Module Name:    src
Committed By:   christos
Date:           Wed Jun 12 22:23:50 UTC 2019

Modified Files:
        src/sys/netipsec: ipsec.h keysock.c xform_ah.c xform_esp.c
            xform_ipcomp.c xform_ipip.c xform_tcp.c

Log Message:
make DPRINTF use varyadic cpp macros, and merge with IPSECLOG.


To generate a diff of this commit:
cvs rdiff -u -r1.87 -r1.88 src/sys/netipsec/ipsec.h
cvs rdiff -u -r1.69 -r1.70 src/sys/netipsec/keysock.c
cvs rdiff -u -r1.107 -r1.108 src/sys/netipsec/xform_ah.c
cvs rdiff -u -r1.97 -r1.98 src/sys/netipsec/xform_esp.c
cvs rdiff -u -r1.67 -r1.68 src/sys/netipsec/xform_ipcomp.c
cvs rdiff -u -r1.75 -r1.76 src/sys/netipsec/xform_ipip.c
cvs rdiff -u -r1.22 -r1.23 src/sys/netipsec/xform_tcp.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec.h
diff -u src/sys/netipsec/ipsec.h:1.87 src/sys/netipsec/ipsec.h:1.88
--- src/sys/netipsec/ipsec.h:1.87	Wed Jan 16 21:47:15 2019
+++ src/sys/netipsec/ipsec.h	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec.h,v 1.87 2019/01/17 02:47:15 knakahara Exp $	*/
+/*	$NetBSD: ipsec.h,v 1.88 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: ipsec.h,v 1.2.4.2 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $	*/
 
@@ -237,13 +237,17 @@ extern int crypto_support;
 
 #include <sys/syslog.h>
 
-#define	DPRINTF(x)	do { if (ipsec_debug) printf x; } while (0)
+#define	DPRINTF(fmt, args...) 						\
+	do {								\
+		if (ipsec_debug)					\
+			log(LOG_DEBUG, "%s: " fmt, __func__, ##args);	\
+	} while (/*CONSTCOND*/0)
 
 #define IPSECLOG(level, fmt, args...) 					\
 	do {								\
 		if (ipsec_debug)					\
 			log(level, "%s: " fmt, __func__, ##args);	\
-	} while (0)
+	} while (/*CONSTCOND*/0)
 
 #define ipsec_indone(m)	\
 	((m->m_flags & M_AUTHIPHDR) || (m->m_flags & M_DECRYPTED))

Index: src/sys/netipsec/keysock.c
diff -u src/sys/netipsec/keysock.c:1.69 src/sys/netipsec/keysock.c:1.70
--- src/sys/netipsec/keysock.c:1.69	Tue Feb 26 01:52:34 2019
+++ src/sys/netipsec/keysock.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: keysock.c,v 1.69 2019/02/26 06:52:34 maxv Exp $	*/
+/*	$NetBSD: keysock.c,v 1.70 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: keysock.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$KAME: keysock.c,v 1.25 2001/08/13 20:07:41 itojun Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.69 2019/02/26 06:52:34 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.70 2019/06/12 22:23:50 christos Exp $");
 
 /* This code has derived from sys/net/rtsock.c on FreeBSD2.2.5 */
 
@@ -437,7 +437,7 @@ key_accept(struct socket *so, struct soc
 {
 	KASSERT(solocked(so));
 
-	panic("key_accept");
+	panic("%s: unsupported", __func__);
 
 	return EOPNOTSUPP;
 }
@@ -513,7 +513,7 @@ key_abort(struct socket *so)
 {
 	KASSERT(solocked(so));
 
-	panic("key_abort");
+	panic("%s: unsupported", __func__);
 
 	return EOPNOTSUPP;
 }
@@ -612,7 +612,7 @@ static int
 key_purgeif(struct socket *so, struct ifnet *ifa)
 {
 
