| /freebsd/sys/netipsec/ |
| H A D | key.c | 1026 struct secashead *sah; in key_allocsa_tcpmd5() local 1035 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { in key_allocsa_tcpmd5() 1038 kdebug_secash(sah, " ")); in key_allocsa_tcpmd5() 1039 if (sah->saidx.proto != IPPROTO_TCP) in key_allocsa_tcpmd5() 1041 if (!key_sockaddrcmp(&saidx->dst.sa, &sah->saidx.dst.sa, 0) && in key_allocsa_tcpmd5() 1042 !key_sockaddrcmp(&saidx->src.sa, &sah->saidx.src.sa, 0)) in key_allocsa_tcpmd5() 1045 if (sah != NULL) { in key_allocsa_tcpmd5() 1047 sav = TAILQ_LAST(&sah->savtree_alive, secasvar_queue); in key_allocsa_tcpmd5() 1049 sav = TAILQ_FIRST(&sah->savtree_alive); in key_allocsa_tcpmd5() 1079 struct secashead *sah; in key_allocsa_policy() local [all …]
|
| H A D | xform_ipcomp.c | 312 saidx = &sav->sah->saidx; in ipcomp_input_cb() 366 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_input_cb() 442 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output() 457 sav->sah->saidx.dst.sa.sa_family, in ipcomp_output() 458 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_output() 467 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_output() 481 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipcomp_output() 600 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipcomp_output_cb() 609 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output_cb() 630 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output_cb() [all …]
|
| H A D | xform_ah.c | 160 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { in ah_hdrsiz() 590 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 600 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 646 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, in ah_input() 723 saidx = &sav->sah->saidx; in ah_input_cb() 883 switch (sav->sah->saidx.dst.sa.sa_family) { in ah_output() 897 sav->sah->saidx.dst.sa.sa_family, in ah_output() 898 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() 907 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() 921 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_output() [all …]
|
| H A D | key_debug.c | 793 kdebug_secash(struct secashead *sah, const char *indent) in kdebug_secash() argument 796 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash() 799 printf("SAH { refcnt=%u state=%s\n", sah->refcnt, in kdebug_secash() 800 kdebug_secasv_state(sah->state)); in kdebug_secash() 803 kdebug_secasindex(&sah->saidx, indent); in kdebug_secash() 862 kdebug_secash(sav->sah, " "); in kdebug_secasv() 982 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), in ipsec_sa2str() 983 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf))); in ipsec_sa2str()
|
| H A D | udpencap.c | 251 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output() 282 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output() 346 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum() 368 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum()
|
| H A D | ipsec_input.c | 354 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb() 355 saidx = &sav->sah->saidx; in ipsec4_common_input_cb() 369 __func__, ipsec_address(&sav->sah->saidx.dst, in ipsec4_common_input_cb() 611 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb() 612 saidx = &sav->sah->saidx; in ipsec6_common_input_cb() 626 __func__, ipsec_address(&sav->sah->saidx.dst, buf, in ipsec6_common_input_cb()
|
| H A D | ipsec_output.c | 262 dst = &sav->sah->saidx.dst; in ipsec4_perform_request() 273 error = ipsec_encap(&m, &sav->sah->saidx); in ipsec4_perform_request() 312 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); in ipsec4_perform_request() 682 dst = &sav->sah->saidx.dst; in ipsec6_perform_request() 695 error = ipsec_encap(&m, &sav->sah->saidx); in ipsec6_perform_request() 729 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); in ipsec6_perform_request() 918 saidx = &sav->sah->saidx; in ipsec_process_done() 1097 dst = &sav->sah->saidx.dst; in ipsec_get_pmtu()
