Lines Matching refs:sel
652 spdsock_ext_to_sel(spd_ext_t **extv, ipsec_selkey_t *sel, int *diag) in spdsock_ext_to_sel() argument
654 bzero(sel, sizeof (*sel)); in spdsock_ext_to_sel()
659 sel->ipsl_proto = pr->spd_proto_number; in spdsock_ext_to_sel()
660 sel->ipsl_valid |= IPSL_PROTOCOL; in spdsock_ext_to_sel()
665 sel->ipsl_lport = pr->spd_ports_minport; in spdsock_ext_to_sel()
666 sel->ipsl_valid |= IPSL_LOCAL_PORT; in spdsock_ext_to_sel()
671 sel->ipsl_rport = pr->spd_ports_minport; in spdsock_ext_to_sel()
672 sel->ipsl_valid |= IPSL_REMOTE_PORT; in spdsock_ext_to_sel()
679 sel->ipsl_valid |= IPSL_ICMP_TYPE; in spdsock_ext_to_sel()
680 sel->ipsl_icmp_type = tc->spd_typecode_type; in spdsock_ext_to_sel()
682 sel->ipsl_icmp_type_end = tc->spd_typecode_type; in spdsock_ext_to_sel()
684 sel->ipsl_icmp_type_end = tc->spd_typecode_type_end; in spdsock_ext_to_sel()
687 sel->ipsl_valid |= IPSL_ICMP_CODE; in spdsock_ext_to_sel()
688 sel->ipsl_icmp_code = tc->spd_typecode_code; in spdsock_ext_to_sel()
690 sel->ipsl_icmp_code_end = tc->spd_typecode_code; in spdsock_ext_to_sel()
692 sel->ipsl_icmp_code_end = in spdsock_ext_to_sel()
696 #define ADDR2SEL(sel, extv, field, pfield, extn, bit) \ in spdsock_ext_to_sel() argument
708 bcopy((ap+1), &((sel)->field), addrlen); \ in spdsock_ext_to_sel()
709 (sel)->pfield = ap->spd_address_prefixlen; \ in spdsock_ext_to_sel()
710 (sel)->ipsl_valid |= (bit); \ in spdsock_ext_to_sel()
711 (sel)->ipsl_valid |= (ap->spd_address_af == AF_INET6) ? \ in spdsock_ext_to_sel()
715 ADDR2SEL(sel, extv, ipsl_local, ipsl_local_pfxlen, in spdsock_ext_to_sel()
717 ADDR2SEL(sel, extv, ipsl_remote, ipsl_remote_pfxlen, in spdsock_ext_to_sel()
720 if ((sel->ipsl_valid & (IPSL_IPV6|IPSL_IPV4)) == in spdsock_ext_to_sel()
983 ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t af, in mkrule() argument
988 sel->ipsl_valid &= ~(IPSL_IPV6|IPSL_IPV4); in mkrule()
989 sel->ipsl_valid |= af; in mkrule()
991 pol = ipsec_policy_create(sel, actp, nact, rule->spd_rule_priority, in mkrule()
1009 ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t afs, in mkrulepair() argument
1015 error = mkrule(iph, rule, sel, actp, nact, dir, IPSL_IPV4, rp, in mkrulepair()
1021 error = mkrule(iph, rule, sel, actp, nact, dir, IPSL_IPV6, rp, in mkrulepair()
1034 ipsec_selkey_t sel; in spdsock_addrule() local
1094 if (!spdsock_ext_to_sel(extv, &sel, &diag)) { in spdsock_addrule()
1101 if (sel.ipsl_valid & in spdsock_addrule()
1113 if (sel.ipsl_valid & IPSL_WILDCARD) { in spdsock_addrule()
1128 afs = sel.ipsl_valid & (IPSL_IPV6|IPSL_IPV4); in spdsock_addrule()
1135 error = mkrulepair(iph, rule, &sel, actp, nact, in spdsock_addrule()
1142 error = mkrulepair(iph, rule, &sel, actp, nact, in spdsock_addrule()
1198 ipsec_selkey_t sel; in spdsock_deleterule() local
1236 if (!spdsock_ext_to_sel(extv, &sel, &diag)) { in spdsock_deleterule()
1242 !ipsec_policy_delete(iph, &sel, IPSEC_TYPE_INBOUND, ns)) { in spdsock_deleterule()
1248 !ipsec_policy_delete(iph, &sel, IPSEC_TYPE_OUTBOUND, ns)) { in spdsock_deleterule()
1538 const ipsec_selkey_t *sel, const ipsec_addr_t *addr, uint_t pfxlen) in spdsock_encode_addr() argument
1546 if (sel->ipsl_valid & IPSL_IPV4) { in spdsock_encode_addr()
1578 spdsock_encode_sel(uint8_t *base, uint_t offset, const ipsec_sel_t *sel) in spdsock_encode_sel() argument
1580 const ipsec_selkey_t *selkey = &sel->ipsl_key; in spdsock_encode_sel()