Searched refs:saidx (Results 1 – 12 of 12) sorted by relevance
| /xnu-12377.81.4/bsd/netinet6/ |
| H A D | ipsec.c | 1549 (*q)->saidx.proto = p->saidx.proto; in ipsec_deepcopy_policy() 1550 (*q)->saidx.mode = p->saidx.mode; in ipsec_deepcopy_policy() 1552 (*q)->saidx.reqid = p->saidx.reqid; in ipsec_deepcopy_policy() 1554 bcopy(&p->saidx.src, &(*q)->saidx.src, sizeof((*q)->saidx.src)); in ipsec_deepcopy_policy() 1555 bcopy(&p->saidx.dst, &(*q)->saidx.dst, sizeof((*q)->saidx.dst)); in ipsec_deepcopy_policy() 1851 switch (isr->saidx.proto) { in ipsec_get_reqlevel() 1853 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) { in ipsec_get_reqlevel() 1860 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) { in ipsec_get_reqlevel() 1873 isr->saidx.proto); in ipsec_get_reqlevel() 1937 switch (isr->saidx.proto) { in ipsec_in_reject() [all …]
|
| H A D | esp_chachapoly.c | 119 sav->sah->dir, sav->sah->state, sav->sah->saidx.mode); in esp_chachapoly_mature() 170 sav->sah->dir, sav->sah->state, sav->sah->saidx.mode); in esp_chachapoly_schedule()
|
| H A D | esp_output.c | 149 if (isr->saidx.proto != IPPROTO_ESP) { in esp_hdrsiz() 418 if (sav->sah->saidx.mode == IPSEC_MODE_TUNNEL) { in esp_output() 995 VERIFY(sav->sah->saidx.mode == IPSEC_MODE_TRANSPORT); in esp_kpipe_output()
|
| H A D | ipsec.h | 122 struct secasindex saidx;/* hint for search proper SA */ member
|
| H A D | ah_output.c | 122 if (isr->saidx.proto != IPPROTO_AH) { in ah_hdrsiz()
|
| H A D | ah_core.c | 436 if (sav->sah->saidx.proto == IPPROTO_AH) { in ah_none_mature()
|
| H A D | esp_input.c | 1856 if (__improbable(sav->sah->saidx.mode != IPSEC_MODE_TRANSPORT)) { in esp_kpipe_input()
|
| /xnu-12377.81.4/bsd/netkey/ |
| H A D | key.c | 595 ASSERT(sah->saidx.src.ss_family == sah->saidx.dst.ss_family); in key_get_flowid() 596 switch (sah->saidx.src.ss_family) { in key_get_flowid() 598 ASSERT(sah->saidx.src.ss_len == sizeof(struct sockaddr_in)); in key_get_flowid() 599 ASSERT(sah->saidx.dst.ss_len == sizeof(struct sockaddr_in)); in key_get_flowid() 601 (SIN(&(sah->saidx.src)))->sin_addr; in key_get_flowid() 603 (SIN(&(sah->saidx.dst)))->sin_addr; in key_get_flowid() 607 ASSERT(sah->saidx.src.ss_len == sizeof(struct sockaddr_in6)); in key_get_flowid() 608 ASSERT(sah->saidx.dst.ss_len == sizeof(struct sockaddr_in6)); in key_get_flowid() 610 (SIN6(&(sah->saidx.src)))->sin6_addr; in key_get_flowid() 612 (SIN6(&(sah->saidx.dst)))->sin6_addr; in key_get_flowid() [all …]
|
| H A D | key_debug.c | 546 kdebug_secasindex(&isr->saidx); 590 kdebug_secasindex(saidx) in kdebug_secasindex() argument 591 struct secasindex *saidx; in kdebug_secasindex() 594 if (saidx == NULL) { 599 saidx->mode, saidx->proto); 601 ipsec_hexdump((caddr_t)&saidx->src, 602 ((struct sockaddr *)&saidx->src)->sa_len); 604 ipsec_hexdump((caddr_t)&saidx->dst, 605 ((struct sockaddr *)&saidx->dst)->sa_len); 621 kdebug_secasindex(&sav->sah->saidx);
|
| H A D | keydb.h | 60 struct secasindex saidx; member 156 struct secasindex saidx; member
|
| H A D | key.h | 89 extern struct secashead *key_newsah2(struct secasindex *saidx, u_int8_t dir);
|
| /xnu-12377.81.4/bsd/netinet/ |
| H A D | ip_input.c | 3337 sp->req->saidx.mode == IPSEC_MODE_TUNNEL) { in ip_forward() 3338 struct secasindex saidx; in ip_forward() local 3348 bcopy(&sp->req->saidx, &saidx, sizeof(saidx)); in ip_forward() 3349 saidx.mode = sp->req->saidx.mode; in ip_forward() 3350 saidx.reqid = sp->req->saidx.reqid; in ip_forward() 3351 sin = SIN(&saidx.src); in ip_forward() 3359 sin = SIN(&saidx.dst); in ip_forward() 3367 sav = key_allocsa_policy(&saidx); in ip_forward()
|