| /src/lib/libc/compat/sys/ |
| compat___sigaction14_sigtramp.c | 67 int sav = errno; local 72 errno = sav;
|
| /src/sys/arch/cesfic/cesfic/ |
| dp8570a.h | 24 } sav; member in struct:dp8570reg
|
| /src/sys/netipsec/ |
| ipsec_input.c | 219 struct secasvar *sav; local 300 sav = KEY_LOOKUP_SA(&dst_address, sproto, spi, sport, dport); 301 if (sav == NULL) { 337 KASSERT(sav->tdb_xform != NULL); 343 error = (*sav->tdb_xform->xf_input)(m, sav, skip, protoff); 344 KEY_SA_UNREF(&sav); 366 ipsec4_common_input_cb(struct mbuf *m, struct secasvar *sav, 381 KASSERT(sav != NULL); 382 saidx = &sav->sah->saidx [all...] |
| ipsec_netbsd.c | 93 struct secasvar *sav; local 107 sav = KEY_LOOKUP_SA((const union sockaddr_union *)sa, 110 if (sav) { 111 if (SADB_SASTATE_USABLE_P(sav)) { 123 KEY_SA_UNREF(&sav); 136 struct secasvar *sav; local 150 sav = KEY_LOOKUP_SA((const union sockaddr_union *)sa, 153 if (sav) { 154 if (SADB_SASTATE_USABLE_P(sav)) { 166 KEY_SA_UNREF(&sav); 178 struct secasvar *sav; local 258 struct secasvar *sav; local [all...] |
| ipsec_output.c | 142 struct secasvar *sav, int flags) 158 KASSERT(sav != NULL); 160 saidx = &sav->sah->saidx; 162 if (sav->natt_type != 0) { 192 (u_long)ntohl(sav->spi)); 213 if (sav->natt_type != 0) 231 if (sav->natt_type != 0) { 244 key_sa_recordxfer(sav, m); 403 struct secasvar *sav = NULL; local 423 *error = key_checkrequest(isr, &saidx, &sav); 489 struct secasvar *sav = NULL; local 732 struct secasvar *sav = NULL; local [all...] |
| xform_esp.c | 137 esp_hdrsiz(const struct secasvar *sav) 141 if (sav != NULL) { 143 KASSERT(sav->tdb_encalgxform != NULL); 152 if (sav->flags & SADB_X_EXT_OLD) 156 size += sav->tdb_encalgxform->ivsize + 9 + 160 if (sav->tdb_authalgxform != NULL && sav->replay) 161 size += ah_authsiz(sav); 180 esp_init(struct secasvar *sav, const struct xformsw *xsp) 187 txform = esp_algorithm_lookup(sav->alg_enc) 517 struct secasvar *sav; local 947 struct secasvar *sav; local [all...] |
| xform_ipcomp.c | 99 ipcomp_init(struct secasvar *sav, const struct xformsw *xsp) 106 tcomp = ipcomp_algorithm_lookup(sav->alg_enc); 109 sav->alg_comp); 112 sav->alg_comp = sav->alg_enc; /* set for doing histogram */ 113 sav->tdb_xform = xsp; 114 sav->tdb_compalgxform = tcomp; 118 cric.cri_alg = sav->tdb_compalgxform->type; 120 ses = crypto_newsession(&sav->tdb_cryptoid, &cric, crypto_support); 128 ipcomp_zeroize(struct secasvar *sav) 247 struct secasvar *sav; local 513 struct secasvar *sav; local [all...] |
| ipsecif.c | 197 struct secasvar *sav; local 199 sav = key_lookup_sa_bysaidx(&isr->saidx); 200 if (sav == NULL) 203 if (!(sav->natt_type & UDP_ENCAP_ESPINUDP)) { 214 mtu = sav->esp_frag; 219 KEY_SA_UNREF(&sav);
|
| xform_ah.c | 91 #define HDRSIZE(sav) \ 92 (((sav)->flags & SADB_X_EXT_OLD) ? \ 99 #define AUTHSIZE(sav) \ 100 ((sav->flags & SADB_X_EXT_OLD) ? 16 : (sav)->tdb_authalgxform->authsize) 152 ah_authsiz(const struct secasvar *sav) 156 if (sav == NULL) { 160 size = AUTHSIZE(sav); 165 ah_hdrsiz(const struct secasvar *sav) 169 if (sav != NULL) 735 struct secasvar *sav; local 1132 struct secasvar *sav; local [all...] |
