Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/sys/netipsec Style and simplify.



details:   https://anonhg.NetBSD.org/src/rev/28f089f63496
branches:  trunk
changeset: 829864:28f089f63496
user:      maxv <maxv%NetBSD.org@localhost>
date:      Thu Feb 15 13:51:32 2018 +0000

description:
Style and simplify.

diffstat:

 sys/netipsec/xform_ipcomp.c |  75 ++++++++++++++++++++++----------------------
 1 files changed, 37 insertions(+), 38 deletions(-)

diffs (214 lines):

diff -r 08b566d9ffee -r 28f089f63496 sys/netipsec/xform_ipcomp.c
--- a/sys/netipsec/xform_ipcomp.c       Thu Feb 15 12:40:12 2018 +0000
+++ b/sys/netipsec/xform_ipcomp.c       Thu Feb 15 13:51:32 2018 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: xform_ipcomp.c,v 1.56 2018/02/15 04:24:32 ozaki-r Exp $        */
+/*     $NetBSD: xform_ipcomp.c,v 1.57 2018/02/15 13:51:32 maxv Exp $   */
 /*     $FreeBSD: src/sys/netipsec/xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $       */
 /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */
 
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.56 2018/02/15 04:24:32 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.57 2018/02/15 13:51:32 maxv Exp $");
 
 /* IP payload compression protocol (IPComp), see RFC 2393 */
 #if defined(_KERNEL_OPT)
@@ -74,7 +74,7 @@
 
 percpu_t *ipcompstat_percpu;
 
-int    ipcomp_enable = 1;
+int ipcomp_enable = 1;
 
 #ifdef __FreeBSD__
 SYSCTL_DECL(_net_inet_ipcomp);
@@ -258,7 +258,7 @@
        struct secasindex *saidx __diagused;
        int hlen = IPCOMP_HLENGTH, error, clen;
        uint8_t nproto;
-       void *addr;
+       struct ipcomp *ipc;
        uint16_t dport;
        uint16_t sport;
        IPSEC_DECLARE_LOCK_VARIABLE;
@@ -303,27 +303,28 @@
        /* Update the counters */
        IPCOMP_STATADD(IPCOMP_STAT_IBYTES, m->m_pkthdr.len - skip - hlen);
 
-
-       clen = crp->crp_olen;           /* Length of data after processing */
+       /* Length of data after processing */
+       clen = crp->crp_olen;
 
        /* Release the crypto descriptors */
        pool_cache_put(ipcomp_tdb_crypto_pool_cache, tc);
        tc = NULL;
-       crypto_freereq(crp), crp = NULL;
+       crypto_freereq(crp);
+       crp = NULL;
 
        /* In case it's not done already, adjust the size of the mbuf chain */
        m->m_pkthdr.len = clen + hlen + skip;
 
        if (m->m_len < skip + hlen && (m = m_pullup(m, skip + hlen)) == 0) {
-               IPCOMP_STATINC(IPCOMP_STAT_HDROPS);     /*XXX*/
+               IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
                DPRINTF(("%s: m_pullup failed\n", __func__));
-               error = EINVAL;                         /*XXX*/
+               error = EINVAL;
                goto bad;
        }
 
        /* Keep the next protocol field */
-       addr = (uint8_t*) mtod(m, struct ip *) + skip;
-       nproto = ((struct ipcomp *) addr)->comp_nxt;
+       ipc = (struct ipcomp *)(mtod(m, uint8_t *) + skip);
+       nproto = ipc->comp_nxt;
        switch (nproto) {
        case IPPROTO_IPCOMP:
        case IPPROTO_AH:
@@ -349,13 +350,14 @@
        }
 
        /* Restore the Next Protocol field */
-       m_copyback(m, protoff, sizeof(uint8_t), (uint8_t *) &nproto);
+       m_copyback(m, protoff, sizeof(uint8_t), (uint8_t *)&nproto);
 
        IPSEC_COMMON_INPUT_CB(m, sav, skip, protoff);
 
