Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/netipsec change into __func__
details: https://anonhg.NetBSD.org/src/rev/785f35dc2f6e
branches: trunk
changeset: 352924:785f35dc2f6e
user: christos <christos%NetBSD.org@localhost>
date: Fri Apr 14 18:06:11 2017 +0000
description:
change into __func__
diffstat:
sys/netipsec/xform_ah.c | 146 ++++++++++++++++++++++++------------------------
1 files changed, 73 insertions(+), 73 deletions(-)
diffs (truncated from 458 to 300 lines):
diff -r ea77352643ac -r 785f35dc2f6e sys/netipsec/xform_ah.c
--- a/sys/netipsec/xform_ah.c Fri Apr 14 15:40:35 2017 +0000
+++ b/sys/netipsec/xform_ah.c Fri Apr 14 18:06:11 2017 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: xform_ah.c,v 1.47 2017/04/13 16:38:32 christos Exp $ */
+/* $NetBSD: xform_ah.c,v 1.48 2017/04/14 18:06:11 christos Exp $ */
/* $FreeBSD: src/sys/netipsec/xform_ah.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $ */
/* $OpenBSD: ip_ah.c,v 1.63 2001/06/26 06:18:58 angelos Exp $ */
/*
@@ -39,7 +39,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.47 2017/04/13 16:38:32 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.48 2017/04/14 18:06:11 christos Exp $");
#if defined(_KERNEL_OPT)
#include "opt_inet.h"
@@ -166,7 +166,7 @@
if (sav != NULL) {
int authsize;
IPSEC_ASSERT(sav->tdb_authalgxform != NULL,
- ("ah_hdrsiz: null xform"));
+ ("%s: null xform", __func__));
/*XXX not right for null algorithm--does it matter??*/
authsize = AUTHSIZE(sav);
size = roundup(authsize, sizeof (u_int32_t)) + HDRSIZE(sav);
@@ -189,8 +189,8 @@
thash = ah_algorithm_lookup(sav->alg_auth);
if (thash == NULL) {
- DPRINTF(("ah_init: unsupported authentication algorithm %u\n",
- sav->alg_auth));
+ DPRINTF(("%s: unsupported authentication algorithm %u\n",
+ __func__, sav->alg_auth));
return EINVAL;
}
/*
@@ -200,21 +200,21 @@
*/
/* NB: replay state is setup elsewhere (sigh) */
if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) {
- DPRINTF(("ah_init: replay state block inconsistency, "
- "%s algorithm %s replay state\n",
+ DPRINTF(("%s: replay state block inconsistency, "
+ "%s algorithm %s replay state\n", __func__,
(sav->flags & SADB_X_EXT_OLD) ? "old" : "new",
sav->replay == NULL ? "without" : "with"));
return EINVAL;
}
if (sav->key_auth == NULL) {
- DPRINTF(("ah_init: no authentication key for %s "
- "algorithm\n", thash->name));
+ DPRINTF(("%s: no authentication key for %s algorithm\n",
+ __func__, thash->name));
return EINVAL;
}
keylen = _KEYLEN(sav->key_auth);
if (keylen != thash->keysize && thash->keysize != 0) {
- DPRINTF(("ah_init: invalid keylength %d, algorithm "
- "%s requires keysize %d\n",
+ DPRINTF(("%s: invalid keylength %d, algorithm %s requires "
+ "keysize %d\n", __func__,
keylen, thash->name, thash->keysize));
return EINVAL;
}
@@ -297,7 +297,7 @@
*/
*m0 = m = m_pullup(m, skip);
if (m == NULL) {
- DPRINTF(("ah_massage_headers: m_pullup failed\n"));
+ DPRINTF(("%s: m_pullup failed\n", __func__));
return ENOBUFS;
}
@@ -352,9 +352,8 @@
off + 1 < skip)
;
else {
- DPRINTF(("ah_massage_headers: illegal IPv4 "
- "option length for option %d\n",
