Home
last modified time | relevance | path

Searched refs:saidx (Results 1 – 15 of 15) sorted by relevance

/freebsd/sys/netipsec/
H A Dipsec_output.c109 static int ipsec_encap(struct mbuf **mp, struct secasindex *saidx);
117 struct secasindex *saidx, tmpsaidx; in ipsec4_allocsa() local
127 if ((isr->saidx.proto == IPPROTO_ESP && !V_esp_enable) || in ipsec4_allocsa()
128 (isr->saidx.proto == IPPROTO_AH && !V_ah_enable) || in ipsec4_allocsa()
129 (isr->saidx.proto == IPPROTO_IPCOMP && !V_ipcomp_enable)) { in ipsec4_allocsa()
132 IPSEC_OSTAT_INC(isr->saidx.proto, pdrops); in ipsec4_allocsa()
141 if (isr->saidx.mode == IPSEC_MODE_TRANSPORT) { in ipsec4_allocsa()
142 saidx = &tmpsaidx; in ipsec4_allocsa()
143 *saidx = isr->saidx; in ipsec4_allocsa()
144 if (saidx->src.sa.sa_len == 0) { in ipsec4_allocsa()
[all …]
H A Dipsec_input.c348 struct secasindex *saidx; in ipsec4_common_input_cb()
355 saidx = &sav->sah->saidx; in ipsec4_common_input_cb()
356 af = saidx->dst.sa.sa_family; in ipsec4_common_input_cb()
358 sproto = saidx->proto; in ipsec4_common_input_cb()
369 __func__, ipsec_address(&sav->sah->saidx.dst, in ipsec4_common_input_cb()
405 saidx->mode != IPSEC_MODE_TRANSPORT) { in ipsec4_common_input_cb()
417 saidx->mode != IPSEC_MODE_TRANSPORT) { in ipsec4_common_input_cb()
427 else if (prot != IPPROTO_IPV6 && saidx->mode == IPSEC_MODE_ANY) { in ipsec4_common_input_cb()
452 bcopy(&saidx in ipsec4_common_input_cb()
342 struct secasindex *saidx; ipsec4_common_input_cb() local
588 struct secasindex *saidx; ipsec6_common_input_cb() local
[all...]
H A Dxform_tcp.c192 switch (sav->sah->saidx.dst.sa.sa_family) { in tcp_signature_compute()
270 struct secasindex saidx; in tcp_ipsec_input() local
273 setsockaddrs(m, &saidx.src, &saidx.dst); in tcp_ipsec_input()
274 saidx.proto = IPPROTO_TCP; in tcp_ipsec_input()
275 saidx.mode = IPSEC_MODE_TCPMD5; in tcp_ipsec_input()
276 saidx.reqid = 0; in tcp_ipsec_input()
277 sav = key_allocsa_tcpmd5(&saidx); in tcp_ipsec_input()
315 struct secasindex saidx; in tcp_ipsec_output() local
318 setsockaddrs(m, &saidx.src, &saidx.dst); in tcp_ipsec_output()
319 saidx.proto = IPPROTO_TCP; in tcp_ipsec_output()
[all …]
H A Dxform_ipcomp.c289 struct secasindex *saidx; in ipcomp_input_cb() local
303 saidx = &sav->sah->saidx; in ipcomp_input_cb()
304 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb()
305 saidx->dst.sa.sa_family == AF_INET6, in ipcomp_input_cb()
306 ("unexpected protocol family %u", saidx->dst.sa.sa_family)); in ipcomp_input_cb()
357 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_input_cb()
365 switch (saidx->dst.sa.sa_family) { in ipcomp_input_cb()
378 saidx->dst.sa.sa_family, saidx); in ipcomp_input_cb()
430 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output()
445 sav->sah->saidx.dst.sa.sa_family, in ipcomp_output()
[all …]
H A Dxform_ah.c160 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { in ah_hdrsiz()
590 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input()
600 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input()
646 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, in ah_input()
698 struct secasindex *saidx; in ah_input_cb() local
714 saidx = &sav->sah->saidx; in ah_input_cb()
715 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb()
716 saidx->dst.sa.sa_family == AF_INET6, in ah_input_cb()
717 ("unexpected protocol family %u", saidx->dst.sa.sa_family)); in ah_input_cb()
760 ipsec_address(&saidx->dst, buf, sizeof(buf)), in ah_input_cb()
[all …]
H A Dkey.c272 #define SAHADDRHASH_HASH(saidx) \ argument
273 &V_sahaddrhashtbl[SAHADDRHASH_HASHVAL(saidx)]
368 #define ACQADDRHASH_HASH(saidx) \ argument
369 &V_acqaddrhashtbl[ACQADDRHASH_HASHVAL(saidx)]
1021 key_allocsa_tcpmd5(struct secasindex *saidx) in key_allocsa_tcpmd5() argument
1027 IPSEC_ASSERT(saidx->proto == IPPROTO_TCP, in key_allocsa_tcpmd5()
1028 ("unexpected security protocol %u", saidx->proto)); in key_allocsa_tcpmd5()
1029 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TCPMD5, in key_allocsa_tcpmd5()
1030 ("unexpected mode %u", saidx->mode)); in key_allocsa_tcpmd5()
1033 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { in key_allocsa_tcpmd5()
[all …]
H A Dxform_esp.c330 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input()
500 struct secasindex *saidx; in esp_input_cb() local
520 saidx = &sav->sah->saidx; in esp_input_cb()
560 ipsec_address(&saidx->dst, buf, sizeof(buf)), in esp_input_cb()
612 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb()
626 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb()
638 &sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb()