|
| H A D | xform_esp.c | 330 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input() 522 saidx = &sav->sah->saidx; in esp_input_cb() 615 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 629 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 641 &sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 750 saidx = &sav->sah->saidx; in esp_output()
|
| H A D | keydb.h | 158 struct secashead *sah; /* back pointer to the secashead */ 155 struct secashead *sah; /* back pointer to the secashead */ global() member
|
| H A D | ipsec.c | 1336 if (sav->sah->saidx.proto == IPPROTO_ESP) in ipsec_chkreplay() 1338 else if (sav->sah->saidx.proto == IPPROTO_AH) in ipsec_chkreplay() 1381 if (sav->sah->saidx.proto == IPPROTO_ESP) in ipsec_chkreplay() 1383 else if (sav->sah->saidx.proto == IPPROTO_AH) in ipsec_chkreplay()
|
| H A D | xform_tcp.c | 190 switch (sav->sah->saidx.dst.sa.sa_family) { in tcp_signature_compute()
|
| H A D | ipsec_offload.c | 441 memcpy(&ihs->xfh.dst, &sav->sah->saidx.dst, sizeof(ihs->xfh.dst)); in ipsec_accel_handle_sav() 443 ihs->xfh.proto = sav->sah->saidx.proto; in ipsec_accel_handle_sav() 444 ihs->xfh.mode = sav->sah->saidx.mode; in ipsec_accel_handle_sav()
|
| /freebsd/sys/net/ |
| H A D | if_ipsec.c | 468 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || in ipsec_if_input() 469 sav->sah->saidx.proto != IPPROTO_ESP) { in ipsec_if_input() 475 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { in ipsec_if_input() 479 sav->sah->saidx.src.sa.sa_family); in ipsec_if_input() 482 sav->sah->saidx.reqid != saidx->reqid) in ipsec_if_input() 485 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, in ipsec_if_input() 488 if (key_sockaddrcmp(&sav->sah->saidx.src.sa, in ipsec_if_input()
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | fsl-imx-sahara.txt | 11 sah: crypto@10025000 {
|
| /freebsd/sys/dev/mlx5/mlx5_accel/ |
| H A D | mlx5_ipsec.c | 160 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_ipsec_build_accel_xfrm_attrs() 252 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_xfrm_validate_state()
|
| /freebsd/sys/dev/bnxt/bnxt_re/ |
| H A D | ib_verbs.c | 1849 struct bnxt_re_ah *sah; in bnxt_re_update_shadow_ah() local 1857 sah = rdev->gsi_ctx.gsi_sah; in bnxt_re_update_shadow_ah() 1860 if (sah) { in bnxt_re_update_shadow_ah() 1862 if (!compare_ether_header(sah->qplib_ah.dmac, rdev->dev_addr)) { in bnxt_re_update_shadow_ah() 1872 &sah->qplib_ah, false); in bnxt_re_update_shadow_ah() 1879 kfree(sah); in bnxt_re_update_shadow_ah() 1882 sah = bnxt_re_create_shadow_qp_ah(pd, &rdev->qplib_res, in bnxt_re_update_shadow_ah() 1884 if (!sah) { in bnxt_re_update_shadow_ah() 1889 rdev->gsi_ctx.gsi_sah = sah; in bnxt_re_update_shadow_ah() 2258 struct bnxt_re_ah *sah; in bnxt_re_create_shadow_gsi() local [all …]
|
| /freebsd/share/misc/ |
| H A D | iso639 | 406 sah sah Yakut
|
| H A D | committers-src.dot | 84 sah [label="Sam Hopkins\nsah@FreeBSD.org\n2004/12/15\n2008/11/10"] 964 scottl -> sah
|
| /freebsd/sys/dev/qat_c2xxx/ |
| H A D | qat.c | 1209 const struct auth_hash *sah = hash_def->qshd_alg->qshai_sah; in qat_crypto_hmac_precompute() local 1214 hmac_init_ipad(sah, key, klen, &ctx); in qat_crypto_hmac_precompute() 1217 hmac_init_opad(sah, key, klen, &ctx); in qat_crypto_hmac_precompute()
|
| /freebsd/sys/dev/ixl/ |
| H A D | i40e_adminq_cmd.h | 547 __le16 sah; member
|
| /freebsd/share/dict/ |
| H A D | web2 | 172628 sah
|