| /src/crypto/dist/ipsec-tools/src/libipsec/ |
| libpfkey.h | 73 u_int satype; member in struct:pfkey_send_sa_args
|
| pfkey.c | 128 findsupportedmap(int satype) 133 if (supported_map[i] == satype) 139 findsupportedalg(u_int satype, u_int alg_id) 146 algno = findsupportedmap((int)satype); 217 u_int satype; local 222 satype = SADB_SATYPE_AH; 225 satype = SADB_SATYPE_ESP; 232 return ipsec_check_keylen2(satype, alg_id, keylen); 237 * satype is one of satype defined at pfkeyv2.h 275 u_int satype; local [all...] |
| /src/crypto/dist/ipsec-tools/src/setkey/ |
| setkey.c | 460 * Generate 'spi' array with SPIs matching 'satype', 'srcs', and 'dsts'. 466 sendkeymsg_spigrep(unsigned int satype, struct addrinfo *srcs, 501 msg.sadb_msg_satype = satype; 562 /* match satype */ 563 if (m->sadb_msg_satype != satype) 880 static const char *satype[] = { variable 937 printf(" %-3s", STR_OR_ID(msg->sadb_msg_satype, satype));
|
| /src/external/gpl3/gcc.old/dist/gcc/d/ |
| modules.cc | 660 tree satype = make_array_type (Type::tvoidptr, aimports_dim); local 676 build_constructor (satype, elms)); 682 tree satype = make_array_type (Type::tvoidptr, aclasses.length); local 693 build_constructor (satype, elms));
|
| expr.cc | 2664 tree satype = make_array_type (etype, e->elements->length); local 2692 tree ctor = build_constructor (satype, elms);
|
| typeinfo.cc | 1131 Type *satype = Type::tvoidptr->sarrayOf (ti->arguments->length); local 1139 tree ctor = build_constructor (build_ctype (satype), elms);
|
| d-codegen.cc | 1820 tree satype = make_array_type (etype, exps->length); local 1831 tree var = build_local_temp (satype); 1840 tree assign = modify_expr (var, build_constructor (satype, elms));
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| handler.h | 312 uint8_t satype; /* satype in PF_KEY */ member in struct:ph2handle 314 * saved satype in the original PF_KEY request from
|
| pfkey.c | 300 pfkey_dump_sadb(int satype) 329 if (pfkey_send_dump(s, satype) < 0) { 389 int satype; local 392 if ((satype = admin2pfkey_proto(proto)) < 0) 396 if (pfkey_send_flush(lcconf->sock_pfkey, satype) < 0) { 676 pfkey2ipsecdoi_proto(u_int satype) 678 switch (satype) { 688 "Invalid pfkey proto: %u\n", satype); 876 u_int satype, mode; local 907 satype = ipsecdoi2pfkey_proto(pr->proto_id) 2052 u_int satype, mode; local [all...] |
| /src/sys/netipsec/ |
| key.c | 1185 uint8_t satype; 1187 satype = key_proto2satype(sav->sah->saidx.proto); 1188 if (satype == 0) 1191 m = key_setsadbmsg(SADB_DELETE, 0, satype, 0, 0, key_sa_refcnt(sav) - 1); 3855 /* check satype */ 3888 IPSECLOG(LOG_DEBUG, "Invalid satype.\n"); 3900 key_setdumpsa(struct secasvar *sav, u_int8_t type, u_int8_t satype, 3922 m = key_setsadbmsg(type, 0, satype, seq, pid, key_sa_refcnt(sav), M_WAITOK); 4233 key_setsadbmsg(u_int8_t type, u_int16_t tlen, u_int8_t satype, 4256 p->sadb_msg_satype = satype; 6471 u_int8_t satype; local 6788 u_int8_t satype; local 7438 int satype; local 7609 u_int8_t satype; local 7705 u_int8_t satype; local 8607 u_int8_t satype; local [all...] |