Lines Matching defs:xpl0
1824 _key_msg2sp(const struct sadb_x_policy *xpl0, size_t len, int *error,
1830 KASSERT(xpl0 != NULL);
1831 KASSERT(len >= sizeof(*xpl0));
1833 if (len != PFKEY_EXTLEN(xpl0)) {
1845 newsp->spidx.dir = xpl0->sadb_x_policy_dir;
1846 newsp->policy = xpl0->sadb_x_policy_type;
1849 switch (xpl0->sadb_x_policy_type) {
1876 if (PFKEY_EXTLEN(xpl0) < sizeof(*xpl0)) {
1882 tlen = PFKEY_EXTLEN(xpl0) - sizeof(*xpl0);
1883 xisr = (const struct sadb_x_ipsecrequest *)(xpl0 + 1);
2047 key_msg2sp(const struct sadb_x_policy *xpl0, size_t len, int *error)
2050 return _key_msg2sp(xpl0, len, error, false);
2210 const struct sadb_x_policy *xpl0;
2239 xpl0 = mhp->ext[SADB_X_EXT_POLICY];
2242 switch (xpl0->sadb_x_policy_dir) {
2253 if (xpl0->sadb_x_policy_type == IPSEC_POLICY_ENTRUST ||
2254 xpl0->sadb_x_policy_type == IPSEC_POLICY_BYPASS) {
2261 xpl0->sadb_x_policy_type == IPSEC_POLICY_IPSEC &&
2262 mhp->extlen[SADB_X_EXT_POLICY] <= sizeof(*xpl0)) {
2302 newsp = _key_msg2sp(xpl0, PFKEY_EXTLEN(xpl0), &error, from_kernel);
2505 struct sadb_x_policy *xpl0;
2522 xpl0 = mhp->ext[SADB_X_EXT_POLICY];
2525 switch (xpl0->sadb_x_policy_dir) {
2545 xpl0->sadb_x_policy_id = sp->id;
5339 const struct sadb_x_policy *xpl0;
5345 xpl0 = mhp->ext[SADB_X_EXT_POLICY];
5348 spidx->dir = xpl0->sadb_x_policy_dir;