-	panic("key_purgeif");
+	panic("%s: unsupported", __func__);
 
 	return EOPNOTSUPP;
 }

Index: src/sys/netipsec/xform_ah.c
diff -u src/sys/netipsec/xform_ah.c:1.107 src/sys/netipsec/xform_ah.c:1.108
--- src/sys/netipsec/xform_ah.c:1.107	Sat Jan 26 21:08:48 2019
+++ src/sys/netipsec/xform_ah.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ah.c,v 1.107 2019/01/27 02:08:48 pgoyette Exp $	*/
+/*	$NetBSD: xform_ah.c,v 1.108 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: xform_ah.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_ah.c,v 1.63 2001/06/26 06:18:58 angelos Exp $ */
 /*
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.107 2019/01/27 02:08:48 pgoyette Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.108 2019/06/12 22:23:50 christos Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -201,8 +201,8 @@ ah_init0(struct secasvar *sav, const str
 
 	thash = ah_algorithm_lookup(sav->alg_auth);
 	if (thash == NULL) {
-		DPRINTF(("%s: unsupported authentication algorithm %u\n",
-			__func__, sav->alg_auth));
+		DPRINTF("unsupported authentication algorithm %u\n",
+		    sav->alg_auth);
 		return EINVAL;
 	}
 	/*
@@ -212,22 +212,22 @@ ah_init0(struct secasvar *sav, const str
 	 */
 	/* NB: replay state is setup elsewhere (sigh) */
 	if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) {
-		DPRINTF(("%s: replay state block inconsistency, "
-			"%s algorithm %s replay state\n", __func__,
-			(sav->flags & SADB_X_EXT_OLD) ? "old" : "new",
-			sav->replay == NULL ? "without" : "with"));
+		DPRINTF("replay state block inconsistency, "
+		    "%s algorithm %s replay state\n",
+		    (sav->flags & SADB_X_EXT_OLD) ? "old" : "new",
+		    sav->replay == NULL ? "without" : "with");
 		return EINVAL;
 	}
 	if (sav->key_auth == NULL) {
-		DPRINTF(("%s: no authentication key for %s algorithm\n",
-			__func__, thash->name));
+		DPRINTF("no authentication key for %s algorithm\n",
+		    thash->name);
 		return EINVAL;
 	}
 	keylen = _KEYLEN(sav->key_auth);
 	if (keylen != thash->keysize && thash->keysize != 0) {
-		DPRINTF(("%s: invalid keylength %d, algorithm %s requires "
-			 "keysize %d\n", __func__,
-			 keylen, thash->name, thash->keysize));
+		DPRINTF("invalid keylength %d, algorithm %s requires "
+		    "keysize %d\n",
+		    keylen, thash->name, thash->keysize);
 		return EINVAL;
 	}
 
@@ -310,7 +310,7 @@ ah_massage_headers(struct mbuf **m0, int
 		 */
 		*m0 = m = m_pullup(m, skip);
 		if (m == NULL) {
-			DPRINTF(("%s: m_pullup failed\n", __func__));
+			DPRINTF("m_pullup failed\n");
 			return ENOBUFS;
 		}
 
