Lines Matching refs:NULL

51     pkinit_req_opts *opts = NULL;
53 *reqopts = NULL;
55 if (opts == NULL)
75 if (opts != NULL)
84 pkinit_plg_opts *opts = NULL;
86 *plgopts = NULL;
88 if (opts == NULL)
107 if (opts != NULL)
115 if (*in == NULL) return;
116 if ((*in)->signedAuthPack.data != NULL)
118 if ((*in)->trustedCertifiers != NULL)
120 if ((*in)->kdcPkId.data != NULL)
128 if (*in == NULL) return;
129 if ((*in)->signedAuthPack.data != NULL)
131 if ((*in)->kdcCert.data != NULL)
133 if ((*in)->encryptionCert.data != NULL)
135 if ((*in)->trustedCertifiers != NULL)
143 if (*in == NULL) return;
144 if ((*in)->replyKey.contents != NULL)
146 if ((*in)->asChecksum.contents != NULL)
154 if (*in == NULL) return;
155 if ((*in)->replyKey.contents != NULL)
163 if ((*in) == NULL) return;
164 if ((*in)->clientPublicValue != NULL) {
165 if ((*in)->clientPublicValue->algorithm.algorithm.data != NULL)
167 if ((*in)->clientPublicValue->algorithm.parameters.data != NULL)
169 if ((*in)->clientPublicValue->subjectPublicKey.data != NULL)
173 if ((*in)->pkAuthenticator.paChecksum.contents != NULL)
175 if ((*in)->supportedCMSTypes != NULL)
184 if ((*in) == NULL) return;
192 if (*in == NULL) return;
195 if ((*in)->u.dh_Info.dhSignedData.data != NULL)
199 if ((*in)->u.encKeyPack.data != NULL)
211 if (*in == NULL) return;
212 if ((*in)->u.encKeyPack.data != NULL)
221 if (*in == NULL) return;
222 while ((*in)[i] != NULL) {
223 if ((*in)[i]->subjectName.data != NULL)
225 if ((*in)[i]->issuerAndSerialNumber.data != NULL)
227 if ((*in)[i]->subjectKeyIdentifier.data != NULL)
239 if (*in == NULL) return;
240 while ((*in)[i] != NULL) {
245 if ((*in)[i]->u.caName.data != NULL)
249 if ((*in)[i]->u.issuerAndSerial.data != NULL)
265 if (*in == NULL) return;
266 while ((*in)[i] != NULL) {
267 if ((*in)[i]->data != NULL)
278 if (in == NULL)
280 if (in->algorithm.data != NULL)
282 if (in->parameters.data != NULL)
291 if (in == NULL || *in == NULL)
293 for (i = 0; (*in)[i] != NULL; i++) {
302 if ((*in) == NULL) return;
303 if ((*in)->algorithm.parameters.data != NULL)
305 if ((*in)->subjectPublicKey.data != NULL)
313 if (*in == NULL) return;
314 if ((*in)->subjectPublicKey.data != NULL)
323 if ((*in) == NULL) return;
324 (*in)->signedAuthPack.data = NULL;
326 (*in)->trustedCertifiers = NULL;
327 (*in)->kdcPkId.data = NULL;
335 if ((*in) == NULL) return;
336 (*in)->signedAuthPack.data = NULL;
338 (*in)->trustedCertifiers = NULL;
339 (*in)->kdcCert.data = NULL;
341 (*in)->encryptionCert.data = NULL;
349 if ((*in) == NULL) return;
350 (*in)->replyKey.contents = NULL;
352 (*in)->asChecksum.contents = NULL;
360 if ((*in) == NULL) return;
361 (*in)->replyKey.contents = NULL;
369 if ((*in) == NULL) return;
370 (*in)->clientPublicValue = NULL;
371 (*in)->supportedCMSTypes = NULL;
373 (*in)->clientDHNonce.data = NULL;
374 (*in)->pkAuthenticator.paChecksum.contents = NULL;
381 if ((*in) == NULL) return;
382 (*in)->clientPublicValue = NULL;
389 if ((*in) == NULL) return;
391 (*in)->u.dh_Info.serverDHNonce.data = NULL;
393 (*in)->u.dh_Info.dhSignedData.data = NULL;
395 (*in)->u.encKeyPack.data = NULL;
402 if ((*in) == NULL) return;
404 (*in)->u.dhSignedData.data = NULL;
406 (*in)->u.encKeyPack.data = NULL;
413 if ((*in) == NULL) return;
416 (*in)->data = NULL;
423 if ((*in) == NULL) return;
424 (*in)->algorithm.parameters.data = NULL;
426 (*in)->subjectPublicKey.data = NULL;
433 if (dst == NULL || src == NULL)
435 if (src->data == NULL) {
436 dst->data = NULL;
441 if (dst->data == NULL)
465 FILE *f = NULL;
469 if (len == 0 || filename == NULL)
472 if ((f = fopen(filename, "w")) == NULL)