Lines Matching refs:c
1473 static int key_notify_sa(struct xfrm_state *x, const struct km_event *c) in key_notify_sa() argument
1485 hdr->sadb_msg_type = event2keytype(c->event); in key_notify_sa()
1489 hdr->sadb_msg_seq = c->seq; in key_notify_sa()
1490 hdr->sadb_msg_pid = c->portid; in key_notify_sa()
1502 struct km_event c; in pfkey_add() local
1523 c.event = XFRM_MSG_NEWSA; in pfkey_add()
1525 c.event = XFRM_MSG_UPDSA; in pfkey_add()
1526 c.seq = hdr->sadb_msg_seq; in pfkey_add()
1527 c.portid = hdr->sadb_msg_pid; in pfkey_add()
1528 km_state_notify(x, &c); in pfkey_add()
1538 struct km_event c; in pfkey_delete() local
1563 c.seq = hdr->sadb_msg_seq; in pfkey_delete()
1564 c.portid = hdr->sadb_msg_pid; in pfkey_delete()
1565 c.event = XFRM_MSG_DELSA; in pfkey_delete()
1566 km_state_notify(x, &c); in pfkey_delete()
1735 static int key_notify_sa_flush(const struct km_event *c) in key_notify_sa_flush() argument
1744 hdr->sadb_msg_satype = pfkey_proto2satype(c->data.proto); in key_notify_sa_flush()
1746 hdr->sadb_msg_seq = c->seq; in key_notify_sa_flush()
1747 hdr->sadb_msg_pid = c->portid; in key_notify_sa_flush()
1753 pfkey_broadcast(skb, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net); in key_notify_sa_flush()
1762 struct km_event c; in pfkey_flush() local
1777 c.data.proto = proto; in pfkey_flush()
1778 c.seq = hdr->sadb_msg_seq; in pfkey_flush()
1779 c.portid = hdr->sadb_msg_pid; in pfkey_flush()
1780 c.event = XFRM_MSG_FLUSHSA; in pfkey_flush()
1781 c.net = net; in pfkey_flush()
1782 km_state_notify(NULL, &c); in pfkey_flush()
2215 static int key_notify_policy(struct xfrm_policy *xp, int dir, const struct km_event *c) in key_notify_policy() argument
2234 if (c->data.byid && c->event == XFRM_MSG_DELPOLICY) in key_notify_policy()
2237 out_hdr->sadb_msg_type = event2poltype(c->event); in key_notify_policy()
2239 out_hdr->sadb_msg_seq = c->seq; in key_notify_policy()
2240 out_hdr->sadb_msg_pid = c->portid; in key_notify_policy()
2254 struct km_event c; in pfkey_spdadd() local
2344 c.event = XFRM_MSG_UPDPOLICY; in pfkey_spdadd()
2346 c.event = XFRM_MSG_NEWPOLICY; in pfkey_spdadd()
2348 c.seq = hdr->sadb_msg_seq; in pfkey_spdadd()
2349 c.portid = hdr->sadb_msg_pid; in pfkey_spdadd()
2351 km_policy_notify(xp, pol->sadb_x_policy_dir-1, &c); in pfkey_spdadd()
2369 struct km_event c; in pfkey_spddelete() local
2425 c.seq = hdr->sadb_msg_seq; in pfkey_spddelete()
2426 c.portid = hdr->sadb_msg_pid; in pfkey_spddelete()
2427 c.data.byid = 0; in pfkey_spddelete()
2428 c.event = XFRM_MSG_DELPOLICY; in pfkey_spddelete()
2429 km_policy_notify(xp, pol->sadb_x_policy_dir-1, &c); in pfkey_spddelete()
2654 struct km_event c; in pfkey_spdget() local
2674 c.seq = hdr->sadb_msg_seq; in pfkey_spdget()
2675 c.portid = hdr->sadb_msg_pid; in pfkey_spdget()
2676 c.data.byid = 1; in pfkey_spdget()
2677 c.event = XFRM_MSG_DELPOLICY; in pfkey_spdget()
2678 km_policy_notify(xp, dir, &c); in pfkey_spdget()
2757 static int key_notify_policy_flush(const struct km_event *c) in key_notify_policy_flush() argument
2767 hdr->sadb_msg_seq = c->seq; in key_notify_policy_flush()
2768 hdr->sadb_msg_pid = c->portid; in key_notify_policy_flush()
2774 pfkey_broadcast(skb_out, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net); in key_notify_policy_flush()
2782 struct km_event c; in pfkey_spdflush() local
2793 c.data.type = XFRM_POLICY_TYPE_MAIN; in pfkey_spdflush()