@@ -398,7 +398,7 @@ ah_massage_headers(struct mbuf **m0, int
 
 		/* We don't do IPv6 Jumbograms. */
 		if (ip6.ip6_plen == 0) {
-			DPRINTF(("%s: unsupported IPv6 jumbogram\n", __func__));
+			DPRINTF("unsupported IPv6 jumbogram\n");
 			m_freem(m);
 			return EMSGSIZE;
 		}
@@ -424,9 +424,8 @@ ah_massage_headers(struct mbuf **m0, int
 			if (m->m_len <= skip) {
 				ptr = malloc(ip6optlen, M_XDATA, M_NOWAIT);
 				if (ptr == NULL) {
-					DPRINTF(("%s: failed to allocate "
-					    "memory for IPv6 headers\n",
-					    __func__));
+					DPRINTF("failed to allocate "
+					    "memory for IPv6 headers\n");
 					m_freem(m);
 					return ENOBUFS;
 				}
@@ -555,8 +554,8 @@ ah_input(struct mbuf *m, struct secasvar
 	/* Check replay window, if applicable. */
 	if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) {
 		char buf[IPSEC_LOGSASTRLEN];
-		DPRINTF(("%s: packet replay failure: %s\n", __func__,
-		    ipsec_logsastr(sav, buf, sizeof(buf))));
+		DPRINTF("packet replay failure: %s\n",
+		    ipsec_logsastr(sav, buf, sizeof(buf)));
 		stat = AH_STAT_REPLAY;
 		error = EACCES;
 		goto bad;
@@ -569,22 +568,22 @@ ah_input(struct mbuf *m, struct secasvar
 	ahsize = ah_hdrsiz(sav);
 	if (hl != ahsize) {
 		char buf[IPSEC_ADDRSTRLEN];
-		DPRINTF(("%s: bad authenticator length %u (expecting %lu)"
-			" for packet in SA %s/%08lx\n", __func__,
-			hl, (u_long)ahsize,
-			ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-			(u_long) ntohl(sav->spi)));
+		DPRINTF("bad authenticator length %u (expecting %lu)"
+		    " for packet in SA %s/%08lx\n",
+		    hl, (u_long)ahsize,
+		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
+		    (u_long) ntohl(sav->spi));
 		stat = AH_STAT_BADAUTHL;
 		error = EACCES;
 		goto bad;
 	}
 	if (skip + ahsize > m->m_pkthdr.len) {
 		char buf[IPSEC_ADDRSTRLEN];
-		DPRINTF(("%s: bad mbuf length %u (expecting >= %lu)"
-			" for packet in SA %s/%08lx\n", __func__,
-			m->m_pkthdr.len, (u_long)(skip + ahsize),
-			ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-			(u_long) ntohl(sav->spi)));
+		DPRINTF("bad mbuf length %u (expecting >= %lu)"
+		    " for packet in SA %s/%08lx\n",
+		    m->m_pkthdr.len, (u_long)(skip + ahsize),
+		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
+		    (u_long) ntohl(sav->spi));
 		stat = AH_STAT_BADAUTHL;
 		error = EACCES;
 		goto bad;
@@ -595,7 +594,7 @@ ah_input(struct mbuf *m, struct secasvar
 	/* Get crypto descriptors. */
 	crp = crypto_getreq(1);
 	if (crp == NULL) {
-		DPRINTF(("%s: failed to acquire crypto descriptor\n", __func__));
+		DPRINTF("failed to acquire crypto descriptor\n");
 		stat = AH_STAT_CRYPTO;
 		error = ENOBUFS;
 		goto bad;
@@ -627,7 +626,7 @@ ah_input(struct mbuf *m, struct secasvar
 		pool_used = false;
 	}
 	if (tc == NULL) {
-		DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
+		DPRINTF("failed to allocate tdb_crypto\n");
 		stat = AH_STAT_CRYPTO;
 		error = ENOBUFS;
 		goto bad;
@@ -635,7 +634,7 @@ ah_input(struct mbuf *m, struct secasvar
 
 	error = m_makewritable(&m, 0, extra, M_NOWAIT);
 	if (error) {
-		DPRINTF(("%s: failed to m_makewritable\n", __func__));
+		DPRINTF("failed to m_makewritable\n");
 		goto bad;
 	}
 
@@ -689,10 +688,10 @@ ah_input(struct mbuf *m, struct secasvar
 	tc->tc_skip = skip;
 	tc->tc_sav = sav;
 
-	DPRINTF(("%s: hash over %d bytes, skip %d: "
-		 "crda len %d skip %d inject %d\n", __func__,
-		 crp->crp_ilen, tc->tc_skip,
-		 crda->crd_len, crda->crd_skip, crda->crd_inject));
+	DPRINTF("hash over %d bytes, skip %d: "
+	     "crda len %d skip %d inject %d\n",
+	     crp->crp_ilen, tc->tc_skip,
+	     crda->crd_len, crda->crd_skip, crda->crd_inject);
 
 	return crypto_dispatch(crp);
 
@@ -781,7 +780,7 @@ ah_input_cb(struct cryptop *crp)
 		}
 
 		AH_STATINC(AH_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	} else {
@@ -801,21 +800,19 @@ ah_input_cb(struct cryptop *crp)
 