- ptr[off]));
+ DPRINTF(("%s: illegal IPv4 option length for "
+ "option %d\n", __func__, ptr[off]));
m_freem(m);
return EINVAL;
@@ -376,9 +375,9 @@
case 0x95: /* RFC1770 */
/* Sanity check for option length. */
if (ptr[off + 1] < 2) {
- DPRINTF(("ah_massage_headers: "
- "illegal IPv4 option length for "
- "option %d\n", ptr[off]));
+ DPRINTF(("%s: illegal IPv4 option "
+ "length for option %d\n", __func__,
+ ptr[off]));
m_freem(m);
return EINVAL;
@@ -391,9 +390,9 @@
case IPOPT_SSRR:
/* Sanity check for option length. */
if (ptr[off + 1] < 2) {
- DPRINTF(("ah_massage_headers: "
- "illegal IPv4 option length for "
- "option %d\n", ptr[off]));
+ DPRINTF(("%s: illegal IPv4 option "
+ "length for option %d\n", __func__,
+ ptr[off]));
m_freem(m);
return EINVAL;
@@ -417,9 +416,9 @@
default:
/* Sanity check for option length. */
if (ptr[off + 1] < 2) {
- DPRINTF(("ah_massage_headers: "
- "illegal IPv4 option length for "
- "option %d\n", ptr[off]));
+ DPRINTF(("%s: illegal IPv4 option "
+ "length for option %d\n", __func__,
+ ptr[off]));
m_freem(m);
return EINVAL;
}
@@ -433,8 +432,8 @@
/* Sanity check. */
if (off > skip) {
- DPRINTF(("ah_massage_headers(): malformed "
- "IPv4 options header\n"));
+ DPRINTF(("%s: malformed IPv4 options header\n",
+ __func__));
m_freem(m);
return EINVAL;
@@ -451,7 +450,7 @@
/* We don't do IPv6 Jumbograms. */
if (ip6.ip6_plen == 0) {
- DPRINTF(("ah_massage_headers: unsupported IPv6 jumbogram\n"));
+ DPRINTF(("%s: unsupported IPv6 jumbogram\n", __func__));
m_freem(m);
return EMSGSIZE;
}
@@ -477,9 +476,9 @@
skip - sizeof(struct ip6_hdr),
M_XDATA, M_NOWAIT);
if (ptr == NULL) {
- DPRINTF(("ah_massage_headers: failed "
- "to allocate memory for IPv6 "
- "headers\n"));
+ DPRINTF(("%s: failed to allocate "
+ "memory for IPv6 headers\n",
+ __func__));
m_freem(m);
return ENOBUFS;
}
@@ -605,8 +604,8 @@
}
default:
- DPRINTF(("ah_massage_headers: unexpected "
- "IPv6 header type %d", off));
+ DPRINTF(("%s: unexpected IPv6 header type %d\n",
+ __func__, off));
if (alloc)
free(ptr, M_XDATA);
m_freem(m);
@@ -646,11 +645,11 @@
IPSEC_SPLASSERT_SOFTNET("ah_input");
- IPSEC_ASSERT(sav != NULL, ("ah_input: null SA"));
+ IPSEC_ASSERT(sav != NULL, ("%s: null SA", __func__));
IPSEC_ASSERT(sav->key_auth != NULL,
- ("ah_input: null authentication key"));
+ ("%s: null authentication key", __func__));
IPSEC_ASSERT(sav->tdb_authalgxform != NULL,
- ("ah_input: null authentication xform"));
+ ("%s: null authentication xform", __func__));
/* Figure out header size. */
rplen = HDRSIZE(sav);
@@ -658,7 +657,7 @@
/* XXX don't pullup, just copy header */
IP6_EXTHDR_GET(ah, struct newah *, m, skip, rplen);
if (ah == NULL) {
- DPRINTF(("ah_input: cannot pullup header\n"));
+ DPRINTF(("%s: cannot pullup header\n", __func__));
AH_STATINC(AH_STAT_HDROPS); /*XXX*/
m_freem(m);
return ENOBUFS;
@@ -667,7 +666,7 @@
/* Check replay window, if applicable. */
if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) {
AH_STATINC(AH_STAT_REPLAY);
- DPRINTF(("ah_input: packet replay failure: %s\n",
+ DPRINTF(("%s: packet replay failure: %s\n", __func__,
