Lines Matching refs:ns

157 static void *spdsock_stack_init(netstackid_t stackid, netstack_t *ns);
312 spdsock_stack_init(netstackid_t stackid, netstack_t *ns)
318 spds->spds_netstack = ns;
571 spdsock_flush_node(ipsec_tun_pol_t *itp, void *cookie, netstack_t *ns)
579 spdsock_flush_one(iph, ns); /* Releases iph refhold. */
593 spdsock_flush_one(ipsec_policy_head_t *iph, netstack_t *ns)
596 ipsec_polhead_flush(iph, ns);
598 IPPH_REFRELE(iph, ns);
607 netstack_t *ns = ss->spdsock_spds->spds_netstack;
611 spdsock_flush_one(iph, ns);
619 audit_pf_policy(SPD_FLUSH, cr, ns,
626 spdsock_flush_one(active ? ipsec_system_policy(ns) :
627 ipsec_inactive_policy(ns), ns);
633 audit_pf_policy(SPD_FLUSH, cr, ns, NULL,
637 itp_walk(spdsock_flush_node, (void *)active, ns);
643 audit_pf_policy(SPD_FLUSH, cr, ns,
1202 netstack_t *ns = ss->spdsock_spds->spds_netstack;
1215 audit_pf_policy(SPD_DELETERULE, cr, ns,
1230 if (ipsec_policy_delete_index(iph, rule->spd_rule_index, ns) !=
1242 !ipsec_policy_delete(iph, &sel, IPSEC_TYPE_INBOUND, ns)) {
1248 !ipsec_policy_delete(iph, &sel, IPSEC_TYPE_OUTBOUND, ns)) {
1276 audit_pf_policy(SPD_DELETERULE, cr, ns, ITP_NAME(itp),
1292 audit_pf_policy(SPD_DELETERULE, cr, ns, ITP_NAME(itp),
1300 spdsock_flip_node(ipsec_tun_pol_t *itp, void *ignoreme, netstack_t *ns)
1304 ipsec_swap_policy(itp->itp_policy, itp->itp_inactive, ns);
1316 netstack_t *ns = ss->spdsock_spds->spds_netstack;
1323 ipsec_swap_global_policy(ns);
1332 audit_pf_policy(SPD_FLIP, cr, ns,
1335 itp_walk(spdsock_flip_node, NULL, ns);
1344 audit_pf_policy(SPD_FLIP, cr, ns,
1348 itp = get_tunnel_policy(tname, ns);
1362 audit_pf_policy(SPD_FLIP, cr, ns,
1368 spdsock_flip_node(itp, NULL, ns);
1377 audit_pf_policy(SPD_FLIP, cr, ns,
1380 ITP_REFRELE(itp, ns);
1383 ipsec_swap_global_policy(ns); /* can't fail */
1393 ns, NULL, active, 0, cpid);
1447 netstack_t *ns = ss->spdsock_spds->spds_netstack;
1452 IPPH_REFRELE(iph, ns);
1454 ITP_REFRELE(ss->spdsock_itp, ns);
1958 netstack_t *ns = ss->spdsock_spds->spds_netstack;
1959 ipsec_stack_t *ipss = ns->netstack_ipsec;
2000 IPPH_REFRELE(ss->spdsock_dump_head, ns);
2064 netstack_t *ns = ss->spdsock_spds->spds_netstack;
2065 ipsec_stack_t *ipss = ns->netstack_ipsec;
2076 iph = ipsec_system_policy(ns);
2079 iph = ipsec_inactive_policy(ns);
2108 spdsock_clone_node(ipsec_tun_pol_t *itp, void *ep, netstack_t *ns)
2116 *errptr = ipsec_copy_polhead(itp->itp_policy, itp->itp_inactive, ns);
2127 netstack_t *ns = ss->spdsock_spds->spds_netstack;
2133 error = ipsec_clone_system_policy(ns);
2142 audit_pf_policy(SPD_CLONE, cr, ns,
2146 itp_walk(spdsock_clone_node, &error, ns);
2158 ns, "all tunnels", active, 0,
2163 itp = get_tunnel_policy(tname, ns);
2177 ns, NULL, active, ENOENT, cpid);
2190 audit_pf_policy(SPD_CLONE, cr, ns,
2193 ITP_REFRELE(itp, ns);
2196 error = ipsec_clone_system_policy(ns);
2205 audit_pf_policy(SPD_CLONE, cr, ns, NULL,
2895 netstack_t *ns = ss->spdsock_spds->spds_netstack;
2919 itp = get_tunnel_policy(tname, ns);
2928 itp = create_tunnel_policy(tname, &errno, &gen, ns);
2958 iph = (itp == NULL) ? ipsec_system_policy(ns) : itp->itp_policy;
2960 iph = (itp == NULL) ? ipsec_inactive_policy(ns) :
2982 netstack_t *ns = spds->spds_netstack;
2983 ipsec_stack_t *ipss = ns->netstack_ipsec;
3118 ITP_REFRELE(itp, ns);
3123 ITP_REFRELE(itp, ns);
3149 IPPH_REFRELE(iph, ns);
3155 ITP_REFRELE(itp, ns);
3164 spdsock_update_pending_algs(netstack_t *ns)
3166 spd_stack_t *spds = ns->netstack_spdsock;
3505 netstack_t *ns;
3517 ns = netstack_find_by_cred(credp);
3518 ASSERT(ns != NULL);
3519 spds = ns->netstack_spdsock;
3639 netstack_t *ns = spds->spds_netstack;
3640 ipsec_stack_t *ipss = ns->netstack_ipsec;
3701 ipsec_alg_unreg(algtype, algid, ns);
3724 ipsec_alg_reg(algtype, alg, ns);
3730 ipsec_alg_fix_min_max(alg, algtype, ns);
3747 ipsecah_algs_changed(ns);
3748 ipsecesp_algs_changed(ns);