Searched defs:SaId (Results 1 - 8 of 8) sorted by relevance

/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Application/IpsecConfig/
H A DIndexer.h26 EFI_IPSEC_SA_ID SaId; member in struct:__anon12465
H A DMatch.c84 @param[in] SaId The pointer to the EFI_IPSEC_SA_ID structure.
93 IN EFI_IPSEC_SA_ID *SaId,
101 if (!IsMemoryZero (&Indexer->SaId, sizeof (EFI_IPSEC_SA_ID))) {
102 Match = (BOOLEAN) (CompareMem (&Indexer->SaId, SaId, sizeof (EFI_IPSEC_SA_ID)) == 0);
92 MatchSadEntry( IN EFI_IPSEC_SA_ID *SaId, IN EFI_IPSEC_SA_DATA2 *Data, IN SAD_ENTRY_INDEXER *Indexer ) argument
H A DDump.c373 @param[in] SaId The pointer to the EFI_IPSEC_SA_ID structure.
381 IN EFI_IPSEC_SA_ID *SaId,
401 Print (L"0x%x %s ", (UINTN) SaId->Spi, MapIntegerToString (SaId->Proto, mMapIpSecProtocol));
443 if (SaId->Proto == EfiIPsecAH) {
380 DumpSadEntry( IN EFI_IPSEC_SA_ID *SaId, IN EFI_IPSEC_SA_DATA2 *Data, IN UINTN *EntryIndex ) argument
H A DPolicyEntryOperation.c584 @param[out] SaId The pointer to the EFI_IPSEC_SA_ID structure.
596 OUT EFI_IPSEC_SA_ID **SaId,
617 *SaId = AllocateZeroPool (sizeof (EFI_IPSEC_SA_ID));
618 ASSERT (*SaId != NULL);
623 Status = GetNumber (L"--spi", (UINT32) -1, &(*SaId)->Spi, sizeof (UINT32), NULL, ParamPackage, FORMAT_NUMBER);
638 &(*SaId)->Proto,
972 if ((*SaId)->Proto == EfiIPsecAH) {
595 CreateSadEntry( OUT EFI_IPSEC_SA_ID **SaId, OUT EFI_IPSEC_SA_DATA2 **Data, IN LIST_ENTRY *ParamPackage, OUT UINT32 *Mask, IN BOOLEAN CreateNew ) argument
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Protocol/
H A DIpSecConfig.h368 /// Specifies the actual number of entries in SaId list.
375 EFI_IPSEC_SA_ID SaId[1]; member in struct:_EFI_IPSEC_SPD_DATA
541 EFI_IPSEC_SA_ID SaId; member in union:__anon12198
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/Ikev2/
H A DUtility.c943 if (Selector->SaId.Spi == RemoteSpi) {
954 if (Selector->SaId.Spi == LocalSpi) {
1416 EFI_IPSEC_SA_ID SaId; local
1426 ZeroMem (&SaId, sizeof (EFI_IPSEC_SA_ID));
1445 // Set the SaId and SaData.
1447 SaId.Spi = ChildSaSession->LocalPeerSpi;
1448 SaId.Proto = EfiIPsecESP;
1469 CopyMem (&SaId.DestAddress, &ChildSaSession->SessionCommon.LocalPeerIp, sizeof (EFI_IP_ADDRESS));
1479 (EFI_IPSEC_CONFIG_SELECTOR *) &SaId,
1494 SaId
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/
H A DIpSecConfigImpl.c484 SaId1 = &Selector1->SaId;
485 SaId2 = &Selector2->SaId;
725 Dst = &DstSel->SaId;
726 Src = &SrcSel->SaId;
827 @param[in] SaId Pointer of SA ID
833 IN EFI_IPSEC_SA_ID *SaId,
845 if (SaId->Proto == EfiIPsecESP && Data->AlgoInfo.EspAlgoInfo.EncKey != NULL) {
930 @param[in, out] SaId Pointer of SAD ID.
936 IN OUT EFI_IPSEC_SA_ID *SaId,
948 if (SaId
832 FixSadEntry( IN EFI_IPSEC_SA_ID *SaId, IN OUT EFI_IPSEC_SA_DATA2 *Data ) argument
935 UnfixSadEntry( IN OUT EFI_IPSEC_SA_ID *SaId, IN OUT EFI_IPSEC_SA_DATA2 *Data ) argument
1254 EFI_IPSEC_SA_ID *SaId; local
1738 EFI_IPSEC_SA_ID *SaId; local
[all...]
H A DIpSecImpl.c1404 EFI_IPSEC_SA_ID *SaId; local
1461 SaId = SadEntry->Id;
1467 if (SaId->Proto != EfiIPsecESP) {
1704 EFI_IPSEC_SA_ID *SaId; local
1725 SaId = SadEntry->Id;
1838 EspHeader->Spi = HTONL (SaId->Spi);

Completed in 48 milliseconds