy **, u_in
[all...]
H A Dxform.h54 struct secpolicy;
72 struct secpolicy *sp; /* security policy */
96 struct secpolicy *, struct secasvar *, u_int, int, int);
H A Dipsec.h76 struct secpolicy { struct
77 TAILQ_ENTRY(secpolicy) chain;
78 LIST_ENTRY(secpolicy) idhash;
79 LIST_ENTRY(secpolicy) drainq;
119 struct secpolicy *sp_in;
120 struct secpolicy *sp_out;
320 struct secpolicy *ipsec4_checkpolicy(const struct mbuf *, struct inpcb *,
323 u_int ipsec_get_reqlevel(struct secpolicy *, u_int);
346 int ipsec4_process_packet(struct mbuf *, struct secpolicy *, struct inpcb *);
347 int ipsec_process_done(struct mbuf *, struct secpolicy *, struc
[all...]
H A Dipsec6.h64 struct secpolicy *ipsec6_checkpolicy(const struct mbuf *,
76 int ipsec6_process_packet(struct mbuf *, struct secpolicy *, struct inpcb *);
H A Dkey_debug.h77 struct secpolicy;
91 void kdebug_secpolicy(struct secpolicy *);
H A Dipsec.c126 VNET_DEFINE_STATIC(struct secpolicy *, def_policy) = NULL;
288 static int ipsec_in_reject(struct secpolicy *, struct inpcb *,
305 static struct secpolicy *
316 struct secpolicy *sp;
335 ipsec_cachepolicy(struct inpcb *inp, struct secpolicy *sp, u_int dir)
415 static struct secpolicy *
416 ipsec_checkpolicy(struct secpolicy *sp, struct inpcb *inp, int *error)
444 static struct secpolicy *
447 struct secpolicy *sp;
579 static struct secpolicy *
[all...]
H A Dipsec_pcb.c187 static struct secpolicy *
188 ipsec_deepcopy_pcbpolicy(struct secpolicy *src)
190 struct secpolicy *dst;
231 struct secpolicy *sp;
276 struct secpolicy **spp, *newsp;
363 struct secpolicy *sp;
H A Dipsec_output.c110 ipsec4_allocsa(struct mbuf *m, struct secpolicy *sp, u_int *pidx, int *error)
186 ipsec4_perform_request(struct mbuf *m, struct secpolicy *sp,
288 ipsec4_process_packet(struct mbuf *m, struct secpolicy *sp,
298 struct secpolicy *sp;
410 ipsec6_allocsa(struct mbuf *m, struct secpolicy *sp, u_int *pidx, int *error)
498 ipsec6_perform_request(struct mbuf *m, struct secpolicy *sp,
590 ipsec6_process_packet(struct mbuf *m, struct secpolicy *sp,
600 struct secpolicy *sp;
688 ipsec_process_done(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav,
H A Dkey.c147 TAILQ_HEAD(secpolicy_queue, secpolicy);
148 LIST_HEAD(secpolicy_list, secpolicy);
179 struct secpolicy *sp; /* cached policy to be used */
625 static void key_unlink(struct secpolicy *);
626 static struct secpolicy *key_do_allocsp(struct secpolicyindex *spidx, u_int dir);
627 static struct secpolicy *key_getsp(struct secpolicyindex *);
628 static struct secpolicy *key_getspbyid(u_int32_t);
644 static struct mbuf *key_setdumpsp(struct secpolicy *,
646 static struct mbuf *key_sp2mbuf(struct secpolicy *);
647 static size_t key_getspreqmsglen(struct secpolicy *);
[all...]
H A Dxform_ah.c865 ah_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav,
1105 struct secpolicy *sp;
H A Dxform_esp.c670 esp_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav,
927 struct secpolicy *sp;
H A Dxform_ipcomp.c391 ipcomp_output(struct mbuf *m, struct secpolicy *sp, struct secasvar *sav,
531 struct secpolicy *sp;
H A Dkey_debug.c722 kdebug_secpolicy(struct secpolicy *sp)
/freebsd-12-stable/sys/net/
H A Dif_ipsec.c91 struct secpolicy *sp[IPSEC_SPCOUNT];
319 static struct secpolicy *
343 struct secpolicy *sp;
356 struct secpolicy *sp;
843 ipsec_newpolicies(struct ipsec_softc *sc, struct secpolicy *sp[IPSEC_SPCOUNT],
849 memset(sp, 0, sizeof(struct secpolicy *) * IPSEC_SPCOUNT);
1018 struct secpolicy *sp[IPSEC_SPCOUNT];
/freebsd-12-stable/contrib/wpa/src/ap/
H A Dap_config.h86 } secpolicy; typedef in typeref:enum:hostap_security_policy
97 secpolicy security_policy;
/freebsd-12-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/
H A Dzfs_ioctl.c67 * zfs_secpolicy_func_t *secpolicy
731 * use that name for the secpolicy/zone checks.
3561 * logging. The secpolicy func already checked that it is set.
6184 zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck,
6195 vec->zvec_secpolicy = secpolicy;
6207 zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck,
6223 vec->zvec_secpolicy = secpolicy;
6232 zfs_secpolicy_func_t *secpolicy, boolean_t log_history,
6235 zfs_ioctl_register_legacy(ioc, func, secpolicy,
6241 zfs_secpolicy_func_t *secpolicy, zfs_ioc_poolcheck_
6183 zfs_ioctl_register_legacy(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, boolean_t log_history, zfs_ioc_poolcheck_t pool_check) argument
6206 zfs_ioctl_register(const char *name, zfs_ioc_t ioc, zfs_ioc_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_namecheck_t namecheck, zfs_ioc_poolcheck_t pool_check, boolean_t smush_outnvlist, boolean_t allow_log) argument
6231 zfs_ioctl_register_pool(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, boolean_t log_history, zfs_ioc_poolcheck_t pool_check) argument
6240 zfs_ioctl_register_dataset_nolog(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy, zfs_ioc_poolcheck_t pool_check) argument
6255 zfs_ioctl_register_pool_meta(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument
6263 zfs_ioctl_register_dataset_read_secpolicy(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument
6278 zfs_ioctl_register_dataset_modify(zfs_ioc_t ioc, zfs_ioc_legacy_func_t *func, zfs_secpolicy_func_t *secpolicy) argument
[all...]

Completed in 215 milliseconds