Searched refs:PF_KEY (Results 1 – 7 of 7) sorted by relevance
| /xnu-10063.141.1/bsd/netkey/ |
| H A D | keysock.c | 90 struct sockaddr key_dst = { .sa_len = 2, .sa_family = PF_KEY, .sa_data = {0, 0, 0, 0, 0, 0, 0, 0, 0… 91 struct sockaddr key_src = { .sa_len = 2, .sa_family = PF_KEY, .sa_data = {0, 0, 0, 0, 0, 0, 0, 0, 0… 282 if (rp->rcb_proto.sp_family != PF_KEY) { in key_sendup_mbuf() 409 if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) { /* XXX: AF_KEY */ in key_attach() 456 if (kp->kp_raw.rcb_proto.sp_protocol == PF_KEY) { /* XXX: AF_KEY */ in key_detach() 546 SYSCTL_NODE(_net, PF_KEY, key, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "Key Family"); 569 .dom_family = PF_KEY,
|
| /xnu-10063.141.1/bsd/security/audit/ |
| H A D | audit_bsm_domain.c | 182 { .bd_bsm_domain = BSM_PF_KEY, .bd_local_domain = PF_KEY },
|
| /xnu-10063.141.1/bsd/sys/ |
| H A D | socket.h | 728 #define PF_KEY pseudo_AF_KEY macro
|
| /xnu-10063.141.1/tests/ |
| H A D | ipsec.m | 404 T_QUIET; T_ASSERT_POSIX_SUCCESS(pfkey_socket = socket(PF_KEY, SOCK_RAW, PF_KEY_V2), NULL);
|
| H A D | net_tuntests.c | 309 T_QUIET; T_EXPECT_POSIX_SUCCESS(g_pfkeyso = socket(PF_KEY, SOCK_RAW, PF_KEY_V2), NULL); in create_sa()
|
| H A D | pfkey.c | 1073 T_QUIET; T_ASSERT_POSIX_SUCCESS(pfkey_socket = socket(PF_KEY, SOCK_RAW, PF_KEY_V2), NULL); in pfkey_setup_socket()
|
| /xnu-10063.141.1/bsd/kern/ |
| H A D | uipc_socket.c | 689 case PF_KEY: in socreate_internal()
|