 	/* Verify authenticator. */
 	if (!consttime_memequal(pppp, calc, authsize)) {
-		DPRINTF(("%s: authentication hash mismatch " \
+		DPRINTF("authentication hash mismatch " \
 		    "over %d bytes " \
 		    "for packet in SA %s/%08lx:\n" \
-	    "%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x, " \
-	    "%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x\n",
-		    __func__, authsize,
-		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
+		    "%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x, " \
+		    "%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x\n",
+		    authsize, ipsec_address(&saidx->dst, buf, sizeof(buf)),
 		    (u_long) ntohl(sav->spi),
-			 calc[0], calc[1], calc[2], calc[3],
-			 calc[4], calc[5], calc[6], calc[7],
-			 calc[8], calc[9], calc[10], calc[11],
-			 pppp[0], pppp[1], pppp[2], pppp[3],
-			 pppp[4], pppp[5], pppp[6], pppp[7],
-			 pppp[8], pppp[9], pppp[10], pppp[11]
-			 ));
+		     calc[0], calc[1], calc[2], calc[3],
+		     calc[4], calc[5], calc[6], calc[7],
+		     calc[8], calc[9], calc[10], calc[11],
+		     pppp[0], pppp[1], pppp[2], pppp[3],
+		     pppp[4], pppp[5], pppp[6], pppp[7],
+		     pppp[8], pppp[9], pppp[10], pppp[11]);
 		AH_STATINC(AH_STAT_BADAUTH);
 		error = EACCES;
 		goto bad;
@@ -858,9 +855,9 @@ ah_input_cb(struct cryptop *crp)
 	 */
 	error = m_striphdr(m, skip, ahsize);
 	if (error) {
-		DPRINTF(("%s: mangled mbuf chain for SA %s/%08lx\n", __func__,
+		DPRINTF("mangled mbuf chain for SA %s/%08lx\n",
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 
 		AH_STATINC(AH_STAT_HDROPS);
 		goto bad;
@@ -935,21 +932,21 @@ ah_output(struct mbuf *m, const struct i
 		break;
 #endif
 	default:
-		DPRINTF(("%s: unknown/unsupported protocol "
-		    "family %u, SA %s/%08lx\n", __func__,
+		DPRINTF("unknown/unsupported protocol "
+		    "family %u, SA %s/%08lx\n",
 		    sav->sah->saidx.dst.sa.sa_family,
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		AH_STATINC(AH_STAT_NOPF);
 		error = EPFNOSUPPORT;
 		goto bad;
 	}
 	if (ahsize + m->m_pkthdr.len > maxpacketsize) {
-		DPRINTF(("%s: packet in SA %s/%08lx got too big "
-		    "(len %u, max len %u)\n", __func__,
+		DPRINTF("packet in SA %s/%08lx got too big "
+		    "(len %u, max len %u)\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
 		    (u_long) ntohl(sav->spi),
-		    ahsize + m->m_pkthdr.len, maxpacketsize));
+		    ahsize + m->m_pkthdr.len, maxpacketsize);
 		AH_STATINC(AH_STAT_TOOBIG);
 		error = EMSGSIZE;
 		goto bad;
@@ -960,9 +957,9 @@ ah_output(struct mbuf *m, const struct i
 
 	m = m_clone(m);
 	if (m == NULL) {
-		DPRINTF(("%s: cannot clone mbuf chain, SA %s/%08lx\n", __func__,
+		DPRINTF("cannot clone mbuf chain, SA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		AH_STATINC(AH_STAT_HDROPS);
 		error = ENOBUFS;
 		goto bad;
@@ -971,10 +968,10 @@ ah_output(struct mbuf *m, const struct i
 	/* Inject AH header. */
 	mi = m_makespace(m, skip, ahsize, &roff);
 	if (mi == NULL) {
-		DPRINTF(("%s: failed to inject %u byte AH header for SA "
-		    "%s/%08lx\n", __func__, ahsize,
+		DPRINTF("failed to inject %u byte AH header for SA "
+		    "%s/%08lx\n", ahsize,
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		AH_STATINC(AH_STAT_HDROPS);
 		error = ENOBUFS;
 		goto bad;
@@ -1003,9 +1000,9 @@ ah_output(struct mbuf *m, const struct i
 	if (sav->replay) {
 		if (sav->replay->count == ~0 &&
 		    (sav->flags & SADB_X_EXT_CYCSEQ) == 0) {
-			DPRINTF(("%s: replay counter wrapped for SA %s/%08lx\n",
-			    __func__, ipsec_address(&sav->sah->saidx.dst, buf,
-			    sizeof(buf)), (u_long) ntohl(sav->spi)));
+			DPRINTF("replay counter wrapped for SA %s/%08lx\n",
+			    ipsec_address(&sav->sah->saidx.dst, buf,
+			    sizeof(buf)), (u_long) ntohl(sav->spi));
 			AH_STATINC(AH_STAT_WRAP);
 			error = EINVAL;
 			goto bad;
@@ -1021,8 +1018,7 @@ ah_output(struct mbuf *m, const struct i
 	/* Get crypto descriptors. */
 	crp = crypto_getreq(1);
 	if (crp == NULL) {
-		DPRINTF(("%s: failed to acquire crypto descriptors\n",
-		    __func__));
+		DPRINTF("failed to acquire crypto descriptors\n");
 		AH_STATINC(AH_STAT_CRYPTO);
 		error = ENOBUFS;
 		goto bad;
@@ -1051,7 +1047,7 @@ ah_output(struct mbuf *m, const struct i
 		pool_used = false;
 	}
 	if (tc == NULL) {
-		DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
+		DPRINTF("failed to allocate tdb_crypto\n");
 		AH_STATINC(AH_STAT_CRYPTO);
 		error = ENOBUFS;
 		goto bad_crp;
@@ -1176,7 +1172,7 @@ ah_output_cb(struct cryptop *crp)
 		}
 
