Lines Matching refs:sav
1182 ipsec_chkreplay(uint32_t seq, struct secasvar *sav)
1188 IPSEC_ASSERT(sav != NULL, ("Null SA"));
1189 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state"));
1191 replay = sav->replay;
1236 ipsec_updatereplay(uint32_t seq, struct secasvar *sav)
1243 IPSEC_ASSERT(sav != NULL, ("Null SA"));
1244 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state"));
1246 replay = sav->replay;
1300 if ((sav->flags & SADB_X_EXT_CYCSEQ) == 0) {
1301 if (sav->sah->saidx.proto == IPPROTO_AH)
1303 else if (sav->sah->saidx.proto == IPPROTO_ESP)
1310 ipsec_sa2str(sav, buf, sizeof(buf))));
1318 ipsec_updateid(struct secasvar *sav, uint64_t *new, uint64_t *old)
1336 * For first failed request *old == sav->tdb_cryptoid, then
1337 * we update sav->tdb_cryptoid and redo crypto_dispatch().
1338 * For next failed request *old != sav->tdb_cryptoid, then
1347 __func__, sav, (uintmax_t)(*old), (uintmax_t)(*new)));
1348 KEYDBG(IPSEC_DATA, kdebug_secasv(sav));
1349 SECASVAR_LOCK(sav);
1350 if (sav->tdb_cryptoid != *old) {
1353 *new = sav->tdb_cryptoid;
1355 SECASVAR_UNLOCK(sav);
1358 sav->tdb_cryptoid = *new;
1359 SECASVAR_UNLOCK(sav);