2794 c.event = XFRM_MSG_FLUSHPOLICY; in pfkey_spdflush()
2795 c.portid = hdr->sadb_msg_pid; in pfkey_spdflush()
2796 c.seq = hdr->sadb_msg_seq; in pfkey_spdflush()
2797 c.net = net; in pfkey_spdflush()
2798 km_policy_notify(NULL, 0, &c); in pfkey_spdflush()
2969 struct sadb_comb *c; in dump_ah_combs() local
2970 c = skb_put_zero(skb, sizeof(struct sadb_comb)); in dump_ah_combs()
2972 c->sadb_comb_auth = aalg->desc.sadb_alg_id; in dump_ah_combs()
2973 c->sadb_comb_auth_minbits = aalg->desc.sadb_alg_minbits; in dump_ah_combs()
2974 c->sadb_comb_auth_maxbits = aalg->desc.sadb_alg_maxbits; in dump_ah_combs()
2975 c->sadb_comb_hard_addtime = 24*60*60; in dump_ah_combs()
2976 c->sadb_comb_soft_addtime = 20*60*60; in dump_ah_combs()
2977 c->sadb_comb_hard_usetime = 8*60*60; in dump_ah_combs()
2978 c->sadb_comb_soft_usetime = 7*60*60; in dump_ah_combs()
2979 sz += sizeof(*c); in dump_ah_combs()
3010 struct sadb_comb *c; in dump_esp_combs() local
3018 c = skb_put(skb, sizeof(struct sadb_comb)); in dump_esp_combs()
3019 memset(c, 0, sizeof(*c)); in dump_esp_combs()
3021 c->sadb_comb_auth = aalg->desc.sadb_alg_id; in dump_esp_combs()
3022 c->sadb_comb_auth_minbits = aalg->desc.sadb_alg_minbits; in dump_esp_combs()
3023 c->sadb_comb_auth_maxbits = aalg->desc.sadb_alg_maxbits; in dump_esp_combs()
3024 c->sadb_comb_encrypt = ealg->desc.sadb_alg_id; in dump_esp_combs()
3025 c->sadb_comb_encrypt_minbits = ealg->desc.sadb_alg_minbits; in dump_esp_combs()
3026 c->sadb_comb_encrypt_maxbits = ealg->desc.sadb_alg_maxbits; in dump_esp_combs()
3027 c->sadb_comb_hard_addtime = 24*60*60; in dump_esp_combs()
3028 c->sadb_comb_soft_addtime = 20*60*60; in dump_esp_combs()
3029 c->sadb_comb_hard_usetime = 8*60*60; in dump_esp_combs()
3030 c->sadb_comb_soft_usetime = 7*60*60; in dump_esp_combs()
3031 sz += sizeof(*c); in dump_esp_combs()
3038 static int key_notify_policy_expire(struct xfrm_policy *xp, const struct km_event *c) in key_notify_policy_expire() argument
3043 static int key_notify_sa_expire(struct xfrm_state *x, const struct km_event *c) in key_notify_sa_expire() argument
3050 hard = c->data.hard; in key_notify_sa_expire()
3074 static int pfkey_send_notify(struct xfrm_state *x, const struct km_event *c) in pfkey_send_notify() argument
3076 struct net *net = x ? xs_net(x) : c->net; in pfkey_send_notify()
3082 switch (c->event) { in pfkey_send_notify()
3084 return key_notify_sa_expire(x, c); in pfkey_send_notify()
3088 return key_notify_sa(x, c); in pfkey_send_notify()
3090 return key_notify_sa_flush(c); in pfkey_send_notify()
3094 pr_err("pfkey: Unknown SA event %d\n", c->event); in pfkey_send_notify()
3101 static int pfkey_send_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c) in pfkey_send_policy_notify() argument
3106 switch (c->event) { in pfkey_send_policy_notify()
3108 return key_notify_policy_expire(xp, c); in pfkey_send_policy_notify()
3112 return key_notify_policy(xp, dir, c); in pfkey_send_policy_notify()
3114 if (c->data.type != XFRM_POLICY_TYPE_MAIN) in pfkey_send_policy_notify()
3116 return key_notify_policy_flush(c); in pfkey_send_policy_notify()
3118 pr_err("pfkey: Unknown policy event %d\n", c->event); in pfkey_send_policy_notify()
3136 static bool pfkey_is_alive(const struct km_event *c) in pfkey_is_alive() argument
3138 struct netns_pfkey *net_pfkey = net_generic(c->net, pfkey_net_id); in pfkey_is_alive()