Lines Matching refs:actp

814 	ipsec_act_t act, *actp, *endactp;  in spdsock_ext_to_actvec()  local
842 actp = kmem_alloc(sizeof (*actp) * nact, KM_NOSLEEP); in spdsock_ext_to_actvec()
843 if (actp == NULL) { in spdsock_ext_to_actvec()
847 *actpp = actp; in spdsock_ext_to_actvec()
849 endactp = actp + nact; in spdsock_ext_to_actvec()
867 if (actp >= endactp) { in spdsock_ext_to_actvec()
874 *actp++ = act; in spdsock_ext_to_actvec()
966 if (actp != endactp) { in spdsock_ext_to_actvec()
986 ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t af, in mkrule() argument
994 pol = ipsec_policy_create(sel, actp, nact, rule->spd_rule_priority, in mkrule()
1012 ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t afs, in mkrulepair() argument
1018 error = mkrule(iph, rule, sel, actp, nact, dir, IPSL_IPV4, rp, in mkrulepair()
1024 error = mkrule(iph, rule, sel, actp, nact, dir, IPSL_IPV6, rp, in mkrulepair()
1038 ipsec_act_t *actp; in spdsock_addrule() local
1124 if (!spdsock_ext_to_actvec(extv, &actp, &nact, &diag, spds)) { in spdsock_addrule()
1138 error = mkrulepair(iph, rule, &sel, actp, nact, in spdsock_addrule()
1145 error = mkrulepair(iph, rule, &sel, actp, nact, in spdsock_addrule()
1159 ipsec_actvec_free(actp, nact); in spdsock_addrule()
1177 ipsec_actvec_free(actp, nact); in spdsock_addrule()
2551 struct spd_ext_actions *actp; in spdsock_do_updatealg() local
2564 actp = (struct spd_ext_actions *)extv[SPD_EXT_ACTION]; in spdsock_do_updatealg()
2565 if (actp == NULL) in spdsock_do_updatealg()
2568 start = (uint64_t *)actp; in spdsock_do_updatealg()
2569 end = (start + actp->spd_actions_len); in spdsock_do_updatealg()
2571 attr = (struct spd_attribute *)&actp[1]; in spdsock_do_updatealg()