 		AH_STATINC(AH_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	}

Index: src/sys/netipsec/xform_esp.c
diff -u src/sys/netipsec/xform_esp.c:1.97 src/sys/netipsec/xform_esp.c:1.98
--- src/sys/netipsec/xform_esp.c:1.97	Sat Jan 26 21:08:48 2019
+++ src/sys/netipsec/xform_esp.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_esp.c,v 1.97 2019/01/27 02:08:48 pgoyette Exp $	*/
+/*	$NetBSD: xform_esp.c,v 1.98 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: xform_esp.c,v 1.2.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_esp.c,v 1.69 2001/06/26 06:18:59 angelos Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.97 2019/01/27 02:08:48 pgoyette Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.98 2019/06/12 22:23:50 christos Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -186,25 +186,24 @@ esp_init(struct secasvar *sav, const str
 
 	txform = esp_algorithm_lookup(sav->alg_enc);
 	if (txform == NULL) {
-		DPRINTF(("%s: unsupported encryption algorithm %d\n", __func__,
-		    sav->alg_enc));
+		DPRINTF("unsupported encryption algorithm %d\n",
+		    sav->alg_enc);
 		return EINVAL;
 	}
 	if (sav->key_enc == NULL) {
-		DPRINTF(("%s: no encoding key for %s algorithm\n", __func__,
-		    txform->name));
+		DPRINTF("no encoding key for %s algorithm\n",
+		    txform->name);
 		return EINVAL;
 	}
 	if ((sav->flags&(SADB_X_EXT_OLD|SADB_X_EXT_IV4B)) == SADB_X_EXT_IV4B) {
-		DPRINTF(("%s: 4-byte IV not supported with protocol\n",
-		    __func__));
+		DPRINTF("4-byte IV not supported with protocol\n");
 		return EINVAL;
 	}
 	keylen = _KEYLEN(sav->key_enc);
 	if (txform->minkey > keylen || keylen > txform->maxkey) {
-		DPRINTF(("%s: invalid key length %u, must be in "
-		    "the range [%u..%u] for algorithm %s\n", __func__,
-		    keylen, txform->minkey, txform->maxkey, txform->name));
+		DPRINTF("invalid key length %u, must be in "
+		    "the range [%u..%u] for algorithm %s\n",
+		    keylen, txform->minkey, txform->maxkey, txform->name);
 		return EINVAL;
 	}
 
@@ -240,8 +239,8 @@ esp_init(struct secasvar *sav, const str
 			sav->tdb_authalgxform = &auth_hash_gmac_aes_256;
 			break;
 		default:
-			DPRINTF(("%s: invalid key length %u, must be either of "
-				"20, 28 or 36\n", __func__, keylen));
+			DPRINTF("invalid key length %u, must be either of "
+			    "20, 28 or 36\n", keylen);
 			return EINVAL;
 		}
 
@@ -271,8 +270,7 @@ esp_init(struct secasvar *sav, const str
 		cr = &cria;
 	} else {
 		/* XXX cannot happen? */
-		DPRINTF(("%s: no encoding OR authentication xform!\n",
-		    __func__));
+		DPRINTF("no encoding OR authentication xform!\n");
 		return EINVAL;
 	}
 
