Lines Matching refs:sav
1268 ipsec_chkreplay(uint32_t seq, uint32_t *seqhigh, struct secasvar *sav)
1276 IPSEC_ASSERT(sav != NULL, ("Null SA"));
1277 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state"));
1279 replay = sav->replay;
1325 if (tl == 0xffffffff && !(sav->flags & SADB_X_SAFLAGS_ESN)) {
1329 if ((sav->flags & SADB_X_EXT_CYCSEQ) == 0) {
1330 if (sav->sah->saidx.proto == IPPROTO_ESP)
1332 else if (sav->sah->saidx.proto == IPPROTO_AH)
1340 ipsec_sa2str(sav, buf, sizeof(buf))));
1374 if ((sav->flags & SADB_X_EXT_CYCSEQ) == 0) {
1375 if (sav->sah->saidx.proto == IPPROTO_ESP)
1377 else if (sav->sah->saidx.proto == IPPROTO_AH)
1385 ipsec_sa2str(sav, buf, sizeof(buf))));
1398 ipsec_updatereplay(uint32_t seq, struct secasvar *sav)
1405 IPSEC_ASSERT(sav != NULL, ("Null SA"));
1406 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state"));
1408 replay = sav->replay;
1455 if (!(sav->flags & SADB_X_SAFLAGS_ESN)) {
1503 ipsec_updateid(struct secasvar *sav, crypto_session_t *new,
1522 * For first failed request *old == sav->tdb_cryptoid, then
1523 * we update sav->tdb_cryptoid and redo crypto_dispatch().
1524 * For next failed request *old != sav->tdb_cryptoid, then
1533 __func__, sav, *old, *new));
1534 KEYDBG(IPSEC_DATA, kdebug_secasv(sav));
1535 SECASVAR_WLOCK(sav);
1536 if (sav->tdb_cryptoid != *old) {
1539 *new = sav->tdb_cryptoid;
1541 SECASVAR_WUNLOCK(sav);
1544 sav->tdb_cryptoid = *new;
1545 SECASVAR_WUNLOCK(sav);