/freebsd-11-stable/sys/netipsec/ |
H A D | key.c | 851 struct secashead *sah; local 860 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { 863 kdebug_secash(sah, " ")); 864 if (sah->saidx.proto != IPPROTO_TCP) 866 if (!key_sockaddrcmp(&saidx->dst.sa, &sah->saidx.dst.sa, 0) && 867 !key_sockaddrcmp(&saidx->src.sa, &sah->saidx.src.sa, 0)) 870 if (sah != NULL) { 872 sav = TAILQ_LAST(&sah->savtree_alive, secasvar_queue); 874 sav = TAILQ_FIRST(&sah->savtree_alive); 904 struct secashead *sah; local 1029 struct secashead *sah; local 1248 struct secashead *sah; local 2715 struct secashead *sah; local 2738 struct secashead *sah = *psah; local 2752 key_delsah(struct secashead *sah) argument 2777 struct secashead *sah; local 2883 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 3014 struct secashead *sah; local 4362 struct secashead *sah, *nextsah; local 4974 struct secashead *sah; local 5024 struct secashead *sah; local 5145 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 5742 key_setident(struct secashead *sah, const struct sadb_msghdr *mhp) argument 5969 struct secashead *sah; local 6031 struct secashead *sah; local 6856 struct secashead *sah; local 7320 struct secashead *sah, *nextsah; local 7364 struct secashead *sah, *nextsah; local 7477 struct secashead *sah; local 8147 struct secashead *sah; local [all...] |
H A D | xform_ah.c | 601 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 611 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 665 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, 726 saidx = &sav->sah->saidx; 880 switch (sav->sah->saidx.dst.sa.sa_family) { 894 sav->sah->saidx.dst.sa.sa_family, 895 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 905 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 919 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 932 ipsec_address(&sav->sah [all...] |
H A D | xform_ipcomp.c | 297 saidx = &sav->sah->saidx; 351 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 422 switch (sav->sah->saidx.dst.sa.sa_family) { 437 sav->sah->saidx.dst.sa.sa_family, 438 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 447 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 461 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 586 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 595 switch (sav->sah->saidx.dst.sa.sa_family) { 616 switch (sav->sah [all...] |
H A D | ipsec_input.c | 289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 290 saidx = &sav->sah->saidx; 304 __func__, ipsec_address(&sav->sah->saidx.dst, 503 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 504 saidx = &sav->sah->saidx; 517 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
|
H A D | key_debug.c | 788 kdebug_secash(struct secashead *sah, const char *indent) argument 791 IPSEC_ASSERT(sah != NULL, ("null sah")); 794 printf("SAH { refcnt=%u state=%s\n", sah->refcnt, 795 kdebug_secasv_state(sah->state)); 798 kdebug_secasindex(&sah->saidx, indent); 853 kdebug_secash(sav->sah, " "); 972 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), 973 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf)));
|
H A D | ipsec_output.c | 220 dst = &sav->sah->saidx.dst; 231 error = ipsec_encap(&m, &sav->sah->saidx); 270 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 525 dst = &sav->sah->saidx.dst; 538 error = ipsec_encap(&m, &sav->sah->saidx); 572 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 694 saidx = &sav->sah->saidx;
|
H A D | keydb.h | 152 struct secashead *sah; /* back pointer to the secashead */ member in struct:secasvar
|
H A D | xform_esp.c | 341 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 490 saidx = &sav->sah->saidx; 582 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 596 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 608 &sav->sah->saidx.dst, buf, sizeof(buf)), 702 saidx = &sav->sah->saidx;
|
H A D | udpencap.c | 222 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6)
|
H A D | xform_tcp.c | 178 switch (sav->sah->saidx.dst.sa.sa_family) {
|
H A D | ipsec.c | 1301 if (sav->sah->saidx.proto == IPPROTO_AH) 1303 else if (sav->sah->saidx.proto == IPPROTO_ESP)
|
/freebsd-11-stable/sys/net/ |
H A D | if_ipsec.c | 394 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || 395 sav->sah->saidx.proto != IPPROTO_ESP) 404 LIST_FOREACH(sc, SCHASH_HASH(sav->sah->saidx.reqid), hash) { 406 sav->sah->saidx.src.sa.sa_family); 409 sav->sah->saidx.reqid != saidx->reqid) 412 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, 415 if (key_sockaddrcmp(&sav->sah->saidx.src.sa,
|
/freebsd-11-stable/sys/dev/ixl/ |
H A D | i40e_adminq_cmd.h | 541 __le16 sah; member in struct:i40e_aqc_mng_laa
|