| ipsec.c | 759 struct secasvar *sav; local 761 sav = ipsec_lookup_sa(sp->req, m); 762 if (sav != NULL) { 766 ro = &sav->sah->sa_route; 774 KEY_SA_UNREF(&sav); 1496 struct secasvar *sav; local 1500 sav = ipsec_lookup_sa(isr, m); 1501 if (sav != NULL) { 1502 clen = esp_hdrsiz(sav); 1503 KEY_SA_UNREF(&sav); [all...] |
| key.c | 214 * - SAs are managed by the list called key_sad.sahlists and sav lists of 216 * - An sav is supposed to be an SA from a viewpoint of users 217 * - A sah has sav lists for each SA state 221 * - All sav whose state is MATURE or DYING are registered to the lookup 223 * - The table is used to search an sav without use of saidx. 234 * - An sah is destroyed when its state become DEAD and no sav is 237 * - sav's lifetime is managed by localcount(9) 238 * - Getting an sav entry 239 * - First get an sah by saidx and get an sav from either of sah's savlists 240 * - Must iterate the list and increment the reference count of a found sav 1075 struct secasvar *sav; local 1126 struct secasvar *sav = NULL; local 1261 struct secasvar *sav; local 1371 struct secasvar *sav, *next; local 3476 struct secasvar *sav; local 3513 struct secasvar *sav = NULL; local 3551 struct secasvar *sav = NULL; local 4997 struct secasvar *sav; local 5731 struct secasvar *sav, *newsav, *oldsav; local 5939 struct secasvar *sav; local 6060 struct secasvar *sav; local 6263 struct secasvar *sav = NULL; local 6351 struct secasvar *sav; local 6417 struct secasvar *sav = NULL; local 7545 struct secasvar *sav; local 7607 struct secasvar *sav; local 8605 struct secasvar *sav; local [all...] |
| /src/bin/csh/ |
| exec.c | 114 Char *blk[2], **av, *dp, **pv, *sav; local 204 sav = Strspl(STRslash, *av); /* / command name for postpending */ 205 Vsav = sav; 225 dp = Strspl(*pv, sav); 238 free(sav); 510 Char **pv, *sav; local 522 sav = Strspl(STRslash, name); /* / command name for postpending */ 534 free(sav); 539 if (executable(*pv, sav, 0)) { 540 free(sav); [all...] |
| /src/sys/netinet/ |
| tcp_output.c | 1403 struct secasvar *sav; local 1406 sav = tcp_signature_getsav(m); 1407 if (sav == NULL) { 1414 tcp_signature(m, th, (char *)th - mtod(m, char *), sav, sigp); 1416 key_sa_recordxfer(sav, m); 1417 KEY_SA_UNREF(&sav);
|
| tcp_syncache.c | 1093 struct secasvar *sav = NULL; local 1212 sav = tcp_signature_getsav(m); 1213 if (sav == NULL) { 1249 if (sav) { 1250 (void)tcp_signature(m, th, hlen, sav, sigp); 1251 key_sa_recordxfer(sav, m); 1252 KEY_SA_UNREF(&sav);
|
| tcp_input.c | 3013 struct secasvar *sav, char *sig) 3026 if (sav == NULL) 3072 MD5Update(&ctx, _KEYBUF(sav->key_auth), _KEYLEN(sav->key_auth)); 3094 struct secasvar *sav = NULL; local 3224 sav = tcp_signature_getsav(m); 3225 if (sav == NULL && tp->t_state == TCPS_LISTEN) 3236 if (tcp_signature(m, th, toff, sav, sig) < 0) { 3248 key_sa_recordxfer(sav, m); 3249 KEY_SA_UNREF(&sav); [all...] |
| /src/sys/arch/x86/pci/ |
| pci_machdep.c | 794 uint32_t sav, val; local 805 sav = inl(PCI_MODE1_ADDRESS_REG); 876 outl(PCI_MODE1_ADDRESS_REG, sav);
|