Lines Matching defs:NULL

147 	(ss)->spdsock_dump_cur_rule = NULL; \
171 NULL, (pfi_t)spdsock_rsrv, spdsock_open, spdsock_close,
172 NULL, &info
176 (pfi_t)spdsock_wput, (pfi_t)spdsock_wsrv, NULL, NULL, NULL, &info
202 #define ITP_NAME(itp) (itp != NULL ? itp->itp_name : NULL)
241 if (ddi_strtoul(value, NULL, 10, &new_value) != 0)
272 NULL, NULL, NULL, 1, VM_SLEEP | VMC_IDENTIFIER);
293 if (ssp->spdsock_param_name != NULL &&
320 ASSERT(spds->spds_g_nd == NULL);
329 mutex_init(&spds->spds_param_lock, NULL, MUTEX_DEFAULT, NULL);
330 mutex_init(&spds->spds_alg_lock, NULL, MUTEX_DEFAULT, NULL);
352 if (spds->spds_mp_algs != NULL) {
354 spds->spds_mp_algs = NULL;
364 ASSERT(spds->spds_mp_algs == NULL);
369 spds->spds_params = NULL;
407 * I.e., if the bozo user didn't NULL-terminate the
431 * If there are no extensions, place NULL in extv[0].
469 if (extv[extv[0]->spd_ext_type] != NULL)
490 * If extv[0] == NULL, then there are no extension headers in this
494 extv[0] = NULL;
633 audit_pf_policy(SPD_FLUSH, cr, ns, NULL,
656 if (extv[SPD_EXT_PROTO] != NULL) {
662 if (extv[SPD_EXT_LCLPORT] != NULL) {
668 if (extv[SPD_EXT_REMPORT] != NULL) {
675 if (extv[SPD_EXT_ICMP_TYPECODE] != NULL) {
697 if ((extv)[(extn)] != NULL) { \
817 tunnel_polhead = (extv[SPD_EXT_TUN_NAME] != NULL &&
821 *actpp = NULL;
824 if (sactp == NULL) {
840 if (actp == NULL) {
883 if (!tunnel_polhead && extv[SPD_EXT_TUN_NAME] != NULL) {
971 *actpp = NULL;
993 if (pol == NULL)
1041 uint64_t *index = (itp == NULL) ? NULL : &itp->itp_next_policy_index;
1046 if (rule == NULL) {
1064 if (itp != NULL) {
1099 if (itp != NULL) {
1153 if (itp != NULL)
1176 if (itp != NULL) {
1205 if (rule == NULL) {
1226 if (itp != NULL)
1254 if (itp != NULL) {
1281 if (itp != NULL)
1319 if (tunname != NULL) {
1333 NULL, active, 0, cpid);
1335 itp_walk(spdsock_flip_node, NULL, ns);
1349 if (itp == NULL) {
1368 spdsock_flip_node(itp, NULL, ns);
1393 ns, NULL, active, 0, cpid);
1422 if (m == NULL) {
1423 return (NULL);
1453 if (ss->spdsock_itp != NULL) {
1455 ss->spdsock_itp = NULL;
1457 ss->spdsock_dump_req = NULL;
1466 * If base != NULL, fill in encoded rule part starting at base+offset.
