Lines Matching defs:NULL

140 	struct in6_addr *saddr = NULL, *final_p, final;
299 ip6_dst_store(sk, dst, NULL, NULL);
543 IPPROTO_TCP)) == NULL)
715 ahash_request_set_crypt(hp->req, &sg, NULL,
735 ahash_request_set_crypt(hp.req, NULL, md5_hash, 0);
779 ahash_request_set_crypt(hp.req, NULL, md5_hash, 0);
828 return NULL;
985 fl6.flowi6_uid = sock_net_uid(net, sk && sk_fullsock(sk) ? sk : NULL);
993 dst = ip6_dst_lookup_flow(net, sk, &fl6, NULL); /*sk's xfrm_policy can be referred*/
995 dst = ip6_dst_lookup_flow(net, ctl_sk, &fl6, NULL);
998 ip6_xmit(ctl_sk, buff, &fl6, fl6.flowi6_mark, NULL,
1013 const __u8 *md5_hash_location = NULL;
1028 struct sock *sk1 = NULL;
1034 /* If sk not NULL, it means we did a successful lookup and incoming
1071 NULL, 0, &ipv6h->saddr, th->source,
1087 genhash = tcp_v6_md5_hash_skb(newhash, key.md5_key, NULL, skb);
1169 if (tcp_parse_auth_options(tcp_hdr(skb), NULL, &aoh))
1223 if (tcp_parse_auth_options(tcp_hdr(skb), NULL, &aoh))
1325 __IP6_INC_STATS(sock_net(sk), NULL, IPSTATS_MIB_INHDRERRORS);
1376 return NULL;
1395 newnp->ipv6_mc_list = NULL;
1396 newnp->ipv6_ac_list = NULL;
1397 newnp->ipv6_fl_list = NULL;
1398 newnp->pktoptions = NULL;
1399 newnp->opt = NULL;
1443 ip6_dst_store(newsk, dst, NULL, NULL);
1463 newinet->inet_opt = NULL;
1464 newnp->ipv6_mc_list = NULL;
1465 newnp->ipv6_ac_list = NULL;
1466 newnp->ipv6_fl_list = NULL;
1471 newnp->pktoptions = NULL;
1472 newnp->opt = NULL;
1551 ireq->pktopts = NULL;
1562 newsk = NULL;
1574 return NULL;
1591 struct sk_buff *opt_skb = NULL;
1638 dst, sk->sk_rx_dst_cookie) == NULL) {
1639 RCU_INIT_POINTER(sk->sk_rx_dst, NULL);
1716 opt_skb = xchg(&np->pktoptions, NULL);
1833 nsk = NULL;
1885 drop_reason = tcp_inbound_hash(sk, NULL, skb, &hdr->saddr, &hdr->daddr,
1900 skb->dev = NULL;
1926 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
1939 tcp_v6_send_reset(NULL, skb);
1954 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
2365 .h.hashinfo = NULL,