O.O - I'm shocked. There are so many problems with that code, I would fire both the person who wrote it and the person who reviewed it.
Spoilers: They have no unit testing in place either. You could get someone barely familiar with programming to do that (its taught to first years in Uni), and unit tests will normally be mandatory for regression testing at least core functionality.
And for mission critical code, which is what all security code is - the absence is disastrous. Its so severe that whomever made the mistake may be permanently marked as unfit for security based code for the rest of his career. This isn't uncommon when a programmer demonstrates fundamental lack of understanding of basic security design.
This isn't an elaborate or sneaky bug. Its an incredibly
basic one, where standard behaviour doesn't work. Its like making a calculator that sums 2 numbers always returning an answer of 0.
The fact that there were no tools in place to detect Unreachable Code is also highly questionable. Note that Visual Studio and Eclipse for example will
immediately notify you of this. GCC and Clang can also do it, but requires specific flags to be set.
Heck, any software that does indentation for you would also make it clear that there was something wrong, because it would place the second erroneous line at the same level as the if statements.
Not to perform these checks for sensitive code which
really should not fail (especially on such a basic feature) is mind boggling. Kernel and Security code are the two most important things you can ever write.
It also makes me wonder where the hell peer review was. Thats another baseline component of any decent security based code. After which you really should not need to change it for years, and preferably never.
A final thought to really worry about though. This error was introduced in 2012 (though it didn't make it into OSX until 2013); if they missed something this trivial, what else have they missed?