@@ -347,10 +345,10 @@ esp_input(struct mbuf *m, struct secasva
 	KASSERT((espx->blocksize & 3) == 0);
 	if ((plen & (espx->blocksize - 1)) || (plen <= 0)) {
 		char buf[IPSEC_ADDRSTRLEN];
-		DPRINTF(("%s: payload of %d octets not a multiple of %d octets,"
-		    "  SA %s/%08lx\n", __func__, plen, espx->blocksize,
+		DPRINTF("payload of %d octets not a multiple of %d octets,"
+		    "  SA %s/%08lx\n", plen, espx->blocksize,
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		stat = ESP_STAT_BADILEN;
 		error = EINVAL;
 		goto out;
@@ -361,8 +359,8 @@ esp_input(struct mbuf *m, struct secasva
 	 */
 	if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) {
 		char logbuf[IPSEC_LOGSASTRLEN];
-		DPRINTF(("%s: packet replay check for %s\n", __func__,
-		    ipsec_logsastr(sav, logbuf, sizeof(logbuf))));
+		DPRINTF("packet replay check for %s\n",
+		    ipsec_logsastr(sav, logbuf, sizeof(logbuf)));
 		stat = ESP_STAT_REPLAY;
 		error = EACCES;
 		goto out;
@@ -374,8 +372,7 @@ esp_input(struct mbuf *m, struct secasva
 	/* Get crypto descriptors */
 	crp = crypto_getreq(esph ? 2 : 1);
 	if (crp == NULL) {
-		DPRINTF(("%s: failed to acquire crypto descriptors\n",
-		    __func__));
+		DPRINTF("failed to acquire crypto descriptors\n");
 		error = ENOBUFS;
 		goto out;
 	}
@@ -387,14 +384,14 @@ esp_input(struct mbuf *m, struct secasva
 	    sizeof(*tc) + extra, esp_pool_item_size);
 	tc = pool_cache_get(esp_tdb_crypto_pool_cache, PR_NOWAIT);
 	if (tc == NULL) {
-		DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
+		DPRINTF("failed to allocate tdb_crypto\n");
 		error = ENOBUFS;
 		goto out1;
 	}
 
 	error = m_makewritable(&m, 0, m->m_pkthdr.len, M_NOWAIT);
 	if (error) {
-		DPRINTF(("%s: m_makewritable failed\n", __func__));
+		DPRINTF("m_makewritable failed\n");
 		goto out2;
 	}
 
@@ -549,7 +546,7 @@ esp_input_cb(struct cryptop *crp)
 		}
 
 		ESP_STATINC(ESP_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	}
@@ -572,10 +569,10 @@ esp_input_cb(struct cryptop *crp)
 
 		/* Verify authenticator */
 		if (!consttime_memequal(ptr, aalg, esph->authsize)) {
-			DPRINTF(("%s: authentication hash mismatch "
-			    "for packet in SA %s/%08lx\n", __func__,
+			DPRINTF("authentication hash mismatch "
+			    "for packet in SA %s/%08lx\n",
 			    ipsec_address(&saidx->dst, buf,
-			    sizeof(buf)), (u_long) ntohl(sav->spi)));
+			    sizeof(buf)), (u_long) ntohl(sav->spi));
 			ESP_STATINC(ESP_STAT_BADAUTH);
 			error = EACCES;
 			goto bad;
@@ -606,8 +603,8 @@ esp_input_cb(struct cryptop *crp)
 		    sizeof(seq), &seq);
 		if (ipsec_updatereplay(ntohl(seq), sav)) {
 			char logbuf[IPSEC_LOGSASTRLEN];
-			DPRINTF(("%s: packet replay check for %s\n", __func__,
-			    ipsec_logsastr(sav, logbuf, sizeof(logbuf))));
+			DPRINTF("packet replay check for %s\n",
+			    ipsec_logsastr(sav, logbuf, sizeof(logbuf)));
 			ESP_STATINC(ESP_STAT_REPLAY);
 			error = EACCES;
 			goto bad;
@@ -624,9 +621,9 @@ esp_input_cb(struct cryptop *crp)
 	error = m_striphdr(m, skip, hlen);
 	if (error) {
 		ESP_STATINC(ESP_STAT_HDROPS);
-		DPRINTF(("%s: bad mbuf chain, SA %s/%08lx\n", __func__,
+		DPRINTF("bad mbuf chain, SA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		goto bad;
 	}
 
