/src/lib/libc/compat/sys/ |
compat___sigaction14_sigtramp.c | 67 int sav = errno; local in function:__weak_alias 72 errno = sav;
|
/src/sys/arch/cesfic/cesfic/ |
dp8570a.h | 24 } sav; member in struct:dp8570reg
|
/src/sys/netipsec/ |
ipsec_netbsd.c | 93 struct secasvar *sav; local in function:ah4_ctlinput 107 sav = KEY_LOOKUP_SA((const union sockaddr_union *)sa, 110 if (sav) { 111 if (SADB_SASTATE_USABLE_P(sav)) { 123 KEY_SA_UNREF(&sav); 136 struct secasvar *sav; local in function:esp4_ctlinput 150 sav = KEY_LOOKUP_SA((const union sockaddr_union *)sa, 153 if (sav) { 154 if (SADB_SASTATE_USABLE_P(sav)) { 166 KEY_SA_UNREF(&sav); 178 struct secasvar *sav; local in function:ah6_ctlinput 258 struct secasvar *sav; local in function:esp6_ctlinput [all...] |
ipsec_input.c | 219 struct secasvar *sav; local in function:ipsec_common_input 300 sav = KEY_LOOKUP_SA(&dst_address, sproto, spi, sport, dport); 301 if (sav == NULL) { 337 KASSERT(sav->tdb_xform != NULL); 343 error = (*sav->tdb_xform->xf_input)(m, sav, skip, protoff); 344 KEY_SA_UNREF(&sav); 366 ipsec4_common_input_cb(struct mbuf *m, struct secasvar *sav, 381 KASSERT(sav != NULL); 382 saidx = &sav->sah->saidx [all...] |
ipsec_output.c | 142 struct secasvar *sav, int flags) 158 KASSERT(sav != NULL); 160 saidx = &sav->sah->saidx; 162 if (sav->natt_type != 0) { 192 (u_long)ntohl(sav->spi)); 213 if (sav->natt_type != 0) 231 if (sav->natt_type != 0) { 244 key_sa_recordxfer(sav, m); 403 struct secasvar *sav = NULL; local in function:ipsec_nextisr 423 *error = key_checkrequest(isr, &saidx, &sav); 489 struct secasvar *sav = NULL; local in function:ipsec4_process_packet 732 struct secasvar *sav = NULL; local in function:ipsec6_process_packet [all...] |
xform_esp.c | 137 esp_hdrsiz(const struct secasvar *sav) 141 if (sav != NULL) { 143 KASSERT(sav->tdb_encalgxform != NULL); 152 if (sav->flags & SADB_X_EXT_OLD) 156 size += sav->tdb_encalgxform->ivsize + 9 + 160 if (sav->tdb_authalgxform != NULL && sav->replay) 161 size += ah_authsiz(sav); 180 esp_init(struct secasvar *sav, const struct xformsw *xsp) 187 txform = esp_algorithm_lookup(sav->alg_enc) 517 struct secasvar *sav; local in function:esp_input_cb 947 struct secasvar *sav; local in function:esp_output_cb [all...] |
xform_ipcomp.c | 99 ipcomp_init(struct secasvar *sav, const struct xformsw *xsp) 106 tcomp = ipcomp_algorithm_lookup(sav->alg_enc); 109 sav->alg_comp); 112 sav->alg_comp = sav->alg_enc; /* set for doing histogram */ 113 sav->tdb_xform = xsp; 114 sav->tdb_compalgxform = tcomp; 118 cric.cri_alg = sav->tdb_compalgxform->type; 120 ses = crypto_newsession(&sav->tdb_cryptoid, &cric, crypto_support); 128 ipcomp_zeroize(struct secasvar *sav) 247 struct secasvar *sav; local in function:ipcomp_input_cb 513 struct secasvar *sav; local in function:ipcomp_output_cb [all...] |
xform_ah.c | 91 #define HDRSIZE(sav) \ 92 (((sav)->flags & SADB_X_EXT_OLD) ? \ 99 #define AUTHSIZE(sav) \ 100 ((sav->flags & SADB_X_EXT_OLD) ? 16 : (sav)->tdb_authalgxform->authsize) 152 ah_authsiz(const struct secasvar *sav) 156 if (sav == NULL) { 160 size = AUTHSIZE(sav); 165 ah_hdrsiz(const struct secasvar *sav) 169 if (sav != NULL) 735 struct secasvar *sav; local in function:ah_input_cb 1132 struct secasvar *sav; local in function:ah_output_cb [all...] |
ipsecif.c | 197 struct secasvar *sav; local in function:ipsecif4_needfrag 199 sav = key_lookup_sa_bysaidx(&isr->saidx); 200 if (sav == NULL) 203 if (!(sav->natt_type & UDP_ENCAP_ESPINUDP)) { 214 mtu = sav->esp_frag; 219 KEY_SA_UNREF(&sav);
|
