/freebsd/sys/netipsec/ |
H A D | ipsec_output.c | 109 static int ipsec_encap(struct mbuf **mp, struct secasindex *saidx); 117 struct secasindex *saidx, tmpsaidx; in ipsec4_allocsa() local 127 if ((isr->saidx.proto == IPPROTO_ESP && !V_esp_enable) || in ipsec4_allocsa() 128 (isr->saidx.proto == IPPROTO_AH && !V_ah_enable) || in ipsec4_allocsa() 129 (isr->saidx.proto == IPPROTO_IPCOMP && !V_ipcomp_enable)) { in ipsec4_allocsa() 132 IPSEC_OSTAT_INC(isr->saidx.proto, pdrops); in ipsec4_allocsa() 141 if (isr->saidx.mode == IPSEC_MODE_TRANSPORT) { in ipsec4_allocsa() 142 saidx = &tmpsaidx; in ipsec4_allocsa() 143 *saidx = isr->saidx; in ipsec4_allocsa() 144 if (saidx->src.sa.sa_len == 0) { in ipsec4_allocsa() [all …]
|
H A D | ipsec_input.c | 348 struct secasindex *saidx; in ipsec4_common_input_cb() 355 saidx = &sav->sah->saidx; in ipsec4_common_input_cb() 356 af = saidx->dst.sa.sa_family; in ipsec4_common_input_cb() 358 sproto = saidx->proto; in ipsec4_common_input_cb() 369 __func__, ipsec_address(&sav->sah->saidx.dst, in ipsec4_common_input_cb() 405 saidx->mode != IPSEC_MODE_TRANSPORT) { in ipsec4_common_input_cb() 417 saidx->mode != IPSEC_MODE_TRANSPORT) { in ipsec4_common_input_cb() 427 else if (prot != IPPROTO_IPV6 && saidx->mode == IPSEC_MODE_ANY) { in ipsec4_common_input_cb() 452 bcopy(&saidx in ipsec4_common_input_cb() 342 struct secasindex *saidx; ipsec4_common_input_cb() local 588 struct secasindex *saidx; ipsec6_common_input_cb() local [all...] |
H A D | xform_tcp.c | 192 switch (sav->sah->saidx.dst.sa.sa_family) { in tcp_signature_compute() 270 struct secasindex saidx; in tcp_ipsec_input() local 273 setsockaddrs(m, &saidx.src, &saidx.dst); in tcp_ipsec_input() 274 saidx.proto = IPPROTO_TCP; in tcp_ipsec_input() 275 saidx.mode = IPSEC_MODE_TCPMD5; in tcp_ipsec_input() 276 saidx.reqid = 0; in tcp_ipsec_input() 277 sav = key_allocsa_tcpmd5(&saidx); in tcp_ipsec_input() 315 struct secasindex saidx; in tcp_ipsec_output() local 318 setsockaddrs(m, &saidx.src, &saidx.dst); in tcp_ipsec_output() 319 saidx.proto = IPPROTO_TCP; in tcp_ipsec_output() [all …]
|
H A D | xform_ipcomp.c | 289 struct secasindex *saidx; in ipcomp_input_cb() local 303 saidx = &sav->sah->saidx; in ipcomp_input_cb() 304 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb() 305 saidx->dst.sa.sa_family == AF_INET6, in ipcomp_input_cb() 306 ("unexpected protocol family %u", saidx->dst.sa.sa_family)); in ipcomp_input_cb() 357 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ipcomp_input_cb() 365 switch (saidx->dst.sa.sa_family) { in ipcomp_input_cb() 378 saidx->dst.sa.sa_family, saidx); in ipcomp_input_cb() 430 switch (sav->sah->saidx.dst.sa.sa_family) { in ipcomp_output() 445 sav->sah->saidx.dst.sa.sa_family, in ipcomp_output() [all …]
|
