Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/sys/netipsec Remove dead code, 'espx' is never NULL and dere...



details:   https://anonhg.NetBSD.org/src/rev/4217f8a73622
branches:  trunk
changeset: 323075:4217f8a73622
user:      maxv <maxv%NetBSD.org@localhost>
date:      Wed May 30 16:43:29 2018 +0000

description:
Remove dead code, 'espx' is never NULL and dereferenced earlier, so no need
to NULL-check all the time.

diffstat:

 sys/netipsec/xform_esp.c |  49 +++++++++++++++++++++--------------------------
 1 files changed, 22 insertions(+), 27 deletions(-)

diffs (99 lines):

diff -r e8df7b23c922 -r 4217f8a73622 sys/netipsec/xform_esp.c
--- a/sys/netipsec/xform_esp.c  Wed May 30 16:32:26 2018 +0000
+++ b/sys/netipsec/xform_esp.c  Wed May 30 16:43:29 2018 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: xform_esp.c,v 1.91 2018/05/30 16:32:26 maxv Exp $      */
+/*     $NetBSD: xform_esp.c,v 1.92 2018/05/30 16:43:29 maxv Exp $      */
 /*     $FreeBSD: xform_esp.c,v 1.2.2.1 2003/01/24 05:11:36 sam Exp $   */
 /*     $OpenBSD: ip_esp.c,v 1.69 2001/06/26 06:18:59 angelos Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.91 2018/05/30 16:32:26 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.92 2018/05/30 16:43:29 maxv Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -695,8 +695,7 @@
        uint8_t prot;
        int error, maxpacketsize;
        struct esptail *esptail;
-
-       struct cryptodesc *crde = NULL, *crda = NULL;
+       struct cryptodesc *crde, *crda;
        struct cryptop *crp;
 
        esph = sav->tdb_authalgxform;
@@ -844,7 +843,7 @@
        m_copyback(m, protoff, sizeof(uint8_t), &prot);
 
        /* Get crypto descriptors. */
-       crp = crypto_getreq(esph && espx ? 2 : 1);
+       crp = crypto_getreq(esph ? 2 : 1);
        if (crp == NULL) {
                DPRINTF(("%s: failed to acquire crypto descriptors\n",
                    __func__));
@@ -853,26 +852,22 @@
                goto bad;
        }
 
-       if (espx) {
-               crde = crp->crp_desc;
-               crda = crde->crd_next;
+       /* Get the descriptors. */
+       crde = crp->crp_desc;
+       crda = crde->crd_next;
 
-               /* Encryption descriptor. */
-               crde->crd_skip = skip + hlen;
-               if (espx->type == CRYPTO_AES_GMAC)
-                       crde->crd_len = 0;
-               else
-                       crde->crd_len = m->m_pkthdr.len - (skip + hlen + alen);
-               crde->crd_flags = CRD_F_ENCRYPT;
-               crde->crd_inject = skip + hlen - sav->ivlen;
-
-               /* Encryption operation. */
-               crde->crd_alg = espx->type;
-               crde->crd_key = _KEYBUF(sav->key_enc);
-               crde->crd_klen = _KEYBITS(sav->key_enc);
-               /* XXX Rounds ? */
-       } else
-               crda = crp->crp_desc;
+       /* Encryption descriptor. */
+       crde->crd_skip = skip + hlen;
+       if (espx->type == CRYPTO_AES_GMAC)
+               crde->crd_len = 0;
+       else
+               crde->crd_len = m->m_pkthdr.len - (skip + hlen + alen);
+       crde->crd_flags = CRD_F_ENCRYPT;
+       crde->crd_inject = skip + hlen - sav->ivlen;
+       crde->crd_alg = espx->type;
+       crde->crd_key = _KEYBUF(sav->key_enc);
+       crde->crd_klen = _KEYBITS(sav->key_enc);
+       /* XXX Rounds ? */
 
        /* IPsec-specific opaque crypto info. */
        tc = pool_cache_get(esp_tdb_crypto_pool_cache, PR_NOWAIT);
@@ -922,7 +917,7 @@
        if (esph) {
                /* Authentication descriptor. */
                crda->crd_skip = skip;
-               if (espx && espx->type == CRYPTO_AES_GCM_16)
+               if (espx->type == CRYPTO_AES_GCM_16)
                        crda->crd_len = hlen - sav->ivlen;
                else
                        crda->crd_len = m->m_pkthdr.len - (skip + alen);
@@ -930,8 +925,8 @@
 
                /* Authentication operation. */
                crda->crd_alg = esph->type;
-               if (espx && (espx->type == CRYPTO_AES_GCM_16 ||
-                            espx->type == CRYPTO_AES_GMAC)) {
+               if (espx->type == CRYPTO_AES_GCM_16 ||
+                   espx->type == CRYPTO_AES_GMAC) {
                        crda->crd_key = _KEYBUF(sav->key_enc);
                        crda->crd_klen = _KEYBITS(sav->key_enc);
                } else {



Home | Main Index | Thread Index | Old Index