Symbol: sadb_msg
lib/libipsec/libpfkey.h
34
struct sadb_msg;
lib/libipsec/libpfkey.h
35
extern void pfkey_sadump(struct sadb_msg *);
lib/libipsec/libpfkey.h
36
extern void pfkey_spdump(struct sadb_msg *);
lib/libipsec/libpfkey.h
61
int pfkey_set_supported(struct sadb_msg *, int);
lib/libipsec/libpfkey.h
84
struct sadb_msg *pfkey_recv(int);
lib/libipsec/libpfkey.h
85
int pfkey_send(int, struct sadb_msg *, int);
lib/libipsec/libpfkey.h
86
int pfkey_align(struct sadb_msg *, caddr_t *);
lib/libipsec/pfkey.c
1032
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
1102
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
1124
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1213
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
1241
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
1248
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1296
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
1324
len = sizeof(struct sadb_msg);
lib/libipsec/pfkey.c
1326
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1356
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
1389
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
1397
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1442
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
1449
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
1452
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1560
struct sadb_msg *
lib/libipsec/pfkey.c
1563
struct sadb_msg buf, *newmsg;
lib/libipsec/pfkey.c
1581
if ((newmsg = CALLOC(reallen, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
1618
pfkey_send(int so, struct sadb_msg *msg, int len)
lib/libipsec/pfkey.c
1644
pfkey_align(struct sadb_msg *msg, caddr_t *mhp)
lib/libipsec/pfkey.c
1668
p += sizeof(struct sadb_msg);
lib/libipsec/pfkey.c
1753
struct sadb_msg *msg;
lib/libipsec/pfkey.c
1761
msg = (struct sadb_msg *)mhp[0];
lib/libipsec/pfkey.c
1865
struct sadb_msg *p;
lib/libipsec/pfkey.c
1868
p = (struct sadb_msg *)buf;
lib/libipsec/pfkey.c
1869
len = sizeof(struct sadb_msg);
lib/libipsec/pfkey.c
336
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
369
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
381
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
529
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
557
len = sizeof(struct sadb_msg)
lib/libipsec/pfkey.c
563
if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
lib/libipsec/pfkey.c
666
struct sadb_msg *newmsg;
lib/libipsec/pfkey.c
702
pfkey_set_supported(struct sadb_msg *msg, int tlen)
lib/libipsec/pfkey.c
717
p += sizeof(struct sadb_msg);
lib/libipsec/pfkey_dump.c
200
pfkey_sadump(struct sadb_msg *m)
lib/libipsec/pfkey_dump.c
346
p += sizeof(struct sadb_msg);
lib/libipsec/pfkey_dump.c
432
pfkey_spdump(struct sadb_msg *m)
lib/libipsec/test-policy.c
231
struct sadb_msg *m;
lib/libipsec/test-policy.c
322
struct sadb_msg *msg;
sbin/setkey/parse.y
1068
struct sadb_msg *msg;
sbin/setkey/parse.y
1085
msg = (struct sadb_msg *)buf;
sbin/setkey/parse.y
1092
l = sizeof(struct sadb_msg);
sbin/setkey/parse.y
225
struct sadb_msg msg;
sbin/setkey/parse.y
235
struct sadb_msg msg;
sbin/setkey/parse.y
642
struct sadb_msg msg;
sbin/setkey/parse.y
652
struct sadb_msg msg;
sbin/setkey/parse.y
815
setkeymsg0(struct sadb_msg *msg, unsigned type, unsigned satype, size_t l)
sbin/setkey/parse.y
83
int setkeymsg0(struct sadb_msg *, unsigned int, unsigned int, size_t);
sbin/setkey/parse.y
851
struct sadb_msg *msg;
sbin/setkey/parse.y
862
msg = (struct sadb_msg *)buf;
sbin/setkey/parse.y
869
l = sizeof(struct sadb_msg);
sbin/setkey/parse.y
950
struct sadb_msg *msg;
sbin/setkey/parse.y
963
msg = (struct sadb_msg *)buf;
sbin/setkey/parse.y
970
l = sizeof(struct sadb_msg);
sbin/setkey/setkey.c
251
struct sadb_msg msg;
sbin/setkey/setkey.c
270
struct sadb_msg msg;
sbin/setkey/setkey.c
289
struct sadb_msg *base;
sbin/setkey/setkey.c
299
base = (struct sadb_msg *)rbuf;
