• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netinet6/

Lines Matching refs:NULL

272  * OUT:	NULL:	no apropreate SP found, the following value is set to error.
288 struct inpcbpolicy *pcbsp = NULL;
289 struct secpolicy *currsp = NULL; /* policy on socket */
290 struct secpolicy *kernsp = NULL; /* policy on kernel */
294 if (m == NULL || so == NULL || error == NULL)
295 panic("ipsec4_getpolicybysock: NULL pointer was passed.\n");
297 if (so->so_pcb == NULL) {
298 printf("ipsec4_getpolicybysock: so->so_pcb == NULL\n");
336 return NULL;
340 if (pcbsp == NULL)
341 panic("ipsec4_getpolicybysock: pcbsp is NULL.\n");
355 if (currsp == NULL)
356 panic("ipsec4_getpolicybysock: currsp is NULL.\n");
374 if (kernsp != NULL) {
411 return NULL;
421 if (kernsp != NULL) {
438 return NULL;
468 return NULL;
477 * NULL: no apropreate SP found, the following value is set to error.
490 struct secpolicy *sp = NULL;
498 if (m == NULL || error == NULL)
499 panic("ipsec4_getpolicybyaddr: NULL pointer was passed.\n");
513 return NULL;
520 if (sp != NULL) {
549 * OUT: NULL: no apropreate SP found, the following value is set to error.
563 struct inpcbpolicy *pcbsp = NULL;
564 struct secpolicy *currsp = NULL; /* policy on socket */
565 struct secpolicy *kernsp = NULL; /* policy on kernel */
570 if (m == NULL || so == NULL || error == NULL)
571 panic("ipsec6_getpolicybysock: NULL pointer was passed.\n");
588 if (pcbsp == NULL)
589 panic("ipsec6_getpolicybysock: pcbsp is NULL.\n");
603 if (currsp == NULL)
604 panic("ipsec6_getpolicybysock: currsp is NULL.\n");
621 if (kernsp != NULL) {
654 return NULL;
664 if (kernsp != NULL) {
679 return NULL;
707 return NULL;
718 * NULL: no apropreate SP found, the following value is set to error.
735 struct secpolicy *sp = NULL;
740 if (m == NULL || error == NULL)
741 panic("ipsec6_getpolicybyaddr: NULL pointer was passed.\n");
753 return NULL;
759 if (sp != NULL) {
803 if (spidx == NULL || m == NULL)
804 panic("ipsec_setspidx_mbuf: NULL pointer was passed.\n");
833 if (pcb == NULL)
835 if (pcb->inp_sp == NULL)
837 if (pcb->inp_sp->sp_out == NULL || pcb->inp_sp->sp_in == NULL)
873 if (pcb == NULL)
875 if (pcb->in6p_sp == NULL)
877 if (pcb->in6p_sp->sp_out == NULL || pcb->in6p_sp->sp_in == NULL)
915 struct ip *ip = NULL;
922 if (m == NULL)
1005 if (m == NULL)
1006 panic("ipsec4_get_ulp: NULL pointer was passed.\n");
1074 struct ip *ip = NULL;
1113 if (m == NULL)
1114 panic("ipsec6_get_ulp: NULL pointer was passed.\n");
1164 struct ip6_hdr *ip6 = NULL;
1226 if (so == NULL || pcb_sp == NULL)
1227 panic("ipsec_init_policy: NULL pointer was passed.\n");
1230 if (new == NULL) {
1239 if (so->so_cred != 0 && !suser(so->so_cred->pc_ucred, NULL))
1245 if ((new->sp_in = key_newsp()) == NULL) {
1252 if ((new->sp_out = key_newsp()) == NULL) {
1299 struct ipsecrequest *newchain = NULL;
1305 if (src == NULL)
1306 return NULL;
1308 if (dst == NULL)
1309 return NULL;
1319 if (*q == NULL)
1322 (*q)->next = NULL;
1348 p = NULL;
1351 return NULL;
1364 struct secpolicy *newsp = NULL;
1368 if (pcb_sp == NULL || *pcb_sp == NULL || request == NULL)
1389 if ((newsp = key_msg2sp(xpl, len, &error)) == NULL)
1412 if (pcb_sp == NULL || mp == NULL)
1442 if (inp == NULL || request == NULL)
1448 if (inp->inp_sp == NULL) {
1489 if (inp == NULL || request == NULL || mp == NULL)
1495 if (inp->inp_sp == NULL) {
1525 if (inp == NULL)
1526 panic("ipsec4_delete_pcbpolicy: NULL pointer was passed.\n");
1528 if (inp->inp_sp == NULL)
1531 if (inp->inp_sp->sp_in != NULL) {
1533 inp->inp_sp->sp_in = NULL;
1536 if (inp->inp_sp->sp_out != NULL) {
1538 inp->inp_sp->sp_out = NULL;
1542 inp->inp_sp = NULL;
1561 if (in6p == NULL || request == NULL)
1567 if (in6p->in6p_sp == NULL) {
1606 if (in6p == NULL || request == NULL || mp == NULL)
1612 if (in6p->in6p_sp == NULL) {
1641 if (in6p == NULL)
1642 panic("ipsec6_delete_pcbpolicy: NULL pointer was passed.\n");
1644 if (in6p->in6p_sp == NULL)
