Module Name: src Committed By: ozaki-r Date: Wed Apr 26 08:36:32 UTC 2017
Modified Files: src/sys/netipsec: key.c Log Message: Replace leading whitespaces with tabs and tweak some indentations To generate a diff of this commit: cvs rdiff -u -r1.117 -r1.118 src/sys/netipsec/key.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netipsec/key.c diff -u src/sys/netipsec/key.c:1.117 src/sys/netipsec/key.c:1.118 --- src/sys/netipsec/key.c:1.117 Wed Apr 26 07:17:38 2017 +++ src/sys/netipsec/key.c Wed Apr 26 08:36:32 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: key.c,v 1.117 2017/04/26 07:17:38 ozaki-r Exp $ */ +/* $NetBSD: key.c,v 1.118 2017/04/26 08:36:32 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.117 2017/04/26 07:17:38 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.118 2017/04/26 08:36:32 ozaki-r Exp $"); /* * This code is referd to RFC 2367 @@ -1878,9 +1878,9 @@ key_spdadd(struct socket *so, struct mbu } /* policy requests are mandatory when action is ipsec. */ - if (mhp->msg->sadb_msg_type != SADB_X_SPDSETIDX - && xpl0->sadb_x_policy_type == IPSEC_POLICY_IPSEC - && mhp->extlen[SADB_X_EXT_POLICY] <= sizeof(*xpl0)) { + if (mhp->msg->sadb_msg_type != SADB_X_SPDSETIDX && + xpl0->sadb_x_policy_type == IPSEC_POLICY_IPSEC && + mhp->extlen[SADB_X_EXT_POLICY] <= sizeof(*xpl0)) { ipseclog((LOG_DEBUG, "key_spdadd: some policy requests part required.\n")); return key_senderror(so, m, EINVAL); } @@ -2287,8 +2287,8 @@ key_spdget(struct socket *so, struct mbu } n = key_setdumpsp(sp, SADB_X_SPDGET, mhp->msg->sadb_msg_seq, - mhp->msg->sadb_msg_pid); - KEY_FREESP(&sp); /* ref gained by key_getspbyid */ + mhp->msg->sadb_msg_pid); + KEY_FREESP(&sp); /* ref gained by key_getspbyid */ if (n != NULL) { m_freem(m); return key_sendup_mbuf(so, n, KEY_SENDUP_ONE); @@ -3815,23 +3815,23 @@ key_porttosaddr(union sockaddr_union *sa static int key_checksalen(const union sockaddr_union *saddr) { - switch (saddr->sa.sa_family) { - case AF_INET: - if (saddr->sa.sa_len != sizeof(struct sockaddr_in)) - return -1; - break; + switch (saddr->sa.sa_family) { + case AF_INET: + if (saddr->sa.sa_len != sizeof(struct sockaddr_in)) + return -1; + break; #ifdef INET6 - case AF_INET6: - if (saddr->sa.sa_len != sizeof(struct sockaddr_in6)) - return -1; - break; -#endif - default: - printf("%s: unexpected sa_family %d\n", __func__, - saddr->sa.sa_family); - return -1; - break; - } + case AF_INET6: + if (saddr->sa.sa_len != sizeof(struct sockaddr_in6)) + return -1; + break; +#endif + default: + printf("%s: unexpected sa_family %d\n", __func__, + saddr->sa.sa_family); + return -1; + break; + } return 0; } @@ -4977,7 +4977,7 @@ key_getspi(struct socket *so, struct mbu acq->created = time_uptime; acq->count = 0; } - } + } #endif {