ipsec.c | 759 struct secasvar *sav; local in function:ipsec_mtu 761 sav = ipsec_lookup_sa(sp->req, m); 762 if (sav != NULL) { 766 ro = &sav->sah->sa_route; 774 KEY_SA_UNREF(&sav); 1496 struct secasvar *sav; local in function:ipsec_sp_hdrsiz 1500 sav = ipsec_lookup_sa(isr, m); 1501 if (sav != NULL) { 1502 clen = esp_hdrsiz(sav); 1503 KEY_SA_UNREF(&sav); [all...] |
key.c | 214 * - SAs are managed by the list called key_sad.sahlists and sav lists of 216 * - An sav is supposed to be an SA from a viewpoint of users 217 * - A sah has sav lists for each SA state 221 * - All sav whose state is MATURE or DYING are registered to the lookup 223 * - The table is used to search an sav without use of saidx. 234 * - An sah is destroyed when its state become DEAD and no sav is 237 * - sav's lifetime is managed by localcount(9) 238 * - Getting an sav entry 239 * - First get an sah by saidx and get an sav from either of sah's savlists 240 * - Must iterate the list and increment the reference count of a found sav 1075 struct secasvar *sav; local in function:key_checkrequest 1126 struct secasvar *sav = NULL; local in function:key_lookup_sa_bysaidx 1261 struct secasvar *sav; local in function:key_lookup_sa 1371 struct secasvar *sav, *next; local in function:key_validate_savlist 3476 struct secasvar *sav; local in function:key_checkspidup 3513 struct secasvar *sav = NULL; local in function:key_getsavbyspi 3551 struct secasvar *sav = NULL; local in function:key_lookup_and_remove_sav 4997 struct secasvar *sav; local in function:key_timehandler_sad 5731 struct secasvar *sav, *newsav, *oldsav; local in function:key_api_update 5939 struct secasvar *sav; local in function:key_getsavbyseq 6060 struct secasvar *sav; local in function:key_api_add 6263 struct secasvar *sav = NULL; local in function:key_api_delete 6351 struct secasvar *sav; local in function:key_delete_all 6417 struct secasvar *sav = NULL; local in function:key_api_get 7545 struct secasvar *sav; local in function:key_api_flush 7607 struct secasvar *sav; local in function:key_setdump_chain 8605 struct secasvar *sav; local in function:key_setdump [all...] |
/src/bin/csh/ |
exec.c | 114 Char *blk[2], **av, *dp, **pv, *sav; local in function:doexec 204 sav = Strspl(STRslash, *av); /* / command name for postpending */ 205 Vsav = sav; 225 dp = Strspl(*pv, sav); 238 free(sav); 510 Char **pv, *sav; local in function:iscommand 522 sav = Strspl(STRslash, name); /* / command name for postpending */ 534 free(sav); 539 if (executable(*pv, sav, 0)) { 540 free(sav); [all...] |
/src/sys/netinet/ |
tcp_syncache.c | 1093 struct secasvar *sav = NULL; local in function:syn_cache_respond 1212 sav = tcp_signature_getsav(m); 1213 if (sav == NULL) { 1249 if (sav) { 1250 (void)tcp_signature(m, th, hlen, sav, sigp); 1251 key_sa_recordxfer(sav, m); 1252 KEY_SA_UNREF(&sav);
|
tcp_output.c | 1403 struct secasvar *sav; local in function:tcp_output 1406 sav = tcp_signature_getsav(m); 1407 if (sav == NULL) { 1414 tcp_signature(m, th, (char *)th - mtod(m, char *), sav, sigp); 1416 key_sa_recordxfer(sav, m); 1417 KEY_SA_UNREF(&sav);
|
tcp_input.c | 3013 struct secasvar *sav, char *sig) 3026 if (sav == NULL) 3072 MD5Update(&ctx, _KEYBUF(sav->key_auth), _KEYLEN(sav->key_auth)); 3094 struct secasvar *sav = NULL; local in function:tcp_dooptions 3224 sav = tcp_signature_getsav(m); 3225 if (sav == NULL && tp->t_state == TCPS_LISTEN) 3236 if (tcp_signature(m, th, toff, sav, sig) < 0) { 3248 key_sa_recordxfer(sav, m); 3249 KEY_SA_UNREF(&sav); [all...] |
/src/sys/arch/x86/pci/ |
pci_machdep.c | 794 uint32_t sav, val; local in function:pci_mode_detect 805 sav = inl(PCI_MODE1_ADDRESS_REG); 876 outl(PCI_MODE1_ADDRESS_REG, sav);
|