| /f-stack/freebsd/netipsec/ |
| H A D | key.c | 1187 IPSEC_ASSERT(sp != NULL, ("null sp")); in key_freesp() 1857 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_gather_mbuf() 1949 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spdadd() 2167 IPSEC_ASSERT(so != NULL, ("null so")); in key_spddelete() 2168 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spddelete() 2277 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spddelete2() 4959 IPSEC_ASSERT(off == len, in key_getspi() 6306 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ealg() 6408 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ah() 6452 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ipcomp() [all …]
|
| H A D | ipsec_input.c | 127 IPSEC_ASSERT(m != NULL, ("null packet")); in ipsec_common_input() 129 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec_common_input() 288 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec4_common_input_cb() 289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb() 292 IPSEC_ASSERT(af == AF_INET, ("unexpected af %u", af)); in ipsec4_common_input_cb() 294 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec4_common_input_cb() 505 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec6_common_input_cb() 506 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb() 509 IPSEC_ASSERT(af == AF_INET6, ("unexpected af %u", af)); in ipsec6_common_input_cb() 511 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec6_common_input_cb()
|
| H A D | ipsec_pcb.c | 157 IPSEC_ASSERT(inp != NULL, ("null inp")); in ipsec_init_pcbpolicy() 158 IPSEC_ASSERT(inp->inp_sp == NULL, ("inp_sp already initialized")); in ipsec_init_pcbpolicy() 196 IPSEC_ASSERT(src->state == IPSEC_SPSTATE_PCB, ("SP isn't PCB")); in ipsec_deepcopy_pcbpolicy() 241 IPSEC_ASSERT(new->inp_sp != NULL, ("new inp_sp is NULL")); in ipsec_copy_pcbpolicy() 242 IPSEC_ASSERT((new->inp_sp->flags & ( in ipsec_copy_pcbpolicy() 399 IPSEC_ASSERT(sp != NULL, in ipsec_get_pcbpolicy()
|
| H A D | key_debug.c | 699 IPSEC_ASSERT(sa != NULL, ("null sa")); in kdebug_port2str() 725 IPSEC_ASSERT(sp != NULL, ("null sp")); in kdebug_secpolicy() 745 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in kdebug_secpolicyindex() 765 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex() 780 IPSEC_ASSERT(lft != NULL, ("null lft")); in kdebug_sec_lifetime() 792 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash() 811 IPSEC_ASSERT(rpl != NULL, ("null rpl")); in kdebug_secreplay() 834 IPSEC_ASSERT(natt != NULL, ("null natt")); in kdebug_secnatt() 849 IPSEC_ASSERT(sav != NULL, ("null sav")); in kdebug_secasv()
|
| H A D | udpencap.c | 220 IPSEC_ASSERT(sav->natt != NULL, ("UDP encapsulation isn't required.")); in udp_ipsec_output() 252 IPSEC_ASSERT(sav->natt != NULL, ("NAT-T isn't required")); in udp_ipsec_adjust_cksum() 253 IPSEC_ASSERT(proto == IPPROTO_UDP || proto == IPPROTO_TCP, in udp_ipsec_adjust_cksum()
|
| H A D | ipsec.c | 498 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip), in ipsec4_get_ulp() 685 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip6_hdr), in ipsec6_get_ulp() 883 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec_get_reqlevel() 899 IPSEC_ASSERT(sp->req[idx]->level == IPSEC_LEVEL_UNIQUE, in ipsec_get_reqlevel() 1044 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_in_reject() 1108 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_hdrsiz_internal() 1256 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_chkreplay() 1257 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_chkreplay() 1371 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_updatereplay() 1372 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_updatereplay()
|
| H A D | xform_ah.c | 151 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, ("null xform")); in ah_hdrsiz() 543 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_input() 544 IPSEC_ASSERT(sav->key_auth != NULL, ("null authentication key")); in ah_input() 545 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, in ah_input() 707 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb() 849 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_output() 851 IPSEC_ASSERT(ahx != NULL, ("null authentication xform")); in ah_output()
|
| H A D | ipsec_output.c | 178 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec4_allocsa() 195 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec4_perform_request() 503 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec6_allocsa() 520 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec6_perform_request() 869 IPSEC_ASSERT(len < MHLEN, ("wrong length")); in ipsec_prepend()
|
| H A D | ipsec_mbuf.c | 61 IPSEC_ASSERT(m0 != NULL, ("null mbuf")); in m_makespace() 62 IPSEC_ASSERT(hlen < MHLEN, ("hlen too big: %u", hlen)); in m_makespace()
|
| H A D | xform_esp.c | 115 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, in esp_hdrsiz() 274 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_input() 275 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, ("null encoding xform")); in esp_input() 693 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_output() 696 IPSEC_ASSERT(espx != NULL, ("null encoding xform")); in esp_output()
|
| H A D | xform_ipcomp.c | 300 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb() 405 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipcomp_output() 407 IPSEC_ASSERT(ipcompx != NULL, ("null compression xform")); in ipcomp_output()
|
| H A D | ipsec.h | 51 #define IPSEC_ASSERT(_c,_m) KASSERT(_c, _m) macro
|
| H A D | xform_tcp.c | 227 IPSEC_ASSERT(m->m_len >= sizeof(*ip), ("unexpected mbuf len")); in setsockaddrs()
|
| H A D | subr_ipsec.c | 217 IPSEC_ASSERT(sav->tdb_xform == NULL, in xform_init()
|