H A D | xform_ah.c | 160 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { in ah_hdrsiz() 590 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 600 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in ah_input() 646 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, in ah_input() 698 struct secasindex *saidx; in ah_input_cb() local 714 saidx = &sav->sah->saidx; in ah_input_cb() 715 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb() 716 saidx->dst.sa.sa_family == AF_INET6, in ah_input_cb() 717 ("unexpected protocol family %u", saidx->dst.sa.sa_family)); in ah_input_cb() 760 ipsec_address(&saidx->dst, buf, sizeof(buf)), in ah_input_cb() [all …]
|
H A D | key.c | 272 #define SAHADDRHASH_HASH(saidx) \ argument 273 &V_sahaddrhashtbl[SAHADDRHASH_HASHVAL(saidx)] 368 #define ACQADDRHASH_HASH(saidx) \ argument 369 &V_acqaddrhashtbl[ACQADDRHASH_HASHVAL(saidx)] 1021 key_allocsa_tcpmd5(struct secasindex *saidx) in key_allocsa_tcpmd5() argument 1027 IPSEC_ASSERT(saidx->proto == IPPROTO_TCP, in key_allocsa_tcpmd5() 1028 ("unexpected security protocol %u", saidx->proto)); in key_allocsa_tcpmd5() 1029 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TCPMD5, in key_allocsa_tcpmd5() 1030 ("unexpected mode %u", saidx->mode)); in key_allocsa_tcpmd5() 1033 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { in key_allocsa_tcpmd5() [all …]
|
H A D | xform_esp.c | 330 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input() 500 struct secasindex *saidx; in esp_input_cb() local 520 saidx = &sav->sah->saidx; in esp_input_cb() 560 ipsec_address(&saidx->dst, buf, sizeof(buf)), in esp_input_cb() 612 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 626 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 638 &sav->sah->saidx.dst, buf, sizeof(buf)), in esp_input_cb() 658 switch (saidx->dst.sa.sa_family) { in esp_input_cb() 671 saidx->dst.sa.sa_family, saidx); in esp_input_cb() 702 struct secasindex *saidx; in esp_output() local [all …]
|
H A D | key_debug.c | 738 kdebug_secasindex(&sp->req[idx]->saidx, NULL); in kdebug_secpolicy() 765 kdebug_secasindex(const struct secasindex *saidx, const char *indent) in kdebug_secasindex() argument 769 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex() 773 kdebug_secasindex_mode(saidx->mode), saidx->proto, saidx->reqid); in kdebug_secasindex() 774 printf("%s:%s -> ", ipsec_address(&saidx->src, buf, sizeof(buf)), in kdebug_secasindex() 775 kdebug_port2str(&saidx->src.sa, port, sizeof(port))); in kdebug_secasindex() 776 printf("%s:%s }\n", ipsec_address(&saidx->dst, buf, sizeof(buf)), in kdebug_secasindex() 777 kdebug_port2str(&saidx->dst.sa, port, sizeof(port))); in kdebug_secasindex() 803 kdebug_secasindex(&sah->saidx, indent); in kdebug_secash() 982 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), in ipsec_sa2str() [all …]
|
H A D | ipsec.c | 951 switch (isr->saidx.proto) { in ipsec_get_reqlevel() 953 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) in ipsec_get_reqlevel() 959 if (isr->saidx.mode == IPSEC_MODE_TUNNEL) in ipsec_get_reqlevel() 973 isr->saidx.proto); in ipsec_get_reqlevel() 1007 if (xh->proto != sp->req[idx]->saidx.proto) in ipsec_check_history() 1010 if (xh->mode != sp->req[idx]->saidx.mode && in ipsec_check_history() 1017 if (sp->req[idx]->saidx.mode == IPSEC_MODE_TRANSPORT) { in ipsec_check_history() 1023 &sp->req[idx]->saidx.dst.sa, 0) != 0) in ipsec_check_history() 1078 if (sp->req[i]->saidx.proto == IPPROTO_IPCOMP || in ipsec_in_reject() 1084 else switch (sp->req[i]->saidx.proto) { in ipsec_in_reject() [all …]