@@ -636,11 +633,11 @@ esp_input_cb(struct cryptop *crp)
 	/* Verify pad length */
 	if (lastthree[1] + 2 > m->m_pkthdr.len - skip) {
 		ESP_STATINC(ESP_STAT_BADILEN);
-		DPRINTF(("%s: invalid padding length %d "
-		    "for %u byte packet in SA %s/%08lx\n", __func__,
+		DPRINTF("invalid padding length %d "
+		    "for %u byte packet in SA %s/%08lx\n",
 		    lastthree[1], m->m_pkthdr.len - skip,
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		error = EINVAL;
 		goto bad;
 	}
@@ -649,12 +646,12 @@ esp_input_cb(struct cryptop *crp)
 	if ((sav->flags & SADB_X_EXT_PMASK) != SADB_X_EXT_PRAND) {
 		if (lastthree[1] != lastthree[0] && lastthree[1] != 0) {
 			ESP_STATINC(ESP_STAT_BADENC);
-			DPRINTF(("%s: decryption failed for packet in SA "
-			    "%s/%08lx\n", __func__,
+			DPRINTF("decryption failed for packet in SA "
+			    "%s/%08lx\n",
 			    ipsec_address(&sav->sah->saidx.dst, buf,
-			    sizeof(buf)), (u_long) ntohl(sav->spi)));
-			DPRINTF(("%s: %x %x\n", __func__, lastthree[0],
-			    lastthree[1]));
+			    sizeof(buf)), (u_long) ntohl(sav->spi));
+			DPRINTF("%x %x\n", lastthree[0],
+			    lastthree[1]);
 			error = EINVAL;
 			goto bad;
 		}
@@ -748,20 +745,20 @@ esp_output(struct mbuf *m, const struct 
 		break;
 #endif
 	default:
-		DPRINTF(("%s: unknown/unsupported protocol family %d, "
-		    "SA %s/%08lx\n", __func__, saidx->dst.sa.sa_family,
+		DPRINTF("unknown/unsupported protocol family %d, "
+		    "SA %s/%08lx\n", saidx->dst.sa.sa_family,
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-		    (u_long)ntohl(sav->spi)));
+		    (u_long)ntohl(sav->spi));
 		ESP_STATINC(ESP_STAT_NOPF);
 		error = EPFNOSUPPORT;
 		goto bad;
 	}
 	if (skip + hlen + rlen + tlen > maxpacketsize) {
-		DPRINTF(("%s: packet in SA %s/%08lx got too big (len %u, "
-		    "max len %u)\n", __func__,
+		DPRINTF("packet in SA %s/%08lx got too big (len %u, "
+		    "max len %u)\n",
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
 		    (u_long) ntohl(sav->spi),
-		    skip + hlen + rlen + tlen, maxpacketsize));
+		    skip + hlen + rlen + tlen, maxpacketsize);
 		ESP_STATINC(ESP_STAT_TOOBIG);
 		error = EMSGSIZE;
 		goto bad;
@@ -772,9 +769,9 @@ esp_output(struct mbuf *m, const struct 
 
