Lines Matching defs:ipha

101     struct ipsec_action_s *, ipha_t *ipha, ip6_t *ip6h, const char **,
1023 ipsec_log_policy_failure(int type, char *func_name, ipha_t *ipha, ip6_t *ip6h,
1032 ASSERT((ipha == NULL && ip6h != NULL) ||
1033 (ip6h == NULL && ipha != NULL));
1035 if (ipha != NULL) {
1036 s = inet_ntop(AF_INET, &ipha->ipha_src, sbuf, sizeof (sbuf));
1037 d = inet_ntop(AF_INET, &ipha->ipha_dst, dbuf, sizeof (dbuf));
1566 ipha_t *ipha, ip6_t *ip6h, const char **reason, kstat_named_t **counter,
1576 ASSERT((ipha == NULL && ip6h != NULL) ||
1577 (ip6h == NULL && ipha != NULL));
1630 ret = ipsec_inbound_accept_clear(mp, ipha,
1658 ret = ipsec_inbound_accept_clear(mp, ipha,
1700 ret = ipsec_inbound_accept_clear(mp, ipha,
1761 conn_to_unique(conn_t *connp, mblk_t *data_mp, ipha_t *ipha, ip6_t *ip6h)
1771 if (ipsec_init_inbound_sel(&sel, data_mp, ipha, ip6h,
1781 if (ipsec_init_inbound_sel(&sel, data_mp, ipha, ip6h, SEL_NONE) ==
1800 ipsec_action_t *ap, ipha_t *ipha, ip6_t *ip6h, const char **reason,
1838 conn_to_unique(connp, mp, ipha, ip6h), ns)) {
1842 return (ipsec_check_ipsecin_action(ira, mp, ap, ipha, ip6h, reason,
1857 ipha_t *ipha, ip6_t *ip6h, uint64_t pkt_unique, ip_recv_attr_t *ira,
1870 ASSERT((ipha == NULL && ip6h != NULL) ||
1871 (ip6h == NULL && ipha != NULL));
1904 ipha, ip6h, &reason, &counter, ns)) {
2116 ipha_t *ipha, ip6_t *ip6h, ip_recv_attr_t *ira, netstack_t *ns)
2128 ASSERT((ipha == NULL && ip6h != NULL) ||
2129 (ip6h == NULL && ipha != NULL));
2131 if (ipha != NULL)
2156 pkt_unique = conn_to_unique(connp, data_mp, ipha, ip6h);
2159 if (ipsec_init_inbound_sel(&sel, data_mp, ipha, ip6h,
2166 "ipsec_init_inbound_sel", ipha, ip6h, B_TRUE, ns);
2198 "ipsec_check_global_policy", ipha, ip6h, B_TRUE,
2204 return (ipsec_check_ipsecin_policy(data_mp, p, ipha, ip6h,
2219 "ipsec_check_global_policy", ipha, ip6h, B_FALSE, ns);
2244 ipsec_inbound_accept_clear(mblk_t *mp, ipha_t *ipha, ip6_t *ip6h)
2251 ASSERT((ipha != NULL && ip6h == NULL) ||
2252 (ipha == NULL && ip6h != NULL));
2297 if (ipha->ipha_protocol != IPPROTO_ICMP) {
2300 ipha->ipha_protocol);
2304 iph_hdr_length = IPH_HDR_LENGTH(ipha);
2455 ipha_t *ipha, ip6_t *ip6h, ip_recv_attr_t *ira)
2501 ipha, ip6h);
2510 "ipsec_check_inbound_policy", ipha,
2539 ipha, ip6h, ira, ns);
2577 ipha, ip6h, ira, ns);
2596 ipha, ip6h, &reason, &counter, connp, ns)) {
2619 unique_id = conn_to_unique(connp, mp, ipha, ip6h);
2621 mp = ipsec_check_ipsecin_policy(mp, p, ipha, ip6h, unique_id, ira, ns);
2683 * Note that ipha/ip6h can be in a different mblk (mp->b_cont) in the case
2685 * Also, mp->b_rptr can be an ICMP error where ipha/ip6h is the packet in
2689 ipsec_init_inbound_sel(ipsec_selector_t *sel, mblk_t *mp, ipha_t *ipha,
2705 ASSERT((ipha == NULL && ip6h != NULL) ||
2706 (ipha != NULL && ip6h == NULL));
2755 outer_hdr_len = prepended_length(mp, (uintptr_t)ipha);
2758 sel->ips_local_addr_v4 = ipha->ipha_dst;
2759 sel->ips_remote_addr_v4 = ipha->ipha_src;
2760 nexthdr = ipha->ipha_protocol;
2761 hdr_len = IPH_HDR_LENGTH(ipha);
2764 IS_V4_FRAGMENT(ipha->ipha_fragment_offset_and_flags) &&
2770 transportp = (uint8_t *)ipha + hdr_len;
2815 ipsec_init_outbound_ports(ipsec_selector_t *sel, mblk_t *mp, ipha_t *ipha,
2829 ASSERT((ipha == NULL && ip6h != NULL) ||
2830 (ipha != NULL && ip6h == NULL));
2866 hdr_len = IPH_HDR_LENGTH(ipha);
2867 nexthdr = ipha->ipha_protocol;
4023 ipha_t *ipha, ip6_t *ip6h)
4050 if (!ipsec_init_outbound_ports(&sel, data_mp, ipha, ip6h, 0,
4197 ip_output_attach_policy(mblk_t *mp, ipha_t *ipha, ip6_t *ip6h,
4208 ASSERT((ipha != NULL && ip6h == NULL) ||
4209 (ip6h != NULL && ipha == NULL));
4211 if (ipha != NULL)
4221 if (ipha != NULL) {
4222 sel.ips_local_addr_v4 = ipha->ipha_src;
4223 sel.ips_remote_addr_v4 = ip_get_dst(ipha);
4232 if (!ipsec_init_outbound_ports(&sel, mp, ipha, ip6h, 0, ipss)) {
4233 if (ipha != NULL) {
6161 #define V4_FRAG_OFFSET(ipha) ((ntohs(ipha->ipha_fragment_offset_and_flags) & \
6163 #define V4_MORE_FRAGS(ipha) (ntohs(ipha->ipha_fragment_offset_and_flags) & \