HomeSort by: relevance | last modified time | path
    Searched defs:satype (Results 1 - 10 of 10) sorted by relevancy

  /src/crypto/dist/ipsec-tools/src/libipsec/
libpfkey.h 73 u_int satype; member in struct:pfkey_send_sa_args
pfkey.c 128 findsupportedmap(int satype)
133 if (supported_map[i] == satype)
139 findsupportedalg(u_int satype, u_int alg_id)
146 algno = findsupportedmap((int)satype);
217 u_int satype; local
222 satype = SADB_SATYPE_AH;
225 satype = SADB_SATYPE_ESP;
232 return ipsec_check_keylen2(satype, alg_id, keylen);
237 * satype is one of satype defined at pfkeyv2.h
275 u_int satype; local
    [all...]
  /src/crypto/dist/ipsec-tools/src/setkey/
setkey.c 460 * Generate 'spi' array with SPIs matching 'satype', 'srcs', and 'dsts'.
466 sendkeymsg_spigrep(unsigned int satype, struct addrinfo *srcs,
501 msg.sadb_msg_satype = satype;
562 /* match satype */
563 if (m->sadb_msg_satype != satype)
880 static const char *satype[] = { variable
937 printf(" %-3s", STR_OR_ID(msg->sadb_msg_satype, satype));
  /src/external/gpl3/gcc.old/dist/gcc/d/
modules.cc 660 tree satype = make_array_type (Type::tvoidptr, aimports_dim); local
676 build_constructor (satype, elms));
682 tree satype = make_array_type (Type::tvoidptr, aclasses.length); local
693 build_constructor (satype, elms));
expr.cc 2664 tree satype = make_array_type (etype, e->elements->length); local
2692 tree ctor = build_constructor (satype, elms);
typeinfo.cc 1131 Type *satype = Type::tvoidptr->sarrayOf (ti->arguments->length); local
1139 tree ctor = build_constructor (build_ctype (satype), elms);
d-codegen.cc 1820 tree satype = make_array_type (etype, exps->length); local
1831 tree var = build_local_temp (satype);
1840 tree assign = modify_expr (var, build_constructor (satype, elms));
  /src/crypto/dist/ipsec-tools/src/racoon/
handler.h 312 uint8_t satype; /* satype in PF_KEY */ member in struct:ph2handle
314 * saved satype in the original PF_KEY request from
pfkey.c 300 pfkey_dump_sadb(int satype)
329 if (pfkey_send_dump(s, satype) < 0) {
389 int satype; local
392 if ((satype = admin2pfkey_proto(proto)) < 0)
396 if (pfkey_send_flush(lcconf->sock_pfkey, satype) < 0) {
676 pfkey2ipsecdoi_proto(u_int satype)
678 switch (satype) {
688 "Invalid pfkey proto: %u\n", satype);
876 u_int satype, mode; local
907 satype = ipsecdoi2pfkey_proto(pr->proto_id)
2052 u_int satype, mode; local
    [all...]
  /src/sys/netipsec/
key.c 1185 uint8_t satype;
1187 satype = key_proto2satype(sav->sah->saidx.proto);
1188 if (satype == 0)
1191 m = key_setsadbmsg(SADB_DELETE, 0, satype, 0, 0, key_sa_refcnt(sav) - 1);
3855 /* check satype */
3888 IPSECLOG(LOG_DEBUG, "Invalid satype.\n");
3900 key_setdumpsa(struct secasvar *sav, u_int8_t type, u_int8_t satype,
3922 m = key_setsadbmsg(type, 0, satype, seq, pid, key_sa_refcnt(sav), M_WAITOK);
4233 key_setsadbmsg(u_int8_t type, u_int16_t tlen, u_int8_t satype,
4256 p->sadb_msg_satype = satype;
6471 u_int8_t satype; local
6788 u_int8_t satype; local
7438 int satype; local
7609 u_int8_t satype; local
7705 u_int8_t satype; local
8607 u_int8_t satype; local
    [all...]

Completed in 40 milliseconds