1647 if (in6p->in6p_sp->sp_in != NULL) {
1649 in6p->in6p_sp->sp_in = NULL;
1652 if (in6p->in6p_sp->sp_out != NULL) {
1654 in6p->in6p_sp->sp_out = NULL;
1658 in6p->in6p_sp = NULL;
1676 if (isr == NULL || isr->sp == NULL)
1677 panic("ipsec_get_reqlevel: NULL pointer is passed.\n");
1807 for (isr = sp->req; isr != NULL; isr = isr->next) {
1828 if (isr->sav != NULL
1873 struct secpolicy *sp = NULL;
1879 if (m == NULL)
1886 if (so == NULL)
1891 if (sp == NULL)
1910 if (inp == NULL)
1911 return ipsec4_in_reject_so(m, NULL);
1932 struct secpolicy *sp = NULL;
1938 if (m == NULL)
1945 if (so == NULL)
1950 if (sp == NULL)
1968 if (in6p == NULL)
1969 return ipsec6_in_reject_so(m, NULL);
2015 for (isr = sp->req; isr != NULL; isr = isr->next) {
2065 struct secpolicy *sp = NULL;
2071 if (m == NULL)
2073 if (inp != NULL && inp->inp_socket == NULL)
2074 panic("ipsec4_hdrsize: why is socket NULL but there is PCB.");
2080 if (inp == NULL)
2085 if (sp == NULL)
2108 struct secpolicy *sp = NULL;
2114 if (m == NULL)
2116 if (in6p != NULL && in6p->in6p_socket == NULL)
2117 panic("ipsec6_hdrsize: why is socket NULL but there is PCB.");
2121 if (in6p == NULL)
2126 if (sp == NULL)
2452 if (sav == NULL)
2453 panic("ipsec_chkreplay: NULL pointer was passed.\n");
2524 if (sav == NULL)
2525 panic("ipsec_chkreplay: NULL pointer was passed.\n");
2775 struct ip *ip = NULL;
2776 struct ipsecrequest *isr = NULL;
2778 struct secasvar *sav = NULL;
2786 panic("state == NULL in ipsec4_output");
2788 panic("state->m == NULL in ipsec4_output");
2790 panic("state->ro == NULL in ipsec4_output");
2792 panic("state->dst == NULL in ipsec4_output");
2800 for (isr = sp->req; isr != NULL; isr = isr->next) {
2879 if (sav == NULL) {
2928 state->m = NULL;
2940 state->ro->ro_rt = NULL;
2970 state->m = NULL;
2976 state->m = NULL;
2982 state->m = NULL;
2988 state->m = NULL;
2997 state->m = NULL;
3018 state->m = NULL;
3038 struct ipsecrequest *isr = NULL;
3043 struct secasvar *sav = NULL;
3048 panic("state == NULL in ipsec6_output_trans");
3050 panic("state->m == NULL in ipsec6_output_trans");
3052 panic("nexthdrp == NULL in ipsec6_output_trans");
3054 panic("mprev == NULL in ipsec6_output_trans");
3056 panic("sp == NULL in ipsec6_output_trans");
3058 panic("tun == NULL in ipsec6_output_trans");
3124 state->m = NULL; /* icmp6_error freed the mbuf */
3129 if (sav == NULL) {
3174 state->m = NULL;
3190 if (isr != NULL)
3201 state->m = NULL;
3216 struct ipsecrequest *isr = NULL;
3218 struct secasvar *sav = NULL;
3228 panic("state == NULL in ipsec6_output_tunnel");
3230 panic("state->m == NULL in ipsec6_output_tunnel");
3232 panic("sp == NULL in ipsec6_output_tunnel");
3303 if (sav == NULL) {
3346 struct route *ro4 = NULL;
3374 ro4->ro_rt = NULL;
3376 if (ro4->ro_rt == NULL) {
3382 if (ro4->ro_rt == NULL) {
3397 state->m = NULL;
3404 state->m = NULL;
3410 state->m = NULL;
3416 state->m = NULL;
3425 state->m = NULL;
3436 ip_output(state->m, NULL, ro4, 0, NULL, NULL);
3437 state->m = NULL;
3455 state->ro->ro_rt = NULL;
3509 state->m = NULL;
3533 state->m = NULL;
3562 return NULL;
3577 return NULL;
3600 return NULL;
3615 return NULL;
3833 if (mnew == NULL)
3841 if (mnew == NULL)
3885 if (mn == NULL)
3887 mn->m_pkthdr.rcvif = NULL;
3908 return(NULL);
3935 tag = m_tag_locate(m, KERNEL_MODULE_TAG_ID, KERNEL_TAG_TYPE_IPSEC, NULL);
3937 if (tag == NULL) {
3953 return tag ? (struct ipsec_tag*)(tag + 1) : NULL;
3962 tag = m_tag_locate(m, KERNEL_MODULE_TAG_ID, KERNEL_TAG_TYPE_IPSEC, NULL);
3964 return tag ? (struct ipsec_tag*)(tag + 1) : NULL;
3973 tag = m_tag_locate(m, KERNEL_MODULE_TAG_ID, KERNEL_TAG_TYPE_IPSEC, NULL);
3986 if (itag && itag->socket == NULL && itag->history_count == 0) {
3998 /* if so == NULL, don't insist on getting the aux mbuf */
4022 return NULL;
4058 return NULL;
4060 return NULL;
4093 if (m == NULL) return;
4119 error = ip_output(m, NULL, &sav->sah->sa_route, IP_NOIPSEC, NULL, NULL);