/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | key.h | 83 extern void key_delsah(struct secashead *sah); 91 extern struct secasvar * key_newsav2(struct secashead *sah,
|
H A D | key.c | 835 struct secashead *sah; local 851 LIST_FOREACH(sah, &sahtree, chain) { 852 if (sah->ipsec_if == interface && 853 (family == AF_INET6 || sah->saidx.dst.ss_family == family) && /* IPv6 can go over IPv4 */ 854 sah->dir == IPSEC_DIR_OUTBOUND) { 864 sin = (struct sockaddr_in *)&sah->saidx.dst; 866 if (sah->saidx.mode == IPSEC_MODE_TRANSPORT) 871 sav = key_do_allocsa_policy(sah, state, dstport); 966 struct secashead *sah; local 976 LIST_FOREACH(sah, 1089 key_do_allocsa_policy( struct secashead *sah, u_int state, u_int16_t dstport) argument 1380 struct secashead *sah; local 1432 key_do_get_translated_port( struct secashead *sah, struct secasvar *outsav, u_int state) argument 3502 key_delsah( struct secashead *sah) argument 3585 key_newsav( struct mbuf *m, const struct sadb_msghdr *mhp, struct secashead *sah, int *errp, struct socket *so) argument 3741 key_newsav2(struct secashead *sah, u_int8_t satype, u_int8_t alg_auth, u_int8_t alg_enc, u_int32_t flags, u_int8_t replay, struct sadb_key *key_auth, u_int16_t key_auth_len, struct sadb_key *key_enc, u_int16_t key_enc_len, u_int16_t natt_port, u_int32_t seq, u_int32_t spi, u_int32_t pid, struct sadb_lifetime *lifetime_hard, struct sadb_lifetime *lifetime_soft) argument 3908 struct secashead *sah; local 3926 struct secashead *sah; local 3997 key_getsavbyspi( struct secashead *sah, u_int32_t spi) argument 5887 struct secashead *sah, *nextsah; local 6776 struct secashead *sah; local 6955 key_getsavbyseq( struct secashead *sah, u_int32_t seq) argument 7141 key_setident( struct secashead *sah, struct mbuf *m, const struct sadb_msghdr *mhp) argument 7283 struct secashead *sah; local 7398 struct secashead *sah; local 7490 struct secashead *sah; local 7582 struct secashead *sah; local 8239 struct secashead *sah; local 8531 struct secashead *sah, *nextsah; local 8735 struct secashead *sah, *nextsah; local 8823 struct secashead *sah; local 9569 struct secashead *sah; local 9952 struct secashead *sah; local 10014 struct secashead *sah = NULL; local [all...] |
H A D | keydb.h | 109 struct secashead *sah; /* back pointer to the secashead */ member in struct:secasvar
|
H A D | key_debug.c | 605 kdebug_secasindex(&sav->sah->saidx);
|
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | if_utun_crypto_ipsec.c | 173 utun_ipsec_set_sah (struct secashead **sah, argument 203 // TODO: add sah and policy (collision) check and prevention. ensure that there is no conflicting policy. 205 *sah = key_newsah2(&saidx, dir); 211 utun_ipsec_clr_sahs (struct secashead **sah) argument 219 for (sav = LIST_FIRST(&(*sah)->savtree[state]); 243 key_delsah(*sah); 295 utun_ipsec_alloc_sav (struct secashead *sah, argument 335 if ((*sav = key_newsav2(sah, 384 utun_ipsec_num_savs (struct secashead **sah) argument 393 for (sav = LIST_FIRST(&(*sah) 423 struct secashead *sah; local [all...] |
H A D | if_utun_crypto_ipsec.h | 38 #define IF_UTUN_GET_CRYPTO_KEYS_IPSEC_SAH(keys) keys->state.u.ipsec.sah
|
H A D | if_utun_crypto.h | 298 struct secashead *sah; member in struct:utun_crypto_keys_ipsec_state
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | ipsec.c | 2253 if (((struct sockaddr *)&sav->sah->saidx.src)->sa_family 2254 != ((struct sockaddr *)&sav->sah->saidx.dst)->sa_family 2255 || ((struct sockaddr *)&sav->sah->saidx.src)->sa_family != AF_INET) { 2261 if (key_ismyaddr((struct sockaddr *)&sav->sah->saidx.dst)) { 2345 bcopy(&((struct sockaddr_in *)&sav->sah->saidx.src)->sin_addr, 2347 bcopy(&((struct sockaddr_in *)&sav->sah->saidx.dst)->sin_addr, 2370 if (((struct sockaddr *)&sav->sah->saidx.src)->sa_family 2371 != ((struct sockaddr *)&sav->sah->saidx.dst)->sa_family 2372 || ((struct sockaddr *)&sav->sah->saidx.src)->sa_family != AF_INET) { 2434 bcopy(&((struct sockaddr_in *)&sav->sah [all...] |
H A D | ah_input.c | 492 if (sav->sah->ipsec_if != NULL) { 493 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 547 if (sav->sah->ipsec_if != NULL) { 552 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 892 if (sav->sah->ipsec_if != NULL) { 893 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 939 if (sav->sah->ipsec_if != NULL) { 940 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) {
|
H A D | esp_input.c | 582 if (sav->sah->ipsec_if != NULL) { 583 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 692 if (sav->sah->ipsec_if != NULL) { 697 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 1073 if (sav->sah->ipsec_if != NULL) { 1074 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) { 1191 if (sav->sah->ipsec_if != NULL) { 1192 if (ipsec_inject_inbound_packet(sav->sah->ipsec_if, m) == 0) {
|
H A D | ah_core.c | 255 if (sav->sah->saidx.proto == IPPROTO_AH) {
|
/macosx-10.10/ICU-531.30/icuSources/common/ |
H A D | locmap.c | 569 ILCID_POSIX_ELEMENT_ARRAY(0x0485, sah,sah_RU) 840 ILCID_POSIX_MAP(sah), /* sah Yakut 0x85 */
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | key_debug.c | 704 kdebug_secasindex(&sav->sah->saidx);
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | ip_input.c | 2916 if (sav->sah != NULL) { 2917 ro = &sav->sah->sa_route;
|
/macosx-10.10/files-662.1.1/private/etc/ |
H A D | services | 8331 sah-lm 3291/udp # S A Holditch & Associates - LM 8332 sah-lm 3291/tcp # S A Holditch & Associates - LM
|