Lines Matching defs:newsp

1304 key_insertsp(struct secpolicy *newsp)
1309 TAILQ_FOREACH(sp, &V_sptree[newsp->spidx.dir], chain) {
1310 if (newsp->priority < sp->priority) {
1311 TAILQ_INSERT_BEFORE(sp, newsp, chain);
1315 TAILQ_INSERT_TAIL(&V_sptree[newsp->spidx.dir], newsp, chain);
1317 LIST_INSERT_HEAD(SPHASH_HASH(newsp->id), newsp, idhash);
1318 newsp->state = IPSEC_SPSTATE_ALIVE;
1321 ipsec_accel_spdadd(newsp, NULL);
1554 struct secpolicy *newsp;
1565 if ((newsp = key_newsp()) == NULL) {
1570 newsp->spidx.dir = xpl0->sadb_x_policy_dir;
1571 newsp->policy = xpl0->sadb_x_policy_type;
1572 newsp->priority = xpl0->sadb_x_policy_priority;
1573 newsp->tcount = 0;
1593 key_freesp(&newsp);
1607 key_freesp(&newsp);
1612 if (newsp->tcount >= IPSEC_MAXREQ) {
1616 key_freesp(&newsp);
1627 key_freesp(&newsp);
1632 newsp->req[newsp->tcount++] = isr;
1644 key_freesp(&newsp);
1660 key_freesp(&newsp);
1691 key_freesp(&newsp);
1708 key_freesp(&newsp);
1727 key_freesp(&newsp);
1740 key_freesp(&newsp);
1754 key_freesp(&newsp);
1764 key_freesp(&newsp);
1777 key_freesp(&newsp);
1788 key_freesp(&newsp);
1797 if (newsp->tcount < 1) {
1800 key_freesp(&newsp);
1808 key_freesp(&newsp);
1814 return (newsp);
2038 struct secpolicy *newsp, *oldsp;
2132 if ((newsp = key_msg2sp(xpl0, PFKEY_EXTLEN(xpl0), &error)) == NULL) {
2140 newsp->lastused = newsp->created = time_second;
2141 newsp->lifetime = lft ? lft->sadb_lifetime_addtime : 0;
2142 newsp->validtime = lft ? lft->sadb_lifetime_usetime : 0;
2143 bcopy(&spidx, &newsp->spidx, sizeof(spidx));
2151 newsp->accel_ifname = malloc(sizeof(xof->sadb_x_if_hw_offl_if),
2153 if (newsp->accel_ifname == NULL) {
2156 key_freesp(&newsp);
2159 strncpy(__DECONST(char *, newsp->accel_ifname),
2167 if ((newsp->id = key_getnewspid()) == 0) {
2179 key_freesp(&newsp);
2184 key_insertsp(newsp);
2195 printf("%s: SP(%p)\n", __func__, newsp));
2196 KEYDBG(KEY_DATA, kdebug_secpolicy(newsp));
2237 xpl->sadb_x_policy_id = newsp->id;