658 switch (saidx->dst.sa.sa_family) { in esp_input_cb()
671 saidx->dst.sa.sa_family, saidx); in esp_input_cb()
702 struct secasindex *saidx; in esp_output() local
[all …]
H A Dkey_debug.c738 kdebug_secasindex(&sp->req[idx]->saidx, NULL); in kdebug_secpolicy()
765 kdebug_secasindex(const struct secasindex *saidx, const char *indent) in kdebug_secasindex() argument
769 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex()
773 kdebug_secasindex_mode(saidx->mode), saidx->proto, saidx->reqid); in kdebug_secasindex()
774 printf("%s:%s -> ", ipsec_address(&saidx->src, buf, sizeof(buf)), in kdebug_secasindex()
775 kdebug_port2str(&saidx->src.sa, port, sizeof(port))); in kdebug_secasindex()
776 printf("%s:%s }\n", ipsec_address(&saidx->dst, buf, sizeof(buf)), in kdebug_secasindex()
777 kdebug_port2str(&saidx->dst.sa, port, sizeof(port))); in kdebug_secasindex()
803 kdebug_secasindex(&sah->saidx, indent); in kdebug_secash()
982 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), in ipsec_sa2str()
[all …]
H A Dipsec.c951 switch (isr->saidx.proto) { in ipsec_get_reqlevel()
953 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) in ipsec_get_reqlevel()
959 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) in ipsec_get_reqlevel()
973 isr->saidx.proto); in ipsec_get_reqlevel()
1007 if (xh->proto != sp->req[idx]->saidx.proto) in ipsec_check_history()
1010 if (xh->mode != sp->req[idx]->saidx.mode && in ipsec_check_history()
1017 if (sp->req[idx]->saidx.mode == IPSEC_MODE_TRANSPORT) { in ipsec_check_history()
1023 &sp->req[idx]->saidx.dst.sa, 0) != 0) in ipsec_check_history()
1078 if (sp->req[i]->saidx.proto == IPPROTO_IPCOMP || in ipsec_in_reject()
1084 else switch (sp->req[i]->saidx.proto) { in ipsec_in_reject()
[all …]
H A Dudpencap.c251 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output()
282 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output()
346 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum()
368 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum()
H A Dkeydb.h114 struct secasindex saidx;
138 * lookup for suitable SAH using packet's saidx. Then we use SAH's savtree
253 struct secasindex saidx;
112 struct secasindex saidx; global() member
239 struct secasindex saidx; global() member
H A Dipsec.h72 struct secasindex saidx;/* hint for search proper SA */ member
/freebsd/sys/net/
H A Dif_ipsec.c347 return (&sp->req[0]->saidx); in ipsec_getsaidx()
456 struct secasindex *saidx; in ipsec_if_input() local
466 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || in ipsec_if_input()
467 sav->sah->saidx.proto != IPPROTO_ESP) in ipsec_if_input()
471 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { in ipsec_if_input()
474 saidx = ipsec_getsaidx(sc, IPSEC_DIR_INBOUND, in ipsec_if_input()
475 sav->sah->saidx.src.sa.sa_family); in ipsec_if_input()
477 if (saidx == NULL || in ipsec_if_input()
478 sav->sah->saidx.reqid != saidx->reqid) in ipsec_if_input()
481 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, in ipsec_if_input()
[all …]
/freebsd/contrib/libdivsufsort/include/
H A Ddivsufsort.h.cmake55 typedef @SAINDEX_TYPE@ saidx@W64BIT@_t;
76 divsufsort@W64BIT@(const sauchar_t *T, saidx@W64BIT@_t *SA, saidx@W64BIT@_t n);
87 saidx@W64BIT@_t
88 divbwt@W64BIT@(const sauchar_t *T, sauchar_t *U, saidx@W64BIT@_t *A, saidx@W64BIT@_t n);
111 saidx@W64BIT@_t *SA /* can NULL */,
112 saidx@W64BIT@_t n, saidx@W64BIT@_t *idx);
126 saidx@W64BIT@_t *A /* can NULL */,
127 saidx@W64BIT@_t n, saidx@W64BIT@_t idx);
139 sufcheck@W64BIT@(const sauchar_t *T, const saidx@W64BIT@_t *SA, saidx@W64BIT@_t n, saint_t verbose);
153 saidx@W64BIT@_t
[all …]
/freebsd/sys/dev/mlx5/mlx5_accel/
H A Dmlx5_ipsec.c160 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_ipsec_build_accel_xfrm_attrs() local
196 attrs->family = saidx->dst.sa.sa_family; in mlx5e_ipsec_build_accel_xfrm_attrs()
197 attrs->reqid = saidx->reqid; in mlx5e_ipsec_build_accel_xfrm_attrs()
199 if (saidx->src.sa.sa_family == AF_INET) { in mlx5e_ipsec_build_accel_xfrm_attrs()
200 attrs->saddr.a4 = saidx->src.sin.sin_addr.s_addr; in mlx5e_ipsec_build_accel_xfrm_attrs()
201 attrs->daddr.a4 = saidx->dst.sin.sin_addr.s_addr; in mlx5e_ipsec_build_accel_xfrm_attrs()
203 memcpy(&attrs->saddr.a6, &saidx->src.sin6.sin6_addr, 16); in mlx5e_ipsec_build_accel_xfrm_attrs()
204 memcpy(&attrs->daddr.a6, &saidx->dst.sin6.sin6_addr, 16); in mlx5e_ipsec_build_accel_xfrm_attrs()
252 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_xfrm_validate_state() local
279 if ((saidx->dst.sa.sa_family != AF_INET && saidx->dst.sa.sa_family != AF_INET6) || in mlx5e_xfrm_validate_state()
[all …]