ipsec_logsastr(sav)));
m_freem(m);
return ENOBUFS;
@@ -678,8 +677,8 @@
ahx = sav->tdb_authalgxform;
authsize = AUTHSIZE(sav);
if (hl != authsize + rplen - sizeof (struct ah)) {
- DPRINTF(("ah_input: bad authenticator length %u (expecting %lu)"
- " for packet in SA %s/%08lx\n",
+ DPRINTF(("%s: bad authenticator length %u (expecting %lu)"
+ " for packet in SA %s/%08lx\n", __func__,
hl, (u_long) (authsize + rplen - sizeof (struct ah)),
ipsec_address(&sav->sah->saidx.dst),
(u_long) ntohl(sav->spi)));
@@ -692,14 +691,14 @@
/* Get crypto descriptors. */
crp = crypto_getreq(1);
if (crp == NULL) {
- DPRINTF(("ah_input: failed to acquire crypto descriptor\n"));
+ DPRINTF(("%s: failed to acquire crypto descriptor\n", __func__));
AH_STATINC(AH_STAT_CRYPTO);
m_freem(m);
return ENOBUFS;
}
crda = crp->crp_desc;
- IPSEC_ASSERT(crda != NULL, ("ah_input: null crypto descriptor"));
+ IPSEC_ASSERT(crda != NULL, ("%s: null crypto descriptor", __func__));
crda->crd_skip = 0;
crda->crd_len = m->m_pkthdr.len;
@@ -732,7 +731,7 @@
M_XDATA, M_NOWAIT|M_ZERO);
}
if (tc == NULL) {
- DPRINTF(("ah_input: failed to allocate tdb_crypto\n"));
+ DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
AH_STATINC(AH_STAT_CRYPTO);
crypto_freereq(crp);
m_freem(m);
@@ -742,7 +741,7 @@
error = m_makewritable(&m, 0, skip + rplen + authsize, M_NOWAIT);
if (error) {
m_freem(m);
- DPRINTF(("ah_input: failed to copyback_cow\n"));
+ DPRINTF(("%s: failed to copyback_cow\n", __func__));
AH_STATINC(AH_STAT_HDROPS);
free(tc, M_XDATA);
crypto_freereq(crp);
@@ -789,8 +788,8 @@
tc->tc_skip = skip;
tc->tc_ptr = mtag; /* Save the mtag we've identified. */
- DPRINTF(("ah: hash over %d bytes, skip %d: "
- "crda len %d skip %d inject %d\n",
+ DPRINTF(("%s: hash over %d bytes, skip %d: "
+ "crda len %d skip %d inject %d\n", __func__,
crp->crp_ilen, tc->tc_skip,
crda->crd_len, crda->crd_skip, crda->crd_inject));
@@ -833,7 +832,8 @@
u_int16_t sport;
tc = (struct tdb_crypto *) crp->crp_opaque;
- IPSEC_ASSERT(tc != NULL, ("ah_input_cb: null opaque crypto data area!"));
+ IPSEC_ASSERT(tc != NULL, ("%s: null opaque crypto data area!",
+ __func__));
skip = tc->tc_skip;
nxt = tc->tc_nxt;
protoff = tc->tc_protoff;
@@ -850,7 +850,7 @@
sav = KEY_ALLOCSA(&tc->tc_dst, tc->tc_proto, tc->tc_spi, sport, dport);
if (sav == NULL) {
AH_STATINC(AH_STAT_NOTDB);
- DPRINTF(("ah_input_cb: SA expired while in crypto\n"));
+ DPRINTF(("%s: SA expired while in crypto\n", __func__));
error = ENOBUFS; /*XXX*/
goto bad;
}
@@ -858,7 +858,7 @@
saidx = &sav->sah->saidx;
IPSEC_ASSERT(saidx->dst.sa.sa_family == AF_INET ||
saidx->dst.sa.sa_family == AF_INET6,
- ("ah_input_cb: unexpected protocol family %u",
+ ("%s: unexpected protocol family %u", __func__,
saidx->dst.sa.sa_family));
/* Check for crypto errors. */
@@ -873,7 +873,7 @@
}
AH_STATINC(AH_STAT_NOXFORM);
- DPRINTF(("ah_input_cb: crypto error %d\n", crp->crp_etype));
+ DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
error = crp->crp_etype;
goto bad;
} else {
@@ -885,7 +885,7 @@
/* Shouldn't happen... */
if (m == NULL) {
Home |
Main Index |
Thread Index |
Old Index