Lines Matching refs:selkey

3125 selkey_hash(const ipsec_selkey_t *selkey, netstack_t *ns)  in selkey_hash()  argument
3127 uint32_t valid = selkey->ipsl_valid; in selkey_hash()
3134 if (selkey->ipsl_remote_pfxlen == 32) { in selkey_hash()
3135 return (IPSEC_IPV4_HASH(selkey->ipsl_remote.ipsad_v4, in selkey_hash()
3140 if (selkey->ipsl_remote_pfxlen == 128) { in selkey_hash()
3141 return (IPSEC_IPV6_HASH(selkey->ipsl_remote.ipsad_v6, in selkey_hash()
3366 ipsec_find_sel(ipsec_selkey_t *selkey, netstack_t *ns) in ipsec_find_sel() argument
3375 ASSERT(!(selkey->ipsl_valid & IPSL_IPV4) ^ in ipsec_find_sel()
3376 !(selkey->ipsl_valid & IPSL_IPV6)); in ipsec_find_sel()
3378 hval = selkey_hash(selkey, ns); in ipsec_find_sel()
3380 selkey->ipsl_sel_hval = hval; in ipsec_find_sel()
3388 if (bcmp(&sp->ipsl_key, selkey, in ipsec_find_sel()
3407 sp->ipsl_key = *selkey; in ipsec_find_sel()
3409 if (selkey->ipsl_sel_hval != IPSEC_SEL_NOHASH) in ipsec_find_sel()
3646 ipsec_selkey_t *selkey = &ipp->ipsp_sel->ipsl_key; in ipsec_check_policy() local
3647 uint32_t valid = selkey->ipsl_valid; in ipsec_check_policy()
3666 if (selkey->ipsl_sel_hval == IPSEC_SEL_NOHASH) { in ipsec_check_policy()
3669 selkey->ipsl_pol_hval = in ipsec_check_policy()
3670 (selkey->ipsl_valid & IPSL_IPV4) ? in ipsec_check_policy()
3671 IPSEC_IPV4_HASH(selkey->ipsl_remote.ipsad_v4, in ipsec_check_policy()
3673 IPSEC_IPV6_HASH(selkey->ipsl_remote.ipsad_v6, in ipsec_check_policy()
3676 head = pr->ipr_hash[selkey->ipsl_pol_hval].hash_head; in ipsec_check_policy()
3692 selkey->ipsl_proto == check_proto && in ipsec_check_policy()
3818 ipsec_selkey_t *selkey = &ipp->ipsp_sel->ipsl_key; in ipsec_enter_policy() local
3819 uint32_t valid = selkey->ipsl_valid; in ipsec_enter_policy()
3820 uint32_t hval = selkey->ipsl_pol_hval; in ipsec_enter_policy()