sbin/setkey/setkey.c
338
struct sadb_msg *msg;
sbin/setkey/setkey.c
356
kdebug_sadb((struct sadb_msg *)buf);
sbin/setkey/setkey.c
377
msg = (struct sadb_msg *)rbuf;
sbin/setkey/setkey.c
390
kdebug_sadb((struct sadb_msg *)rbuf);
sbin/setkey/setkey.c
408
postproc(struct sadb_msg *msg)
sbin/setkey/setkey.c
464
msg = (struct sadb_msg *)((caddr_t)msg +
sbin/setkey/setkey.c
467
kdebug_sadb((struct sadb_msg *)msg);
sbin/setkey/setkey.c
475
msg = (struct sadb_msg *)((caddr_t)msg +
sbin/setkey/setkey.c
478
kdebug_sadb((struct sadb_msg *)msg);
sbin/setkey/setkey.c
529
shortdump(struct sadb_msg *msg)
sbin/setkey/setkey.c
65
int postproc(struct sadb_msg *);
sbin/setkey/setkey.c
68
void shortdump(struct sadb_msg *);
sbin/setkey/test-pfkey.c
116
pfkey_sadump((struct sadb_msg *)m_buf);
sbin/setkey/test-pfkey.c
128
pfkey_sadump((struct sadb_msg *)rbuf);
sbin/setkey/test-pfkey.c
139
struct sadb_msg m_msg;
sbin/setkey/test-pfkey.c
152
m_len = sizeof(struct sadb_msg);
sbin/setkey/test-pfkey.c
267
((struct sadb_msg *)m_buf)->sadb_msg_len = PFKEY_UNIT64(m_len);
sys/netipsec/key.c
1968
len = PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
1977
m_copydata(m, 0, sizeof(struct sadb_msg),
sys/netipsec/key.c
2202
struct sadb_msg *newmsg;
sys/netipsec/key.c
2223
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
2228
mpolicy = m_pulldown(n, PFKEY_ALIGN8(sizeof(struct sadb_msg)),
sys/netipsec/key.c
2377
struct sadb_msg *newmsg;
sys/netipsec/key.c
2385
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
2449
struct sadb_msg *newmsg;
sys/netipsec/key.c
2453
len = PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
2463
m_copydata(m, 0, sizeof(struct sadb_msg), mtod(n, caddr_t) + off);
sys/netipsec/key.c
2464
off += PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
2480
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
2597
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
2619
struct sadb_msg *newmsg;
sys/netipsec/key.c
2628
if (m->m_len != PFKEY_ALIGN8(sizeof(struct sadb_msg)))
sys/netipsec/key.c
2658
if (sizeof(struct sadb_msg) > m->m_len + M_TRAILINGSPACE(m)) {
sys/netipsec/key.c
2666
m->m_pkthdr.len = m->m_len = PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
2667
newmsg = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
2806
if (result->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
2807
result = m_pullup(result, sizeof(struct sadb_msg));
sys/netipsec/key.c
2816
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
2943
if (result->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
2944
result = m_pullup(result, sizeof(struct sadb_msg));
sys/netipsec/key.c
2955
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
387
[SADB_EXT_RESERVED] = sizeof(struct sadb_msg),
sys/netipsec/key.c
3954
if (result->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
3955
result = m_pullup(result, sizeof(struct sadb_msg));
sys/netipsec/key.c
3964
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
3983
struct sadb_msg *p;
sys/netipsec/key.c
3986
len = PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
3995
p = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
423
[SADB_EXT_RESERVED] = sizeof(struct sadb_msg),
sys/netipsec/key.c
5167
struct sadb_msg *newmsg;
sys/netipsec/key.c
5171
len = PFKEY_ALIGN8(sizeof(struct sadb_msg)) +
sys/netipsec/key.c
5184
m_copydata(m, 0, sizeof(struct sadb_msg), mtod(n, caddr_t) + off);
sys/netipsec/key.c
5185
off += PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
5204
if (n->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
5205
n = m_pullup(n, sizeof(struct sadb_msg));
sys/netipsec/key.c
5214
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
607
struct sadb_msg *msg;
sys/netipsec/key.c
6267
if (n->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
6268
n = m_pullup(n, sizeof(struct sadb_msg));
sys/netipsec/key.c
6272
mtod(n, struct sadb_msg *)->sadb_msg_errno = 0;
