/freebsd-current/sys/netipsec/ |
H A D | key.c | 999 struct secashead *sah; local 1008 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { 1011 kdebug_secash(sah, " ")); 1012 if (sah->saidx.proto != IPPROTO_TCP) 1014 if (!key_sockaddrcmp(&saidx->dst.sa, &sah->saidx.dst.sa, 0) && 1015 !key_sockaddrcmp(&saidx->src.sa, &sah->saidx.src.sa, 0)) 1018 if (sah != NULL) { 1020 sav = TAILQ_LAST(&sah->savtree_alive, secasvar_queue); 1022 sav = TAILQ_FIRST(&sah->savtree_alive); 1052 struct secashead *sah; local 1176 struct secashead *sah; local 1407 struct secashead *sah; local 2892 struct secashead *sah; local 2915 struct secashead *sah = *psah; local 2931 key_delsah(struct secashead *sah) argument 2956 struct secashead *sah; local 3061 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 3182 struct secashead *sah; local 4529 struct secashead *sah, *nextsah; local 5122 struct secashead *sah; local 5172 struct secashead *sah; local 5293 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 5960 key_setident(struct secashead *sah, const struct sadb_msghdr *mhp) argument 6186 struct secashead *sah; local 6248 struct secashead *sah; local 7072 struct secashead *sah; local 7532 struct secashead *sah, *nextsah; local 7576 struct secashead *sah, *nextsah; local 7689 struct secashead *sah; local 8449 struct secashead *sah; local [all...] |
H A D | xform_ah.c | 160 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { 590 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 600 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 646 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, 714 saidx = &sav->sah->saidx; 871 switch (sav->sah->saidx.dst.sa.sa_family) { 885 sav->sah->saidx.dst.sa.sa_family, 886 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 895 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 909 ipsec_address(&sav->sah [all...] |
H A D | udpencap.c | 251 switch (sav->sah->saidx.dst.sa.sa_family) { 282 switch (sav->sah->saidx.dst.sa.sa_family) { 346 switch (sav->sah->saidx.dst.sa.sa_family) { 368 switch (sav->sah->saidx.dst.sa.sa_family) {
|
H A D | xform_ipcomp.c | 303 saidx = &sav->sah->saidx; 357 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 430 switch (sav->sah->saidx.dst.sa.sa_family) { 445 sav->sah->saidx.dst.sa.sa_family, 446 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 455 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 469 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 588 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 597 switch (sav->sah->saidx.dst.sa.sa_family) { 618 switch (sav->sah [all...] |
H A D | ipsec_input.c | 348 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 349 saidx = &sav->sah->saidx; 363 __func__, ipsec_address(&sav->sah->saidx.dst, 597 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 598 saidx = &sav->sah->saidx; 612 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
|
H A D | key_debug.c | 788 kdebug_secash(struct secashead *sah, const char *indent) argument 791 IPSEC_ASSERT(sah != NULL, ("null sah")); 794 printf("SAH { refcnt=%u state=%s\n", sah->refcnt, 795 kdebug_secasv_state(sah->state)); 798 kdebug_secasindex(&sah->saidx, indent); 857 kdebug_secash(sav->sah, " "); 977 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), 978 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf)));
|
H A D | ipsec_output.c | 225 dst = &sav->sah->saidx.dst; 236 error = ipsec_encap(&m, &sav->sah->saidx); 275 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 611 dst = &sav->sah->saidx.dst; 624 error = ipsec_encap(&m, &sav->sah->saidx); 658 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 856 saidx = &sav->sah->saidx; 1032 dst = &sav->sah->saidx.dst;
|
H A D | keydb.h | 155 struct secashead *sah; /* back pointer to the secashead */ member in struct:secasvar
|
H A D | xform_esp.c | 331 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 521 saidx = &sav->sah->saidx; 613 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 627 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 639 &sav->sah->saidx.dst, buf, sizeof(buf)), 745 saidx = &sav->sah->saidx;
|
H A D | xform_tcp.c | 192 switch (sav->sah->saidx.dst.sa.sa_family) {
|
H A D | ipsec.c | 1313 if (sav->sah->saidx.proto == IPPROTO_ESP) 1315 else if (sav->sah->saidx.proto == IPPROTO_AH) 1358 if (sav->sah->saidx.proto == IPPROTO_ESP) 1360 else if (sav->sah->saidx.proto == IPPROTO_AH)
|
/freebsd-current/sys/net/ |
H A D | if_ipsec.c | 464 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || 465 sav->sah->saidx.proto != IPPROTO_ESP) 469 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { 473 sav->sah->saidx.src.sa.sa_family); 476 sav->sah->saidx.reqid != saidx->reqid) 479 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, 482 if (key_sockaddrcmp(&sav->sah->saidx.src.sa,
|
/freebsd-current/sys/dev/bnxt/bnxt_re/ |
H A D | ib_verbs.c | 1787 struct bnxt_re_ah *sah; local 1795 sah = rdev->gsi_ctx.gsi_sah; 1798 if (sah) { 1800 if (!compare_ether_header(sah->qplib_ah.dmac, rdev->dev_addr)) { 1810 &sah->qplib_ah, false); 1817 kfree(sah); 1820 sah = bnxt_re_create_shadow_qp_ah(pd, &rdev->qplib_res, 1822 if (!sah) { 1827 rdev->gsi_ctx.gsi_sah = sah; 2179 struct bnxt_re_ah *sah; local [all...] |
/freebsd-current/sys/dev/qat_c2xxx/ |
H A D | qat.c | 1209 const struct auth_hash *sah = hash_def->qshd_alg->qshai_sah; local 1214 hmac_init_ipad(sah, key, klen, &ctx); 1217 hmac_init_opad(sah, key, klen, &ctx);
|
/freebsd-current/sys/dev/ixl/ |
H A D | i40e_adminq_cmd.h | 547 __le16 sah; member in struct:i40e_aqc_mng_laa
|