Home
last modified time | relevance | path

Searched refs:IPSEC_ASSERT (Results 1 – 14 of 14) sorted by relevance

/f-stack/freebsd/netipsec/
H A Dkey.c1187 IPSEC_ASSERT(sp != NULL, ("null sp")); in key_freesp()
1857 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_gather_mbuf()
1949 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spdadd()
2167 IPSEC_ASSERT(so != NULL, ("null so")); in key_spddelete()
2168 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spddelete()
2277 IPSEC_ASSERT(m != NULL, ("null mbuf")); in key_spddelete2()
4959 IPSEC_ASSERT(off == len, in key_getspi()
6306 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ealg()
6408 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ah()
6452 IPSEC_ASSERT(l <= MLEN, in key_getcomb_ipcomp()
[all …]
H A Dipsec_input.c127 IPSEC_ASSERT(m != NULL, ("null packet")); in ipsec_common_input()
129 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec_common_input()
288 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec4_common_input_cb()
289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb()
292 IPSEC_ASSERT(af == AF_INET, ("unexpected af %u", af)); in ipsec4_common_input_cb()
294 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec4_common_input_cb()
505 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec6_common_input_cb()
506 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb()
509 IPSEC_ASSERT(af == AF_INET6, ("unexpected af %u", af)); in ipsec6_common_input_cb()
511 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec6_common_input_cb()
H A Dipsec_pcb.c157 IPSEC_ASSERT(inp != NULL, ("null inp")); in ipsec_init_pcbpolicy()
158 IPSEC_ASSERT(inp->inp_sp == NULL, ("inp_sp already initialized")); in ipsec_init_pcbpolicy()
196 IPSEC_ASSERT(src->state == IPSEC_SPSTATE_PCB, ("SP isn't PCB")); in ipsec_deepcopy_pcbpolicy()
241 IPSEC_ASSERT(new->inp_sp != NULL, ("new inp_sp is NULL")); in ipsec_copy_pcbpolicy()
242 IPSEC_ASSERT((new->inp_sp->flags & ( in ipsec_copy_pcbpolicy()
399 IPSEC_ASSERT(sp != NULL, in ipsec_get_pcbpolicy()
H A Dkey_debug.c699 IPSEC_ASSERT(sa != NULL, ("null sa")); in kdebug_port2str()
725 IPSEC_ASSERT(sp != NULL, ("null sp")); in kdebug_secpolicy()
745 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in kdebug_secpolicyindex()
765 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex()
780 IPSEC_ASSERT(lft != NULL, ("null lft")); in kdebug_sec_lifetime()
792 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash()
811 IPSEC_ASSERT(rpl != NULL, ("null rpl")); in kdebug_secreplay()
834 IPSEC_ASSERT(natt != NULL, ("null natt")); in kdebug_secnatt()
849 IPSEC_ASSERT(sav != NULL, ("null sav")); in kdebug_secasv()
H A Dudpencap.c220 IPSEC_ASSERT(sav->natt != NULL, ("UDP encapsulation isn't required.")); in udp_ipsec_output()
252 IPSEC_ASSERT(sav->natt != NULL, ("NAT-T isn't required")); in udp_ipsec_adjust_cksum()
253 IPSEC_ASSERT(proto == IPPROTO_UDP || proto == IPPROTO_TCP, in udp_ipsec_adjust_cksum()
H A Dipsec.c498 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip), in ipsec4_get_ulp()
685 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip6_hdr), in ipsec6_get_ulp()
883 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec_get_reqlevel()
899 IPSEC_ASSERT(sp->req[idx]->level == IPSEC_LEVEL_UNIQUE, in ipsec_get_reqlevel()
1044 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_in_reject()
1108 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_hdrsiz_internal()
1256 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_chkreplay()
1257 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_chkreplay()
1371 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_updatereplay()
1372 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_updatereplay()
H A Dxform_ah.c151 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, ("null xform")); in ah_hdrsiz()
543 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_input()
544 IPSEC_ASSERT(sav->key_auth != NULL, ("null authentication key")); in ah_input()
545 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, in ah_input()
707 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb()
849 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_output()
851 IPSEC_ASSERT(ahx != NULL, ("null authentication xform")); in ah_output()
H A Dipsec_output.c178 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec4_allocsa()
195 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec4_perform_request()
503 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec6_allocsa()
520 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec6_perform_request()
869 IPSEC_ASSERT(len < MHLEN, ("wrong length")); in ipsec_prepend()
H A Dipsec_mbuf.c61 IPSEC_ASSERT(m0 != NULL, ("null mbuf")); in m_makespace()
62 IPSEC_ASSERT(hlen < MHLEN, ("hlen too big: %u", hlen)); in m_makespace()
H A Dxform_esp.c115 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, in esp_hdrsiz()
274 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_input()
275 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, ("null encoding xform")); in esp_input()
693 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_output()
696 IPSEC_ASSERT(espx != NULL, ("null encoding xform")); in esp_output()
H A Dxform_ipcomp.c300 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb()
405 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipcomp_output()
407 IPSEC_ASSERT(ipcompx != NULL, ("null compression xform")); in ipcomp_output()
H A Dipsec.h51 #define IPSEC_ASSERT(_c,_m) KASSERT(_c, _m) macro
H A Dxform_tcp.c227 IPSEC_ASSERT(m->m_len >= sizeof(*ip), ("unexpected mbuf len")); in setsockaddrs()
H A Dsubr_ipsec.c217 IPSEC_ASSERT(sav->tdb_xform == NULL, in xform_init()