| /f-stack/freebsd/netipsec/ |
| H A D | key.c | 1387 sah = sav->sah; in key_unlinksav() 2856 return (sah); in key_newsah() 2872 key_delsah(sah); in key_freesah() 2911 sah = NULL; in key_newsav() 2970 sav->sah = sah; in key_newsav() 3137 return (sah); in key_getsah() 4626 sah = nextsah; in key_flush_sad() 4669 sah = nextsah; in key_flush_sad() 5174 sah = sav->sah; in key_updateaddresses() 5195 newsav->sah = sah; in key_updateaddresses() [all …]
|
| H A D | xform_ipcomp.c | 299 saidx = &sav->sah->saidx; in ipcomp_input_cb() 353 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_input_cb() 424 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output() 439 sav->sah->saidx.dst.sa.sa_family, in ipcomp_output() 440 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_output() 463 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipcomp_output() 582 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipcomp_output_cb() 591 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output_cb() 612 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output_cb() 628 sav->sah->saidx.dst.sa.sa_family, in ipcomp_output_cb() [all …]
|
| H A D | xform_ah.c | 157 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { in ah_hdrsiz() 585 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 595 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 706 saidx = &sav->sah->saidx; in ah_input_cb() 861 switch (sav->sah->saidx.dst.sa.sa_family) { in ah_output() 875 sav->sah->saidx.dst.sa.sa_family, in ah_output() 876 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() 885 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() 899 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() 946 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ah_output() [all …]
|
| H A D | ipsec_input.c | 289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb() 290 saidx = &sav->sah->saidx; in ipsec4_common_input_cb() 304 __func__, ipsec_address(&sav->sah->saidx.dst, in ipsec4_common_input_cb() 506 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb() 507 saidx = &sav->sah->saidx; in ipsec6_common_input_cb() 519 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipsec6_common_input_cb()
|
| H A D | key_debug.c | 789 kdebug_secash(struct secashead *sah, const char *indent) in kdebug_secash() argument 792 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash() 795 printf("SAH { refcnt=%u state=%s\n", sah->refcnt, in kdebug_secash() 796 kdebug_secasv_state(sah->state)); in kdebug_secash() 799 kdebug_secasindex(&sah->saidx, indent); in kdebug_secash() 854 kdebug_secash(sav->sah, " "); in kdebug_secasv() 973 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), in ipsec_sa2str() 974 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf))); in ipsec_sa2str()
|
| H A D | ipsec_output.c | 222 dst = &sav->sah->saidx.dst; in ipsec4_perform_request() 233 error = ipsec_encap(&m, &sav->sah->saidx); in ipsec4_perform_request() 272 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); in ipsec4_perform_request() 540 dst = &sav->sah->saidx.dst; in ipsec6_perform_request() 553 error = ipsec_encap(&m, &sav->sah->saidx); in ipsec6_perform_request() 587 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); in ipsec6_perform_request() 722 saidx = &sav->sah->saidx; in ipsec_process_done()
|
| H A D | xform_esp.c | 320 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input() 500 saidx = &sav->sah->saidx; in esp_input_cb() 592 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 606 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 618 &sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 722 saidx = &sav->sah->saidx; in esp_output()
|
| H A D | keydb.h | 155 struct secashead *sah; /* back pointer to the secashead */ member
|
| H A D | ipsec.c | 1302 if (sav->sah->saidx.proto == IPPROTO_ESP) in ipsec_chkreplay() 1304 else if (sav->sah->saidx.proto == IPPROTO_AH) in ipsec_chkreplay() 1343 if (sav->sah->saidx.proto == IPPROTO_ESP) in ipsec_chkreplay() 1345 else if (sav->sah->saidx.proto == IPPROTO_AH) in ipsec_chkreplay()
|
| H A D | udpencap.c | 222 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) in udp_ipsec_output()
|
| H A D | xform_tcp.c | 182 switch (sav->sah->saidx.dst.sa.sa_family) { in tcp_signature_compute()
|
| /f-stack/freebsd/net/ |
| H A D | if_ipsec.c | 465 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || in ipsec_if_input() 466 sav->sah->saidx.proto != IPPROTO_ESP) in ipsec_if_input() 470 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { in ipsec_if_input() 474 sav->sah->saidx.src.sa.sa_family); in ipsec_if_input() 477 sav->sah->saidx.reqid != saidx->reqid) in ipsec_if_input() 480 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, in ipsec_if_input() 483 if (key_sockaddrcmp(&sav->sah->saidx.src.sa, in ipsec_if_input()
|
| /f-stack/freebsd/contrib/device-tree/Bindings/crypto/ |
| H A D | fsl-imx-sahara.txt | 11 sah: crypto@10025000 {
|
| /f-stack/dpdk/drivers/net/i40e/base/ |
| H A D | i40e_adminq_cmd.h | 521 __le16 sah; member
|