Lines Matching defs:extv

1024  * in the extv if passed in.
1027 keysock_passdown(keysock_t *ks, mblk_t *mp, uint8_t satype, sadb_ext_t *extv[],
1039 if (extv[SADB_EXT_KEY_ENCRYPT] != NULL)
1040 bzero(extv[SADB_EXT_KEY_ENCRYPT],
1042 extv[SADB_EXT_KEY_ENCRYPT]->sadb_ext_len));
1043 if (extv[SADB_EXT_KEY_AUTH] != NULL)
1044 bzero(extv[SADB_EXT_KEY_AUTH],
1046 extv[SADB_EXT_KEY_AUTH]->sadb_ext_len));
1061 if (extv[SADB_EXT_ADDRESS_SRC] != NULL)
1064 if (extv[SADB_EXT_ADDRESS_DST] != NULL)
1068 ksi->ks_in_extv[i] = extv[i];
1207 * If there are no extensions, place NULL in extv[0].
1210 * extv[0].
1211 * KGE_UNK Unknown extension type encountered. extv[0] contains
1220 keysock_get_ext(sadb_ext_t *extv[], sadb_msg_t *basehdr, uint_t msgsize,
1223 bzero(extv, sizeof (sadb_ext_t *) * (SADB_EXT_MAX + 1));
1225 /* Use extv[0] as the "current working pointer". */
1227 extv[0] = (sadb_ext_t *)(basehdr + 1);
1229 while (extv[0] < (sadb_ext_t *)(((uint8_t *)basehdr) + msgsize)) {
1231 if (extv[0]->sadb_ext_type == 0 ||
1232 extv[0]->sadb_ext_type > SADB_EXT_MAX)
1240 if (extv[0]->sadb_ext_len == 0 ||
1241 (void *)((uint64_t *)extv[0] + extv[0]->sadb_ext_len) >
1246 if (extv[extv[0]->sadb_ext_type] != NULL)
1253 if (!ext_check(extv[0], keystack))
1257 extv[extv[0]->sadb_ext_type] = extv[0];
1260 extv[0] = (sadb_ext_t *)
1261 ((uint64_t *)extv[0] + extv[0]->sadb_ext_len);
1267 * If extv[0] == NULL, then there are no extension headers in this
1270 if (extv[0] == (sadb_ext_t *)(basehdr + 1))
1271 extv[0] = NULL;
1286 sadb_ext_t *extv[SADB_EXT_MAX + 1];
1294 (void) keysock_get_ext(extv, samsg, SADB_64TO8(samsg->sadb_msg_len),
1370 keysock_passdown(ks, mp1, i, extv, B_TRUE);
1477 keysock_inverse_acquire(mblk_t *mp, sadb_msg_t *samsg, sadb_ext_t *extv[],
1486 if (extv[SADB_EXT_ADDRESS_SRC] == NULL) {
1490 if (extv[SADB_EXT_ADDRESS_DST] == NULL) {
1495 if (extv[SADB_X_EXT_ADDRESS_INNER_SRC] != NULL &&
1496 extv[SADB_X_EXT_ADDRESS_INNER_DST] == NULL) {
1502 if (extv[SADB_X_EXT_ADDRESS_INNER_SRC] == NULL &&
1503 extv[SADB_X_EXT_ADDRESS_INNER_DST] != NULL) {
1509 reply_mp = ipsec_construct_inverse_acquire(samsg, extv,
1526 keysock_extended_register(keysock_t *ks, mblk_t *mp, sadb_ext_t *extv[])
1528 sadb_x_ereg_t *ereg = (sadb_x_ereg_t *)extv[SADB_X_EXT_EREG];
1572 keysock_delpair_all(keysock_t *ks, mblk_t *mp, sadb_ext_t *extv[])
1589 keysock_passdown(ks, mp1, i, extv, B_FALSE);
1601 sadb_ext_t *extv[SADB_EXT_MAX + 1];
1646 switch (keysock_get_ext(extv, samsg, msgsize, keystack)) {
1650 extv[0]->sadb_ext_type));
1652 keysock_duplicate(extv[0]->sadb_ext_type));
1657 extv[0]->sadb_ext_type));
1664 extv[0]->sadb_ext_len, extv[0]->sadb_ext_type));
1671 extv[0]->sadb_ext_type));
1673 keysock_malformed(extv[0]->sadb_ext_type));
1692 keysock_extended_register(ks, mp, extv);
1710 keysock_passdown(ks, mp, samsg->sadb_msg_satype, extv,
1717 keysock_delpair_all(ks, mp, extv);
1719 keysock_passdown(ks, mp, samsg->sadb_msg_satype, extv,
1755 keysock_passdown(ks, mp, satype, extv, B_FALSE);
1786 if (extv[0] != NULL) {
1800 if ((extv[0] != NULL) &&
1803 (extv[SADB_X_EXT_EDUMP] == NULL))) {
1822 keysock_inverse_acquire(mp, samsg, extv, ks);