Lines Matching defs:tdb
182 int pfkeyv2_sa_flush(struct tdb *, void *, int);
785 pfkeyv2_get(struct tdb *tdb, void **headers, void **buffer, int *lenp,
797 if (tdb->tdb_soft_allocations || tdb->tdb_soft_bytes ||
798 tdb->tdb_soft_timeout || tdb->tdb_soft_first_use)
801 if (tdb->tdb_exp_allocations || tdb->tdb_exp_bytes ||
802 tdb->tdb_exp_timeout || tdb->tdb_exp_first_use)
805 if (tdb->tdb_last_used)
808 i += sizeof(struct sadb_address) + PADUP(tdb->tdb_src.sa.sa_len);
809 i += sizeof(struct sadb_address) + PADUP(tdb->tdb_dst.sa.sa_len);
811 if (tdb->tdb_ids) {
812 i += sizeof(struct sadb_ident) + PADUP(tdb->tdb_ids->id_local->len);
813 i += sizeof(struct sadb_ident) + PADUP(tdb->tdb_ids->id_remote->len);
816 if (tdb->tdb_amxkey)
817 i += sizeof(struct sadb_key) + PADUP(tdb->tdb_amxkeylen);
819 if (tdb->tdb_emxkey)
820 i += sizeof(struct sadb_key) + PADUP(tdb->tdb_emxkeylen);
822 if (tdb->tdb_filter.sen_type) {
826 switch (tdb->tdb_filter.sen_type) {
843 if (tdb->tdb_onext) {
846 PADUP(tdb->tdb_onext->tdb_dst.sa.sa_len);
850 if (tdb->tdb_udpencap_port)
855 if (tdb->tdb_mtu > 0)
858 if (tdb->tdb_rdomain != tdb->tdb_rdomain_post)
862 if (tdb->tdb_tag)
864 if (tdb->tdb_tap)
868 if (ISSET(tdb->tdb_flags, TDBF_IFACE))
887 export_sa(&p, tdb); /* Export SA information (mostly flags) */
891 export_lifetime(&p, tdb, PFKEYV2_LIFETIME_CURRENT);
893 if (tdb->tdb_soft_allocations || tdb->tdb_soft_bytes ||
894 tdb->tdb_soft_first_use || tdb->tdb_soft_timeout) {
896 export_lifetime(&p, tdb, PFKEYV2_LIFETIME_SOFT);
899 if (tdb->tdb_exp_allocations || tdb->tdb_exp_bytes ||
900 tdb->tdb_exp_first_use || tdb->tdb_exp_timeout) {
902 export_lifetime(&p, tdb, PFKEYV2_LIFETIME_HARD);
905 if (tdb->tdb_last_used) {
907 export_lifetime(&p, tdb, PFKEYV2_LIFETIME_LASTUSE);
912 export_address(&p, &tdb->tdb_src.sa);
916 export_address(&p, &tdb->tdb_dst.sa);
919 if (tdb->tdb_ids)
920 export_identities(&p, tdb->tdb_ids, tdb->tdb_ids_swapped, headers);
923 if (tdb->tdb_amxkey) {
925 export_key(&p, tdb, PFKEYV2_AUTHENTICATION_KEY);
929 if (tdb->tdb_emxkey) {
931 export_key(&p, tdb, PFKEYV2_ENCRYPTION_KEY);
935 if (tdb->tdb_filter.sen_type)
936 export_flow(&p, IPSP_IPSEC_USE, &tdb->tdb_filter,
937 &tdb->tdb_filtermask, headers);
939 if (tdb->tdb_onext) {
941 export_sa(&p, tdb->tdb_onext);
943 export_address(&p, &tdb->tdb_onext->tdb_dst.sa);
945 export_satype(&p, tdb->tdb_onext);
949 if (tdb->tdb_udpencap_port) {
951 export_udpencap(&p, tdb);
955 export_replay(&p, tdb);
957 if (tdb->tdb_mtu > 0) {
959 export_mtu(&p, tdb);
963 if (tdb->tdb_rdomain != tdb->tdb_rdomain_post) {
965 export_rdomain(&p, tdb);
970 if (tdb->tdb_tag) {
972 export_tag(&p, tdb);
976 if (tdb->tdb_tap) {
978 export_tap(&p, tdb);
983 if (ISSET(tdb->tdb_flags, TDBF_IFACE)) {
985 export_iface(&p, tdb);
989 export_counter(&p, tdb);
1003 pfkeyv2_dump_walker(struct tdb *tdb, void *state, int last)
1012 (tdb->tdb_satype == dump_state->sadb_msg->sadb_msg_satype)) {
1017 if ((rval = pfkeyv2_get(tdb, headers, &buffer, &buflen, NULL)) != 0)
1026 tdb->tdb_rdomain);
1041 pfkeyv2_sa_flush(struct tdb *tdb, void *satype_vp, int last)
1044 tdb->tdb_satype == *((u_int8_t *) satype_vp))
1045 tdb_delete(tdb);
1136 struct tdb *sa1 = NULL, *sa2 = NULL;
1311 struct tdb *newsa;
1491 struct tdb *newsa;
1760 struct tdb *tdb1, *tdb2, *tdb3;
2356 pfkeyv2_expire(struct tdb *tdb, u_int16_t type)
2365 switch (tdb->tdb_sproto) {
2382 sizeof(struct sadb_address) + PADUP(tdb->tdb_src.sa.sa_len) +
2383 sizeof(struct sadb_address) + PADUP(tdb->tdb_dst.sa.sa_len);
2400 smsg->sadb_msg_satype = tdb->tdb_satype;
2408 export_sa(&p, tdb);
2411 export_lifetime(&p, tdb, PFKEYV2_LIFETIME_CURRENT);
2414 export_lifetime(&p, tdb, type == SADB_EXT_LIFETIME_SOFT ?
2418 export_address(&p, &tdb->tdb_src.sa);
2421 export_address(&p, &tdb->tdb_dst.sa);
2424 NULL, 0, 0, tdb->tdb_rdomain)) != 0)
2427 if (tdb->tdb_rdomain != tdb->tdb_rdomain_post)
2430 tdb->tdb_rdomain_post)) != 0)
2452 pfkeyv2_sysctl_walker(struct tdb *tdb, void *arg, int last)
2460 w->w_satype != tdb->tdb_satype)
2468 if ((error = pfkeyv2_get(tdb, headers, &buffer, &buflen,
2478 msg.sadb_msg_satype = tdb->tdb_satype;
2495 if ((error = pfkeyv2_get(tdb, NULL, NULL, &buflen, NULL)) != 0)