|
H A D | udpencap.c | 251 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output() 282 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_output() 346 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum() 368 switch (sav->sah->saidx.dst.sa.sa_family) { in udp_ipsec_adjust_cksum()
|
H A D | keydb.h | 114 struct secasindex saidx; 138 * lookup for suitable SAH using packet's saidx. Then we use SAH's savtree 253 struct secasindex saidx; 112 struct secasindex saidx; global() member 239 struct secasindex saidx; global() member
|
H A D | ipsec.h | 72 struct secasindex saidx;/* hint for search proper SA */ member
|
/freebsd/sys/net/ |
H A D | if_ipsec.c | 347 return (&sp->req[0]->saidx); in ipsec_getsaidx() 456 struct secasindex *saidx; in ipsec_if_input() local 466 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || in ipsec_if_input() 467 sav->sah->saidx.proto != IPPROTO_ESP) in ipsec_if_input() 471 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { in ipsec_if_input() 474 saidx = ipsec_getsaidx(sc, IPSEC_DIR_INBOUND, in ipsec_if_input() 475 sav->sah->saidx.src.sa.sa_family); in ipsec_if_input() 477 if (saidx == NULL || in ipsec_if_input() 478 sav->sah->saidx.reqid != saidx->reqid) in ipsec_if_input() 481 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, in ipsec_if_input() [all …]
|
/freebsd/contrib/libdivsufsort/include/ |
H A D | divsufsort.h.cmake | 55 typedef @SAINDEX_TYPE@ saidx@W64BIT@_t; 76 divsufsort@W64BIT@(const sauchar_t *T, saidx@W64BIT@_t *SA, saidx@W64BIT@_t n); 87 saidx@W64BIT@_t 88 divbwt@W64BIT@(const sauchar_t *T, sauchar_t *U, saidx@W64BIT@_t *A, saidx@W64BIT@_t n); 111 saidx@W64BIT@_t *SA /* can NULL */, 112 saidx@W64BIT@_t n, saidx@W64BIT@_t *idx); 126 saidx@W64BIT@_t *A /* can NULL */, 127 saidx@W64BIT@_t n, saidx@W64BIT@_t idx); 139 sufcheck@W64BIT@(const sauchar_t *T, const saidx@W64BIT@_t *SA, saidx@W64BIT@_t n, saint_t verbose); 153 saidx@W64BIT@_t [all …]
|
/freebsd/sys/dev/mlx5/mlx5_accel/ |
H A D | mlx5_ipsec.c | 160 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_ipsec_build_accel_xfrm_attrs() local 196 attrs->family = saidx->dst.sa.sa_family; in mlx5e_ipsec_build_accel_xfrm_attrs() 197 attrs->reqid = saidx->reqid; in mlx5e_ipsec_build_accel_xfrm_attrs() 199 if (saidx->src.sa.sa_family == AF_INET) { in mlx5e_ipsec_build_accel_xfrm_attrs() 200 attrs->saddr.a4 = saidx->src.sin.sin_addr.s_addr; in mlx5e_ipsec_build_accel_xfrm_attrs() 201 attrs->daddr.a4 = saidx->dst.sin.sin_addr.s_addr; in mlx5e_ipsec_build_accel_xfrm_attrs() 203 memcpy(&attrs->saddr.a6, &saidx->src.sin6.sin6_addr, 16); in mlx5e_ipsec_build_accel_xfrm_attrs() 204 memcpy(&attrs->daddr.a6, &saidx->dst.sin6.sin6_addr, 16); in mlx5e_ipsec_build_accel_xfrm_attrs() 252 struct secasindex *saidx = &savp->sah->saidx; in mlx5e_xfrm_validate_state() local 279 if ((saidx->dst.sa.sa_family != AF_INET && saidx->dst.sa.sa_family != AF_INET6) || in mlx5e_xfrm_validate_state() [all …]
|