Home
last modified time | relevance | path

Searched refs:IPSEC_ASSERT (Results 1 – 14 of 14) sorted by relevance

/src/sys/netipsec/
H A Dkey.c835 IPSEC_ASSERT(dir == IPSEC_DIR_INBOUND || dir == IPSEC_DIR_OUTBOUND, in key_havesp()
919 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in key_do_allocsp()
920 IPSEC_ASSERT(dir == IPSEC_DIR_INBOUND || dir == IPSEC_DIR_OUTBOUND, in key_do_allocsp()
1029 IPSEC_ASSERT(saidx->proto == IPPROTO_TCP, in key_allocsa_tcpmd5()
1031 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TCPMD5, in key_allocsa_tcpmd5()
1082 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in key_allocsa_policy()
1083 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TRANSPORT || in key_allocsa_policy()
1159 IPSEC_ASSERT(proto == IPPROTO_ESP || proto == IPPROTO_AH || in key_allocsa()
1206 IPSEC_ASSERT(src != NULL, ("null src address")); in key_allocsa_tunnel()
1207 IPSEC_ASSERT(dst != NULL, ("null dst address")); in key_allocsa_tunnel()
[all …]
H A Dipsec_input.c130 IPSEC_ASSERT(m != NULL, ("null packet")); in ipsec_common_input()
132 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec_common_input()
353 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec4_common_input_cb()
354 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb()
357 IPSEC_ASSERT(af == AF_INET, ("unexpected af %u", af)); in ipsec4_common_input_cb()
359 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec4_common_input_cb()
610 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec6_common_input_cb()
611 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb()
614 IPSEC_ASSERT(af == AF_INET6, ("unexpected af %u", af)); in ipsec6_common_input_cb()
616 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec6_common_input_cb()
H A Dipsec_pcb.c156 IPSEC_ASSERT(inp != NULL, ("null inp")); in ipsec_init_pcbpolicy()
157 IPSEC_ASSERT(inp->inp_sp == NULL, ("inp_sp already initialized")); in ipsec_init_pcbpolicy()
203 IPSEC_ASSERT(src->state == IPSEC_SPSTATE_PCB, ("SP isn't PCB")); in ipsec_deepcopy_pcbpolicy()
248 IPSEC_ASSERT(new->inp_sp != NULL, ("new inp_sp is NULL")); in ipsec_copy_pcbpolicy()
249 IPSEC_ASSERT((new->inp_sp->flags & ( in ipsec_copy_pcbpolicy()
415 IPSEC_ASSERT(sp != NULL, in ipsec_get_pcbpolicy()
H A Dkey_debug.c703 IPSEC_ASSERT(sa != NULL, ("null sa")); in kdebug_port2str()
729 IPSEC_ASSERT(sp != NULL, ("null sp")); in kdebug_secpolicy()
749 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in kdebug_secpolicyindex()
769 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex()
784 IPSEC_ASSERT(lft != NULL, ("null lft")); in kdebug_sec_lifetime()
796 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash()
817 IPSEC_ASSERT(rpl != NULL, ("null rpl")); in kdebug_secreplay()
842 IPSEC_ASSERT(natt != NULL, ("null natt")); in kdebug_secnatt()
857 IPSEC_ASSERT(sav != NULL, ("null sav")); in kdebug_secasv()
H A Dipsec.c503 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip), in ipsec4_get_ulp()
700 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip6_hdr), in ipsec6_get_ulp()
903 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec_get_reqlevel()
919 IPSEC_ASSERT(sp->req[idx]->level == IPSEC_LEVEL_UNIQUE, in ipsec_get_reqlevel()
1064 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_in_reject()
1128 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_hdrsiz_internal()
1282 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_chkreplay()
1283 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_chkreplay()
1411 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_updatereplay()
1412 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_updatereplay()
H A Dudpencap.c249 IPSEC_ASSERT(sav->natt != NULL, ("UDP encapsulation isn't required.")); in udp_ipsec_output()
323 IPSEC_ASSERT(sav->natt != NULL, ("NAT-T isn't required")); in udp_ipsec_adjust_cksum()
324 IPSEC_ASSERT(proto == IPPROTO_UDP || proto == IPPROTO_TCP, in udp_ipsec_adjust_cksum()
H A Dxform_ah.c154 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, ("null xform")); in ah_hdrsiz()
548 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_input()
549 IPSEC_ASSERT(sav->key_auth != NULL, ("null authentication key")); in ah_input()
550 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, in ah_input()
724 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb()
871 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_output()
873 IPSEC_ASSERT(ahx != NULL, ("null authentication xform")); in ah_output()
H A Dipsec_mbuf.c59 IPSEC_ASSERT(m0 != NULL, ("null mbuf")); in m_makespace()
60 IPSEC_ASSERT(hlen < MHLEN, ("hlen too big: %u", hlen)); in m_makespace()
H A Dxform_esp.c116 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, in esp_hdrsiz()
284 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_input()
285 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, ("null encoding xform")); in esp_input()
721 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_output()
724 IPSEC_ASSERT(espx != NULL, ("null encoding xform")); in esp_output()
H A Dipsec_output.c181 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec4_allocsa()
200 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec4_perform_request()
620 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec6_allocsa()
638 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec6_perform_request()
1068 IPSEC_ASSERT(len < MHLEN, ("wrong length")); in ipsec_prepend()
H A Dxform_ipcomp.c313 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb()
423 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipcomp_output()
425 IPSEC_ASSERT(ipcompx != NULL, ("null compression xform")); in ipcomp_output()
H A Dipsec.h53 #define IPSEC_ASSERT(_c,_m) KASSERT(_c, _m) macro
H A Dxform_tcp.c237 IPSEC_ASSERT(m->m_len >= sizeof(*ip), ("unexpected mbuf len")); in setsockaddrs()
H A Dsubr_ipsec.c204 IPSEC_ASSERT(sav->tdb_xform == NULL, in xform_init()