/macosx-10.5.8/xnu-1228.15.4/bsd/netinet6/ |
H A D | ah_output.c | 110 /*%%%%% this needs to change - no sav in ipsecrequest any more */ 111 if (isr->sav == NULL) 113 if (isr->sav->state != SADB_SASTATE_MATURE 114 && isr->sav->state != SADB_SASTATE_DYING) 118 algo = ah_algorithm_lookup(isr->sav->alg_auth); 129 hdrsiz = (((*algo->sumsiz)(isr->sav) + 3) & ~(4 - 1)); 130 if (isr->sav->flags & SADB_X_EXT_OLD) 159 ah4_output(m, sav) 161 struct secasvar *sav; 176 if ((sav [all...] |
H A D | esp_core.c | 226 esp_schedule(algo, sav) 228 struct secasvar *sav; 233 if (_KEYBITS(sav->key_enc) < algo->keymin || 234 _KEYBITS(sav->key_enc) > algo->keymax) { 237 "needs %d to %d bits\n", algo->name, _KEYBITS(sav->key_enc), 244 if (sav->sched && sav->schedlen != 0) { 254 sav->schedlen = (*algo->schedlen)(algo); 255 if (sav->schedlen < 0) { 261 sav 282 esp_null_mature( __unused struct secasvar *sav) argument 291 esp_null_decrypt( __unused struct mbuf *m, __unused size_t off, __unused struct secasvar *sav, __unused const struct esp_algorithm *algo, __unused int ivlen) argument 303 esp_null_encrypt( __unused struct mbuf *m, __unused size_t off, __unused size_t plen, __unused struct secasvar *sav, __unused const struct esp_algorithm *algo, __unused int ivlen) argument 358 esp_descbc_ivlen( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 381 esp_des_schedule( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 395 esp_des_blockdecrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 410 esp_des_blockencrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 500 esp_blowfish_schedule( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 512 esp_blowfish_blockdecrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 532 esp_blowfish_blockencrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 560 esp_cast128_schedule( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 571 esp_cast128_blockdecrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 586 esp_cast128_blockencrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 610 esp_3des_schedule( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 631 esp_3des_blockdecrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 648 esp_3des_blockencrypt( __unused const struct esp_algorithm *algo, struct secasvar *sav, u_int8_t *s, u_int8_t *d) argument 665 esp_common_ivlen( const struct esp_algorithm *algo, __unused struct secasvar *sav) argument 875 esp_cbc_encrypt( struct mbuf *m, size_t off, __unused size_t plen, struct secasvar *sav, const struct esp_algorithm *algo, int ivlen) argument [all...] |
H A D | esp_input.c | 121 struct secasvar *sav = NULL; local 160 if ((sav = key_allocsa(AF_INET, 170 printf("DP esp4_input called to allocate SA:%p\n", sav)); 171 if (sav->state != SADB_SASTATE_MATURE 172 && sav->state != SADB_SASTATE_DYING) { 179 algo = esp_algorithm_lookup(sav->alg_enc); 189 ivlen = sav->ivlen; 192 ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav))); 197 if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav 568 struct secasvar *sav = NULL; local 977 struct secasvar *sav; local [all...] |
H A D | esp_output.c | 91 int, struct secasvar *sav); 114 struct secasvar *sav; 122 /*%%%% this needs to change - no sav in ipsecrequest any more */ 123 sav = isr->sav; 128 if (sav == NULL) 130 if (sav->state != SADB_SASTATE_MATURE 131 && sav->state != SADB_SASTATE_DYING) 135 algo = esp_algorithm_lookup(sav->alg_enc); 138 ivlen = sav [all...] |
H A D | ah_core.c | 200 ah_sumsiz_1216(sav) 201 struct secasvar *sav; 203 if (!sav) 205 if (sav->flags & SADB_X_EXT_OLD) 212 ah_sumsiz_zero(sav) 213 struct secasvar *sav; 215 if (!sav) 221 ah_none_mature(sav) 222 struct secasvar *sav; 224 if (sav 233 ah_none_init( struct ah_algorithm_state *state, __unused struct secasvar *sav) argument 257 ah_keyed_md5_mature( __unused struct secasvar *sav) argument [all...] |
H A D | ipcomp_input.c | 96 struct secasvar *sav = NULL; local 126 sav = key_allocsa(AF_INET, (caddr_t)&ip->ip_src, 128 if (sav != NULL 129 && (sav->state == SADB_SASTATE_MATURE 130 || sav->state == SADB_SASTATE_DYING)) { 131 cpi = sav->alg_enc; /*XXX*/ 201 if (sav) { 202 key_sa_recordxfer(sav, m); 207 key_freesav(sav, KEY_SADB_UNLOCKED); 208 sav 249 struct secasvar *sav = NULL; local [all...] |
