Lines Matching defs:sav

139 	struct secasvar *sav = NULL;
184 if ((sav = key_allocsa(AF_INET,
194 printf("DP ah4_input called to allocate SA:%p\n", sav));
195 if (sav->state != SADB_SASTATE_MATURE
196 && sav->state != SADB_SASTATE_DYING) {
204 algo = ah_algorithm_lookup(sav->alg_auth);
213 siz = (*algo->sumsiz)(sav);
222 sizoff = (sav->flags & SADB_X_EXT_OLD) ? 0 : 4;
290 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
291 if (ipsec_chkreplay(ntohl(((struct newah *)ah)->ah_seq), sav))
297 ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));
320 if (ah4_calccksum(m, (caddr_t)cksum, siz1, algo, sav)) {
325 IPSEC_STAT_INCREMENT(ipsecstat.in_ahhist[sav->alg_auth]);
335 if (sav->flags & SADB_X_EXT_OLD) {
346 ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));
367 sizoff = (sav->flags & SADB_X_EXT_OLD) ? 0 : 4;
405 ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));
413 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
414 if (ipsec_updatereplay(ntohl(((struct newah *)ah)->ah_seq), sav)) {
421 if (sav->flags & SADB_X_EXT_OLD) {
428 if (ipsec4_tunnel_validate(m, off + stripsiz, nxt, sav, &ifamily)) {
443 "in IPv4 AH input: %s\n", ipsec_logsastr(sav)));
458 if (!key_checktunnelsanity(sav, AF_INET,
462 ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));
491 key_sa_recordxfer(sav, m);
577 key_sa_recordxfer(sav, m);
599 if (sav) {
601 printf("DP ah4_input call free SA:%p\n", sav));
602 key_freesav(sav, KEY_SADB_UNLOCKED);
608 if (sav) {
610 printf("DP ah4_input call free SA:%p\n", sav));
611 key_freesav(sav, KEY_SADB_UNLOCKED);
633 struct secasvar *sav = NULL;
665 if ((sav = key_allocsa(AF_INET6,
675 printf("DP ah6_input called to allocate SA:%p\n", sav));
676 if (sav->state != SADB_SASTATE_MATURE
677 && sav->state != SADB_SASTATE_DYING) {
685 algo = ah_algorithm_lookup(sav->alg_auth);
694 siz = (*algo->sumsiz)(sav);
703 sizoff = (sav->flags & SADB_X_EXT_OLD) ? 0 : 4;
743 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
744 if (ipsec_chkreplay(ntohl(((struct newah *)ah)->ah_seq), sav))
751 ipsec_logsastr(sav)));
768 if (ah6_calccksum(m, (caddr_t)cksum, siz1, algo, sav)) {
773 IPSEC_STAT_INCREMENT(ipsec6stat.in_ahhist[sav->alg_auth]);
778 if (sav->flags & SADB_X_EXT_OLD) {
789 ipsec6_logpacketstr(ip6, spi), ipsec_logsastr(sav)));
810 sizoff = (sav->flags & SADB_X_EXT_OLD) ? 0 : 4;
841 ipsec6_logpacketstr(ip6, spi), ipsec_logsastr(sav)));
849 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
850 if (ipsec_updatereplay(ntohl(((struct newah *)ah)->ah_seq), sav)) {
857 if (sav->flags & SADB_X_EXT_OLD) {
864 if (ipsec6_tunnel_validate(m, off + stripsiz, nxt, sav)) {
893 if (!key_checktunnelsanity(sav, AF_INET6,
898 ipsec_logsastr(sav)));
912 key_sa_recordxfer(sav, m);
995 key_sa_recordxfer(sav, m);
1005 if (sav) {
1007 printf("DP ah6_input call free SA:%p\n", sav));
1008 key_freesav(sav, KEY_SADB_UNLOCKED);
1014 if (sav) {
1016 printf("DP ah6_input call free SA:%p\n", sav));
1017 key_freesav(sav, KEY_SADB_UNLOCKED);
1032 struct secasvar *sav;
1085 sav = key_allocsa(AF_INET6,
1089 if (sav) {
1090 if (sav->state == SADB_SASTATE_MATURE ||
1091 sav->state == SADB_SASTATE_DYING)
1093 key_freesav(sav, KEY_SADB_UNLOCKED);