sys/netipsec/key.c
6273
mtod(n, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
6370
struct sadb_msg *newmsg;
sys/netipsec/key.c
6378
if (n->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
6379
n = m_pullup(n, sizeof(struct sadb_msg));
sys/netipsec/key.c
6383
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
6432
struct sadb_msg *newmsg;
sys/netipsec/key.c
6440
if (n->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
6441
n = m_pullup(n, sizeof(struct sadb_msg));
sys/netipsec/key.c
6445
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
7081
if (result->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
7082
result = m_pullup(result, sizeof(struct sadb_msg));
sys/netipsec/key.c
7093
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
7304
if (mhp->msg->sadb_msg_len == PFKEY_UNIT64(sizeof(struct sadb_msg))) {
sys/netipsec/key.c
7461
struct sadb_msg *newmsg;
sys/netipsec/key.c
7484
len = sizeof(struct sadb_msg) + alen + elen;
sys/netipsec/key.c
7497
m_copydata(m, 0, sizeof(struct sadb_msg), mtod(n, caddr_t) + off);
sys/netipsec/key.c
7498
newmsg = mtod(n, struct sadb_msg *);
sys/netipsec/key.c
7501
off += PFKEY_ALIGN8(sizeof(struct sadb_msg));
sys/netipsec/key.c
7722
if (result->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
7723
result = m_pullup(result, sizeof(struct sadb_msg));
sys/netipsec/key.c
7734
mtod(result, struct sadb_msg *)->sadb_msg_len =
sys/netipsec/key.c
7791
struct sadb_msg *newmsg;
sys/netipsec/key.c
7876
if (m->m_len < sizeof(struct sadb_msg) ||
sys/netipsec/key.c
7877
sizeof(struct sadb_msg) > m->m_len + M_TRAILINGSPACE(m)) {
sys/netipsec/key.c
7885
m->m_pkthdr.len = m->m_len = sizeof(struct sadb_msg);
sys/netipsec/key.c
7886
newmsg = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
8005
if (olen < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
8012
} else if (olen == sizeof(struct sadb_msg)) {
sys/netipsec/key.c
8034
m_adj(m, PFKEY_ALIGN8(sizeof(struct sadb_msg)));
sys/netipsec/key.c
8082
struct sadb_msg *msg;
sys/netipsec/key.c
8091
if (m->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/key.c
8092
m = m_pullup(m, sizeof(struct sadb_msg));
sys/netipsec/key.c
8096
msg = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
8331
struct sadb_msg *msg;
sys/netipsec/key.c
8333
IPSEC_ASSERT(m->m_len >= sizeof(struct sadb_msg),
sys/netipsec/key.c
8336
msg = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
8357
IPSEC_ASSERT(m->m_len >= sizeof(struct sadb_msg),
sys/netipsec/key.c
8363
mhp->msg = mtod(m, struct sadb_msg *);
sys/netipsec/key.c
8368
for (off = sizeof(struct sadb_msg); off < end; off += extlen) {
sys/netipsec/key.h
45
struct sadb_msg;
sys/netipsec/key_debug.c
169
kdebug_sadb(struct sadb_msg *base)
sys/netipsec/key_debug.c
186
tlen = PFKEY_UNUNIT64(base->sadb_msg_len) - sizeof(struct sadb_msg);
sys/netipsec/key_debug.c
187
ext = (struct sadb_ext *)((caddr_t)base + sizeof(struct sadb_msg));
sys/netipsec/key_debug.h
70
struct sadb_msg;
sys/netipsec/key_debug.h
72
extern void kdebug_sadb(struct sadb_msg *);
sys/netipsec/keysock.c
106
if (len < sizeof(struct sadb_msg)) {
sys/netipsec/keysock.c
112
if (m->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/keysock.c
113
if ((m = m_pullup(m, sizeof(struct sadb_msg))) == NULL) {
sys/netipsec/keysock.c
124
msg = mtod(m, struct sadb_msg *);
sys/netipsec/keysock.c
148
struct sadb_msg *pmsg;
sys/netipsec/keysock.c
150
M_PREPEND(m, sizeof(struct sadb_msg), M_NOWAIT);
sys/netipsec/keysock.c
155
pmsg = mtod(m, struct sadb_msg *);
sys/netipsec/keysock.c
192
if (m->m_len < sizeof(struct sadb_msg)) {
sys/netipsec/keysock.c
193
m = m_pullup(m, sizeof(struct sadb_msg));
sys/netipsec/keysock.c
199
if (m->m_len >= sizeof(struct sadb_msg)) {
sys/netipsec/keysock.c
200
struct sadb_msg *msg;
sys/netipsec/keysock.c
201
msg = mtod(m, struct sadb_msg *);
sys/netipsec/keysock.c
92
struct sadb_msg *msg;