        KEY_SA_UNREF(&sav);
        IPSEC_RELEASE_GLOBAL_LOCKS();
        return error;
+
 bad:
        if (sav)
                KEY_SA_UNREF(&sav);
@@ -373,14 +375,8 @@
  * IPComp output routine, called by ipsec[46]_process_packet()
  */
 static int
-ipcomp_output(
-    struct mbuf *m,
-    const struct ipsecrequest *isr,
-    struct secasvar *sav,
-    struct mbuf **mp,
-    int skip,
-    int protoff
-)
+ipcomp_output(struct mbuf *m, const struct ipsecrequest *isr,
+    struct secasvar *sav, struct mbuf **mp, int skip, int protoff)
 {
        char buf[IPSEC_ADDRSTRLEN];
        const struct comp_algo *ipcompx;
@@ -394,9 +390,10 @@
        KASSERT(sav->tdb_compalgxform != NULL);
        ipcompx = sav->tdb_compalgxform;
 
-       ralen = m->m_pkthdr.len - skip; /* Raw payload length before comp. */
-    
-    /* Don't process the packet if it is too short */
+       /* Raw payload length before comp. */
+       ralen = m->m_pkthdr.len - skip;
+
+       /* Don't process the packet if it is too short */
        if (ralen < ipcompx->minlen) {
                IPCOMP_STATINC(IPCOMP_STAT_MINLEN);
                return ipsec_process_done(m, isr, sav);
@@ -410,14 +407,14 @@
        switch (sav->sah->saidx.dst.sa.sa_family) {
 #ifdef INET
        case AF_INET:
-               maxpacketsize =  IP_MAXPACKET;
+               maxpacketsize = IP_MAXPACKET;
                break;
-#endif /* INET */
+#endif
 #ifdef INET6
        case AF_INET6:
-               maxpacketsize =  IPV6_MAXPACKET;
+               maxpacketsize = IPV6_MAXPACKET;
                break;
-#endif /* INET6 */
+#endif
        default:
                IPCOMP_STATINC(IPCOMP_STAT_NOPF);
                DPRINTF(("%s: unknown/unsupported protocol family %d"
@@ -522,10 +519,11 @@
        crp->crp_sid = sav->tdb_cryptoid;
 
        return crypto_dispatch(crp);
+
 bad:
        if (m)
                m_freem(m);
-       return (error);
+       return error;
 }
 
 /*
@@ -594,18 +592,18 @@
 #ifdef INET
                case AF_INET:
                        ipcomp->comp_nxt = mtod(m, struct ip *)->ip_p;
-                        break;
-#endif /* INET */
+                       break;
+#endif
 #ifdef INET6
                case AF_INET6:
                        ipcomp->comp_nxt = mtod(m, struct ip6_hdr *)->ip6_nxt;
-               break;
+                       break;
 #endif
                }
                ipcomp->comp_flags = 0;
 
                if ((sav->flags & SADB_X_EXT_RAWCPI) == 0)
-                        cpi = sav->alg_enc;
+                       cpi = sav->alg_enc;
                else
                        cpi = ntohl(sav->spi) & 0xffff;
                ipcomp->comp_cpi = htons(cpi);
@@ -620,13 +618,13 @@
                case AF_INET:
                        mtod(m, struct ip *)->ip_len = htons(m->m_pkthdr.len);
                        break;
-#endif /* INET */
+#endif
 #ifdef INET6
                case AF_INET6:
                        mtod(m, struct ip6_hdr *)->ip6_plen =
-                               htons(m->m_pkthdr.len) - sizeof(struct ip6_hdr);
+                           htons(m->m_pkthdr.len) - sizeof(struct ip6_hdr);
                        break;
-#endif /* INET6 */
+#endif
                default:
                        IPCOMP_STATINC(IPCOMP_STAT_NOPF);
                        DPRINTF(("ipcomp_output: unknown/unsupported protocol "
@@ -640,11 +638,11 @@
        } else {
                /* compression was useless, we have lost time */
                IPCOMP_STATINC(IPCOMP_STAT_USELESS);
-               DPRINTF(("ipcomp_output_cb: compression was useless : initial size was %d"
-                                       "and compressed size is %d\n", rlen, crp->crp_olen));
+               DPRINTF(("ipcomp_output_cb: compression was useless: initial"
+                   "size was %d and compressed size is %d\n", rlen,
+                   crp->crp_olen));
        }
 
-
        /* Release the crypto descriptor */
        pool_cache_put(ipcomp_tdb_crypto_pool_cache, tc);
        crypto_freereq(crp);
@@ -655,6 +653,7 @@
        KEY_SP_UNREF(&isr->sp);
        IPSEC_RELEASE_GLOBAL_LOCKS();
        return error;
+
 bad:
        if (sav)
                KEY_SA_UNREF(&sav);



Home | Main Index | Thread Index | Old Index