Lines Matching defs:node

282 	 * actually in-tree but rather a template node being used in
299 * Tie-breaker #2: use the virtual address of the policy node
300 * to arbitrarily break ties. Since we use the new tree node in
301 * the avl_find() in ipsec_insert_always, the new node will be
363 ipsec_tun_pol_t *node;
378 while ((node = (ipsec_tun_pol_t *)
381 ITP_REFRELE(node, ns);
926 void *node;
929 node = avl_find(tree, new_node, &where);
930 ASSERT(node == NULL);
3249 * node are gone.
5932 * Free a tunnel policy node.
5935 itp_free(ipsec_tun_pol_t *node, netstack_t *ns)
5937 if (node->itp_policy != NULL) {
5938 IPPH_REFRELE(node->itp_policy, ns);
5939 node->itp_policy = NULL;
5941 if (node->itp_inactive != NULL) {
5942 IPPH_REFRELE(node->itp_inactive, ns);
5943 node->itp_inactive = NULL;
5945 mutex_destroy(&node->itp_lock);
5946 kmem_free(node, sizeof (*node));
5950 itp_unlink(ipsec_tun_pol_t *node, netstack_t *ns)
5956 ipsec_fragcache_uninit(&node->itp_fragcache, ipss);
5957 avl_remove(&ipss->ipsec_tunnel_policies, node);
5959 ITP_REFRELE(node, ns);
5964 * spdsock mostly. Returns "node" with a bumped refcnt.
5969 ipsec_tun_pol_t *node, lookup;
5975 node = (ipsec_tun_pol_t *)avl_find(&ipss->ipsec_tunnel_policies,
5977 if (node != NULL) {
5978 ITP_REFHOLD(node);
5982 return (node);
5993 ipsec_tun_pol_t *node;
5997 for (node = avl_first(&ipss->ipsec_tunnel_policies); node != NULL;
5998 node = AVL_NEXT(&ipss->ipsec_tunnel_policies, node)) {
5999 iterator(node, arg, ns);
6025 * Create a tunnel policy node with "name". Set errno with
6027 * node.