Lines Matching defs:inbound

652  * Dump an entire SADB; outbound first, then inbound.
673 /* Dump inbound */
718 boolean_t inbound)
732 if (inbound && cl_inet_deletespi &&
887 * into inbound and outbound tables respectively. This function should only
1932 * Address normalizations and reality checks for inbound PF_KEY messages.
2349 sq->inbound = &sq->sp->sdb_if[sq->inhash];
2352 sq->inbound = NULL;
2479 * and we are preserving the outbound-then-inbound hash-bucket lock
2481 * only on the outbound fanout, and the corresponding inbound bucket
2572 * deadlock, always lock the outbound bucket before the inbound.
2649 * inbound bucket. The flag in_inbound_table provides direction.
2656 * A security association that is not obviously "inbound" or "outbound" so
2661 * inbound or outbound hash tables (not found). If only one ipsa_t is
2678 mutex_enter(&sq->inbound->isaf_lock);
2681 ipsapp->ipsap_sa_ptr = ipsec_getassocbyspi(sq->inbound,
2684 ipsapp->ipsap_bucket = sq->inbound;
2692 ipsapp->ipsap_pbucket = sq->inbound;
2701 ipsapp->ipsap_pbucket = sq->inbound;
2703 ipsapp->ipsap_sa_ptr = ipsec_getassocbyspi(sq->inbound,
2706 ipsapp->ipsap_bucket = sq->inbound;
2715 mutex_exit(&sq->inbound->isaf_lock);
2723 mutex_exit(&sq->inbound->isaf_lock);
2738 mutex_exit(&sq->inbound->isaf_lock);
2747 mutex_exit(&sq->inbound->isaf_lock);
2756 /* found sa in outbound sadb, peer should be inbound */
2759 /* Found SA in inbound table, pair will be in outbound. */
2875 * SAs can be "inbound", "outbound", or "both". The "primary" and "secondary"
2879 * is unicast for this node, then the SA will primarily be inbound.)
2995 * or the inbound hash table, so its cloned and put in both. If
3347 * Initialising IV for inbound is pointless as its
3348 * taken from the inbound packet.
3548 * inbound. We map "primary" and "secondary" into outbound and inbound
3558 /* primary == inbound */
3573 * Unlink from larval holding cell in the "inbound" fanout.
3969 sadb_idle_activities(ipsa_t *assoc, time_t delta, boolean_t inbound)
3976 if (!inbound && (assoc->ipsa_flags & IPSA_F_NATT_LOC) &&
3994 time_t current, int reap_delay, boolean_t inbound)
4025 if (inbound) {
4089 current - assoc->ipsa_lastuse, inbound);
4139 /* Age inbound associations. */
4647 * If an inbound SA, update the replay counter
6111 /* Initialize inbound SA's ipsa_replay field to last one received. */
6389 * Even though #2 will be the common case for inbound traffic, only
6454 * Even though #2 will be the common case for inbound traffic, only
6884 * between key management using SADB_UPDATE, and inbound packets that may
6905 * Consume npkt and place it in the LARVAL SA's inbound
6928 * inbound packets arriving prior to sadb_common_add()
7582 * SA appears in both the inbound and outbound tables because its not possible
7588 * inbound table, then again after processing the outbound table.
7618 } else { /* inbound */
7674 * Update the state of the "inbound" SA when
7676 * the "outbound" SA when the "inbound" SA
7756 /* Find the inbound SA, need to lock hash bucket. */
7838 * For inbound packets we copy the IV from the packet because it