H A D | ah_input.c | 109 struct secasvar *sav = NULL; local 148 if ((sav = key_allocsa(AF_INET, 158 printf("DP ah4_input called to allocate SA:%p\n", sav)); 159 if (sav->state != SADB_SASTATE_MATURE 160 && sav->state != SADB_SASTATE_DYING) { 168 algo = ah_algorithm_lookup(sav->alg_auth); 177 siz = (*algo->sumsiz)(sav); 186 sizoff = (sav->flags & SADB_X_EXT_OLD) ? 0 : 4; 252 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav 571 struct secasvar *sav = NULL; local 945 struct secasvar *sav; local [all...] |
H A D | ipcomp_output.c | 83 int, struct secasvar *sav); 104 ipcomp_output(m, nexthdrp, md, af, sav) 109 struct secasvar *sav; 143 algo = ipcomp_algorithm_lookup(sav->alg_enc); 144 if ((ntohl(sav->spi) & ~0xffff) != 0 || !algo) { 149 if ((sav->flags & SADB_X_EXT_RAWCPI) == 0) 150 cpi = sav->alg_enc; 152 cpi = ntohl(sav->spi) & 0xffff; 216 IPSEC_STAT_INCREMENT(stat->out_comphist[sav->alg_enc]); 333 key_sa_recordxfer(sav, mcop [all...] |
H A D | esp_rijndael.c | 70 struct secasvar *sav) 74 aes_ctx *ctx = (aes_ctx*)sav->sched; 76 aes_decrypt_key(_KEYBUF(sav->key_enc), _KEYLEN(sav->key_enc), &ctx->decrypt); 77 aes_encrypt_key(_KEYBUF(sav->key_enc), _KEYLEN(sav->key_enc), &ctx->encrypt); 112 esp_cbc_decrypt_aes(m, off, sav, algo, ivlen) 115 struct secasvar *sav; 138 if (sav->flags & SADB_X_EXT_OLD) { 240 (aes_decrypt_ctx*)(&(((aes_ctx*)sav 68 esp_aes_schedule( __unused const struct esp_algorithm *algo, struct secasvar *sav) argument 271 esp_cbc_encrypt_aes( struct mbuf *m, size_t off, __unused size_t plen, struct secasvar *sav, const struct esp_algorithm *algo, int ivlen) argument [all...] |
H A D | ipsec.c | 248 void ipsec_send_natt_keepalive(struct secasvar *sav); 1818 /* this won't work with multiple input threads - isr->sav would change 1824 * isr->sav has been removed. 1828 if (isr->sav != NULL 1829 && isr->sav->flags == SADB_X_EXT_NONE 1830 && isr->sav->alg_auth != SADB_AALG_NONE) 2145 ipsec4_encapsulate(m, sav) 2147 struct secasvar *sav; 2155 if (((struct sockaddr *)&sav->sah->saidx.src)->sa_family 2156 != ((struct sockaddr *)&sav 2778 struct secasvar *sav = NULL; local 3043 struct secasvar *sav = NULL; local 3218 struct secasvar *sav = NULL; local 4080 ipsec_send_natt_keepalive( struct secasvar *sav) argument [all...] |
H A D | ah.h | 62 struct secasvar *sav; member in struct:ah_algorithm_state
|
/macosx-10.5.8/xnu-1228.15.4/bsd/netkey/ |
H A D | key.c | 316 #define KEY_CHKSASTATE(head, sav, name) \ 318 if ((head) != (sav)) { \ 320 (name), (head), (sav))); \ 526 void ipsec_send_natt_keepalive(struct secasvar *sav); 717 key_checkrequest(isr, saidx, sav) 720 struct secasvar **sav; 728 *sav = NULL; 752 if (*sav == NULL) 753 *sav = key_allocsa_policy(saidx); 756 if (*sav ! 791 struct secasvar *sav; local 857 struct secasvar *sav, *nextsav, *candidate, *natt_candidate, *no_natt_candidate, *d; local 1038 struct secasvar *sav, *match; local 2993 struct secasvar *sav, *nextsav; local 3256 struct secasvar *sav; local 3308 struct secasvar *sav, *match; local 4710 struct secasvar *sav, *nextsav; local 5464 struct secasvar *sav; local 5635 struct secasvar *sav; local 5953 struct secasvar *sav = NULL; local 6066 struct secasvar *sav, *nextsav; local 6156 struct secasvar *sav = NULL; local 7289 struct secasvar *sav, *nextsav; local 7366 struct secasvar *sav; member in struct:sav_dump_elem 7377 struct secasvar *sav; local 8079 key_checktunnelsanity( struct secasvar *sav, __unused u_int family, __unused caddr_t src, __unused caddr_t dst) argument [all...] |
H A D | key_debug.c | 549 kdebug_secasv(sav) 550 struct secasvar *sav; 553 if (sav == NULL) 557 kdebug_secasindex(&sav->sah->saidx); 560 sav->refcnt, sav->state, sav->alg_auth, sav->alg_enc); 562 (u_int32_t)ntohl(sav->spi), sav [all...] |
H A D | key.h | 57 struct secasvar **sav);
|
/macosx-10.5.8/xnu-1228.15.4/bsd/netinet/ |
H A D | ip_input.c | 2311 struct secasvar *sav; local 2333 sav = key_allocsa_policy(&saidx); 2334 if (sav != NULL) { 2335 if (sav->sah != NULL) { 2336 ro = &sav->sah->sa_route; 2344 key_freesav(sav, KEY_SADB_UNLOCKED);
|