| /src/sys/netipsec/ |
| H A D | key.c | 835 IPSEC_ASSERT(dir == IPSEC_DIR_INBOUND || dir == IPSEC_DIR_OUTBOUND, in key_havesp() 919 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in key_do_allocsp() 920 IPSEC_ASSERT(dir == IPSEC_DIR_INBOUND || dir == IPSEC_DIR_OUTBOUND, in key_do_allocsp() 1029 IPSEC_ASSERT(saidx->proto == IPPROTO_TCP, in key_allocsa_tcpmd5() 1031 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TCPMD5, in key_allocsa_tcpmd5() 1082 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in key_allocsa_policy() 1083 IPSEC_ASSERT(saidx->mode == IPSEC_MODE_TRANSPORT || in key_allocsa_policy() 1159 IPSEC_ASSERT(proto == IPPROTO_ESP || proto == IPPROTO_AH || in key_allocsa() 1206 IPSEC_ASSERT(src != NULL, ("null src address")); in key_allocsa_tunnel() 1207 IPSEC_ASSERT(dst != NULL, ("null dst address")); in key_allocsa_tunnel() [all …]
|
| H A D | ipsec_input.c | 130 IPSEC_ASSERT(m != NULL, ("null packet")); in ipsec_common_input() 132 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec_common_input() 353 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec4_common_input_cb() 354 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec4_common_input_cb() 357 IPSEC_ASSERT(af == AF_INET, ("unexpected af %u", af)); in ipsec4_common_input_cb() 359 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec4_common_input_cb() 610 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipsec6_common_input_cb() 611 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); in ipsec6_common_input_cb() 614 IPSEC_ASSERT(af == AF_INET6, ("unexpected af %u", af)); in ipsec6_common_input_cb() 616 IPSEC_ASSERT(sproto == IPPROTO_ESP || sproto == IPPROTO_AH || in ipsec6_common_input_cb()
|
| H A D | ipsec_pcb.c | 156 IPSEC_ASSERT(inp != NULL, ("null inp")); in ipsec_init_pcbpolicy() 157 IPSEC_ASSERT(inp->inp_sp == NULL, ("inp_sp already initialized")); in ipsec_init_pcbpolicy() 203 IPSEC_ASSERT(src->state == IPSEC_SPSTATE_PCB, ("SP isn't PCB")); in ipsec_deepcopy_pcbpolicy() 248 IPSEC_ASSERT(new->inp_sp != NULL, ("new inp_sp is NULL")); in ipsec_copy_pcbpolicy() 249 IPSEC_ASSERT((new->inp_sp->flags & ( in ipsec_copy_pcbpolicy() 415 IPSEC_ASSERT(sp != NULL, in ipsec_get_pcbpolicy()
|
| H A D | key_debug.c | 703 IPSEC_ASSERT(sa != NULL, ("null sa")); in kdebug_port2str() 729 IPSEC_ASSERT(sp != NULL, ("null sp")); in kdebug_secpolicy() 749 IPSEC_ASSERT(spidx != NULL, ("null spidx")); in kdebug_secpolicyindex() 769 IPSEC_ASSERT(saidx != NULL, ("null saidx")); in kdebug_secasindex() 784 IPSEC_ASSERT(lft != NULL, ("null lft")); in kdebug_sec_lifetime() 796 IPSEC_ASSERT(sah != NULL, ("null sah")); in kdebug_secash() 817 IPSEC_ASSERT(rpl != NULL, ("null rpl")); in kdebug_secreplay() 842 IPSEC_ASSERT(natt != NULL, ("null natt")); in kdebug_secnatt() 857 IPSEC_ASSERT(sav != NULL, ("null sav")); in kdebug_secasv()
|
| H A D | ipsec.c | 503 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip), in ipsec4_get_ulp() 700 IPSEC_ASSERT(m->m_pkthdr.len >= sizeof(struct ip6_hdr), in ipsec6_get_ulp() 903 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec_get_reqlevel() 919 IPSEC_ASSERT(sp->req[idx]->level == IPSEC_LEVEL_UNIQUE, in ipsec_get_reqlevel() 1064 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_in_reject() 1128 IPSEC_ASSERT(sp->policy == IPSEC_POLICY_IPSEC, in ipsec_hdrsiz_internal() 1282 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_chkreplay() 1283 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_chkreplay() 1411 IPSEC_ASSERT(sav != NULL, ("Null SA")); in ipsec_updatereplay() 1412 IPSEC_ASSERT(sav->replay != NULL, ("Null replay state")); in ipsec_updatereplay()
|
| H A D | udpencap.c | 249 IPSEC_ASSERT(sav->natt != NULL, ("UDP encapsulation isn't required.")); in udp_ipsec_output() 323 IPSEC_ASSERT(sav->natt != NULL, ("NAT-T isn't required")); in udp_ipsec_adjust_cksum() 324 IPSEC_ASSERT(proto == IPPROTO_UDP || proto == IPPROTO_TCP, in udp_ipsec_adjust_cksum()
|
| H A D | xform_ah.c | 154 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, ("null xform")); in ah_hdrsiz() 548 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_input() 549 IPSEC_ASSERT(sav->key_auth != NULL, ("null authentication key")); in ah_input() 550 IPSEC_ASSERT(sav->tdb_authalgxform != NULL, in ah_input() 724 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ah_input_cb() 871 IPSEC_ASSERT(sav != NULL, ("null SA")); in ah_output() 873 IPSEC_ASSERT(ahx != NULL, ("null authentication xform")); in ah_output()
|
| H A D | ipsec_mbuf.c | 59 IPSEC_ASSERT(m0 != NULL, ("null mbuf")); in m_makespace() 60 IPSEC_ASSERT(hlen < MHLEN, ("hlen too big: %u", hlen)); in m_makespace()
|
| H A D | xform_esp.c | 116 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, in esp_hdrsiz() 284 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_input() 285 IPSEC_ASSERT(sav->tdb_encalgxform != NULL, ("null encoding xform")); in esp_input() 721 IPSEC_ASSERT(sav != NULL, ("null SA")); in esp_output() 724 IPSEC_ASSERT(espx != NULL, ("null encoding xform")); in esp_output()
|
| H A D | ipsec_output.c | 181 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec4_allocsa() 200 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec4_perform_request() 620 IPSEC_ASSERT(sav->tdb_xform != NULL, ("SA with NULL tdb_xform")); in ipsec6_allocsa() 638 IPSEC_ASSERT(idx < sp->tcount, ("Wrong IPsec request index %d", idx)); in ipsec6_perform_request() 1068 IPSEC_ASSERT(len < MHLEN, ("wrong length")); in ipsec_prepend()
|
| H A D | xform_ipcomp.c | 313 IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET || in ipcomp_input_cb() 423 IPSEC_ASSERT(sav != NULL, ("null SA")); in ipcomp_output() 425 IPSEC_ASSERT(ipcompx != NULL, ("null compression xform")); in ipcomp_output()
|
| H A D | ipsec.h | 53 #define IPSEC_ASSERT(_c,_m) KASSERT(_c, _m) macro
|
| H A D | xform_tcp.c | 237 IPSEC_ASSERT(m->m_len >= sizeof(*ip), ("unexpected mbuf len")); in setsockaddrs()
|
| H A D | subr_ipsec.c | 204 IPSEC_ASSERT(sav->tdb_xform == NULL, in xform_init()
|