/illumos-gate/usr/src/uts/common/syscall/ |
H A D | sigaction.c | 43 sigaction(int sig, struct sigaction *actp, struct sigaction *oactp) argument 53 (actp != NULL && sigismember(&cantmask, sig))) 59 if (actp) { 63 if (copyin(actp, &act, sizeof (act))) 114 if (actp) { 136 sigaction32(int sig, struct sigaction32 *actp, struct sigaction32 *oactp) argument 146 (actp != NULL && sigismember(&cantmask, sig))) 152 if (actp) { 156 if (copyin(actp, &act32, sizeof (act32))) 207 if (actp) { [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ipsecalgs.c | 337 struct spd_ext_actions *actp; local 400 actp = (struct spd_ext_actions *)exts[SPD_EXT_ACTION]; 401 start = (uint64_t *)actp; 402 end = (start + actp->spd_actions_len); 404 attr = (struct spd_attribute *)&actp[1];
|
H A D | ipsecconf.c | 594 struct spd_ext_actions *actp; local 653 actp = (struct spd_ext_actions *)exts[SPD_EXT_ACTION]; 654 start = (uint64_t *)actp; 655 end = (start + actp->spd_actions_len); 657 attr = (struct spd_attribute *)&actp[1];
|
/illumos-gate/usr/src/uts/common/inet/iptun/ |
H A D | iptun.c | 939 iptun_insert_simple_policies(ipsec_policy_head_t *ph, ipsec_act_t *actp, argument 944 if (!ipsec_polhead_insert(ph, actp, n, f, IPSEC_TYPE_INBOUND, ns) || 945 !ipsec_polhead_insert(ph, actp, n, f, IPSEC_TYPE_OUTBOUND, ns)) 949 return (ipsec_polhead_insert(ph, actp, n, f, IPSEC_TYPE_INBOUND, ns) && 950 ipsec_polhead_insert(ph, actp, n, f, IPSEC_TYPE_OUTBOUND, ns)); 962 ipsec_act_t *actp = NULL; local 995 ipsec_actvec_from_req(ipsr, &actp, &nact, ns); 996 if (actp == NULL) { 1040 if (iptun_insert_simple_policies(itp->itp_policy, actp, nact, ns)) { 1070 if (actp ! [all...] |
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | spdsock.c | 811 ipsec_act_t act, *actp, *endactp; local 839 actp = kmem_alloc(sizeof (*actp) * nact, KM_NOSLEEP); 840 if (actp == NULL) { 844 *actpp = actp; 846 endactp = actp + nact; 864 if (actp >= endactp) { 871 *actp++ = act; 963 if (actp != endactp) { 983 ipsec_selkey_t *sel, ipsec_act_t *actp, in 982 mkrule(ipsec_policy_head_t *iph, struct spd_rule *rule, ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t af, tmprule_t **rp, uint64_t *index, spd_stack_t *spds) argument 1008 mkrulepair(ipsec_policy_head_t *iph, struct spd_rule *rule, ipsec_selkey_t *sel, ipsec_act_t *actp, int nact, uint_t dir, uint_t afs, tmprule_t **rp, uint64_t *index, spd_stack_t *spds) argument 1035 ipsec_act_t *actp; local 2548 struct spd_ext_actions *actp; local [all...] |
H A D | ip.c | 6124 ipsec_act_t *actp = NULL; local 6237 ipsec_actvec_from_req(req, &actp, &nact, ipst->ips_netstack); 6238 if (actp == NULL) 6245 if (!ipsec_polhead_insert(ph, actp, nact, IPSEC_AF_V4, 6249 if (!ipsec_polhead_insert(ph, actp, nact, IPSEC_AF_V4, 6258 if (!ipsec_polhead_insert(ph, actp, nact, IPSEC_AF_V6, 6261 if (!ipsec_polhead_insert(ph, actp, nact, IPSEC_AF_V6, 6266 ipsec_actvec_free(actp, nact); 6293 if (actp != NULL) 6294 ipsec_actvec_free(actp, nac [all...] |
H A D | spd.c | 1370 ipsec_actvec_from_req(const ipsec_req_t *req, ipsec_act_t **actp, uint_t *nactp, argument 1383 *actp = ipsec_act_wildcard_expand(&act, nactp, ns); 3874 * Create and insert inbound or outbound policy associated with actp for the 3879 ipsec_polhead_insert(ipsec_policy_head_t *ph, ipsec_act_t *actp, uint_t nact, argument 3888 if ((pol = ipsec_policy_create(&sel, actp, nact, IPSEC_PRIO_SOCKET,
|