1477 if (base != NULL) {
1500 if (base != NULL) {
1522 if (base != NULL) {
1556 if (base != NULL) {
1572 if (base != NULL)
1615 if (base != NULL) {
1707 if (base != NULL) {
1719 while (ap != NULL) {
1723 if (ap != NULL) {
1731 if (base != NULL) {
1769 if (base != NULL) {
1781 if (base != NULL) {
1798 if (name != NULL) {
1802 if (base != NULL) {
1819 if (base != NULL) {
1837 len = spdsock_encode_rule_head(NULL, 0, mreq, rule, dir, af, name,
1844 if (m == NULL)
1845 return (NULL);
1879 if (cur != NULL)
1892 if (cur != NULL) {
1903 if (cur != NULL) {
1911 return (NULL);
1922 * another IPsec tunnel policy head (itp). Return NULL if it is an error
1933 itp = NULL;
1934 } else if (ss->spdsock_itp == NULL) {
1941 if (itp != NULL) {
1944 if (ss->spdsock_itp != NULL) {
1963 ASSERT(iph != NULL);
1972 while ((rule = spdsock_dump_next_rule(ss, iph)) == NULL) {
1984 * return NULL, and we loop (while dropping the number of
1994 if (itp == NULL) {
2019 (ss->spdsock_itp == NULL) ? NULL : ss->spdsock_itp->itp_name,
2023 if (m == NULL)
2036 while ((ss->spdsock_dump_req != NULL) && canputnext(q)) {
2038 if (m == NULL)
2041 if (dataind == NULL) {
2068 /* spdsock_open() already set spdsock_itp to NULL. */
2082 ASSERT(ss->spdsock_itp == NULL);
2130 if (tunname != NULL) {
2143 NULL, active, error, cpid);
2164 if (itp == NULL) {
2177 ns, NULL, active, ENOENT, cpid);
2181 spdsock_clone_node(itp, &error, NULL);
2205 audit_pf_policy(SPD_CLONE, cr, ns, NULL,
2282 if (ipss->ipsec_alglists[IPSEC_ALG_AUTH][SADB_AALG_NONE] != NULL)
2284 if (ipss->ipsec_alglists[IPSEC_ALG_ENCR][SADB_EALG_NONE] != NULL)
2298 if (m == NULL) {
2439 if (m == NULL) {
2551 ipsec_alginfo_t *alg = NULL;
2562 if (actp == NULL)
2629 if (alg->alg_key_sizes != NULL) {
2644 if (alg->alg_key_sizes == NULL ||
2665 if (alg->alg_block_sizes != NULL) {
2680 if (alg->alg_block_sizes == NULL ||
2692 if (alg->alg_params != NULL) {
2707 if (alg->alg_params == NULL ||
2775 if (spds->spds_algs[alg_type][algid] != NULL)
2802 if ((new_mp = copymsg(mp)) == NULL) {
2809 if (spds->spds_mp_algs != NULL)
2819 spds->spds_netstack, NULL, B_TRUE, EAGAIN,
2843 spds->spds_netstack, NULL, B_TRUE, 0,
2855 spds->spds_netstack, NULL, B_TRUE, diag,
2880 * Returns NULL if we send an spdsock error. Returns a valid pointer if we
2899 *itpp = NULL;
2902 return (NULL);
2905 if (tunname != NULL) {
2913 return (NULL);
2920 if (itp == NULL) {
2924 return (NULL);
2929 if (itp == NULL) {
2935 return (NULL);
2951 itp = NULL;
2954 ss->spdsock_itp = NULL;
2958 iph = (itp == NULL) ? ipsec_system_policy(ns) : itp->itp_policy;
2960 iph = (itp == NULL) ? ipsec_inactive_policy(ns) :
2963 ASSERT(iph != NULL);
2964 if (itp != NULL) {
2986 ASSERT(WR(q)->q_next == NULL);
3057 ASSERT(ss != NULL);
3098 if (iph == NULL)
3104 if (itp != NULL) {
3115 if (itp != NULL) {
3122 if (itp != NULL)
3150 if (itp != NULL) {
3169 if (spds->spds_mp_algs != NULL) {
3172 spds->spds_mp_algs = NULL;
3185 ASSERT(ss != NULL);
3189 ASSERT(mp != NULL);
3190 ss->spdsock_timeout_arg = NULL;
3225 if (mp == NULL)
3252 if (mp == NULL)
3271 if ((mp = mi_tpi_err_ack_alloc(mp, t_error, sys_error)) != NULL)
3334 (void) proto_set_rx_hiwat(RD(q), NULL, *i1);
3380 cr = msg_getcred(mp, NULL);
3381 ASSERT(cr != NULL);
3382 if (cr == NULL) {
3451 if (ss->spdsock_dump_req != NULL) {
3469 if ((mp1 = mp->b_cont) == NULL) {
3511 if (q->q_ptr != NULL)
3518 ASSERT(ns != NULL);
3520 ASSERT(spds != NULL);
3530 if (ss == NULL) {
3538 ss->spdsock_dump_req = NULL;
3551 (void) proto_set_rx_hiwat(q, NULL, spds->spds_recv_hiwat);
3569 if (ss->spdsock_dump_req != NULL)
3572 if (ss->spdsock_dump_req == NULL)
3587 if (ss->spdsock_dump_req != NULL) {
3592 while ((mp = getq(q)) != NULL) {
3595 if (ss->spdsock_dump_req != NULL)
3614 ASSERT(ss != NULL);
3659 if (alg == NULL)
3663 * The NULL encryption algorithm is a special
3700 if (spds->spds_algs[algtype][algid] == NULL)
3715 if (alg == NULL)
3719 NULL) {
3734 spds->spds_algs[algtype][algid] = NULL;