 	m = m_clone(m);
 	if (m == NULL) {
-		DPRINTF(("%s: cannot clone mbuf chain, SA %s/%08lx\n", __func__,
+		DPRINTF("cannot clone mbuf chain, SA %s/%08lx\n",
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		ESP_STATINC(ESP_STAT_HDROPS);
 		error = ENOBUFS;
 		goto bad;
@@ -783,10 +780,10 @@ esp_output(struct mbuf *m, const struct 
 	/* Inject ESP header. */
 	mo = m_makespace(m, skip, hlen, &roff);
 	if (mo == NULL) {
-		DPRINTF(("%s: failed to inject %u byte ESP hdr for SA "
-		    "%s/%08lx\n", __func__, hlen,
+		DPRINTF("failed to inject %u byte ESP hdr for SA "
+		    "%s/%08lx\n", hlen,
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		ESP_STATINC(ESP_STAT_HDROPS);
 		error = ENOBUFS;
 		goto bad;
@@ -813,9 +810,9 @@ esp_output(struct mbuf *m, const struct 
 	 */
 	tail = m_pad(m, tlen);
 	if (tail == NULL) {
-		DPRINTF(("%s: m_pad failed for SA %s/%08lx\n", __func__,
+		DPRINTF("m_pad failed for SA %s/%08lx\n",
 		    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		m = NULL;
 		error = ENOBUFS;
 		goto bad;
@@ -850,8 +847,7 @@ esp_output(struct mbuf *m, const struct 
 	/* Get crypto descriptors. */
 	crp = crypto_getreq(esph ? 2 : 1);
 	if (crp == NULL) {
-		DPRINTF(("%s: failed to acquire crypto descriptors\n",
-		    __func__));
+		DPRINTF("failed to acquire crypto descriptors\n");
 		ESP_STATINC(ESP_STAT_CRYPTO);
 		error = ENOBUFS;
 		goto bad;
@@ -878,7 +874,7 @@ esp_output(struct mbuf *m, const struct 
 	tc = pool_cache_get(esp_tdb_crypto_pool_cache, PR_NOWAIT);
 	if (tc == NULL) {
 		crypto_freereq(crp);
-		DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
+		DPRINTF("failed to allocate tdb_crypto\n");
 		ESP_STATINC(ESP_STAT_CRYPTO);
 		error = ENOBUFS;
 		goto bad;
@@ -982,7 +978,7 @@ esp_output_cb(struct cryptop *crp)
 		}
 
 		ESP_STATINC(ESP_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	}

Index: src/sys/netipsec/xform_ipcomp.c
diff -u src/sys/netipsec/xform_ipcomp.c:1.67 src/sys/netipsec/xform_ipcomp.c:1.68
--- src/sys/netipsec/xform_ipcomp.c:1.67	Sat Jan 26 21:08:48 2019
+++ src/sys/netipsec/xform_ipcomp.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipcomp.c,v 1.67 2019/01/27 02:08:48 pgoyette Exp $	*/
+/*	$NetBSD: xform_ipcomp.c,v 1.68 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */
 
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.67 2019/01/27 02:08:48 pgoyette Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.68 2019/06/12 22:23:50 christos Exp $");
 
 /* IP payload compression protocol (IPComp), see RFC 2393 */
 #if defined(_KERNEL_OPT)
@@ -105,8 +105,8 @@ ipcomp_init(struct secasvar *sav, const 
 	/* NB: algorithm really comes in alg_enc and not alg_comp! */
 	tcomp = ipcomp_algorithm_lookup(sav->alg_enc);
 	if (tcomp == NULL) {
-		DPRINTF(("%s: unsupported compression algorithm %d\n",
-		    __func__, sav->alg_comp));
+		DPRINTF("unsupported compression algorithm %d\n",
+		    sav->alg_comp);
 		return EINVAL;
 	}
 	sav->alg_comp = sav->alg_enc;		/* set for doing histogram */
@@ -150,21 +150,21 @@ ipcomp_input(struct mbuf *m, struct seca
 	/* Get crypto descriptors */
 	crp = crypto_getreq(1);
 	if (crp == NULL) {
-		DPRINTF(("%s: no crypto descriptors\n", __func__));
+		DPRINTF("no crypto descriptors\n");
 		error = ENOBUFS;
 		goto error_m;
 	}
 	/* Get IPsec-specific opaque pointer */
 	tc = pool_cache_get(ipcomp_tdb_crypto_pool_cache, PR_NOWAIT);
 	if (tc == NULL) {
-		DPRINTF(("%s: cannot allocate tdb_crypto\n", __func__));
+		DPRINTF("cannot allocate tdb_crypto\n");
 		error = ENOBUFS;
 		goto error_crp;
 	}
 
 	error = m_makewritable(&m, 0, m->m_pkthdr.len, M_NOWAIT);
 	if (error) {
-		DPRINTF(("%s: m_makewritable failed\n", __func__));
+		DPRINTF("m_makewritable failed\n");
 		goto error_tc;
 	}
 
@@ -279,7 +279,7 @@ ipcomp_input_cb(struct cryptop *crp)
 		}
 
 		IPCOMP_STATINC(IPCOMP_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	}
@@ -308,7 +308,7 @@ ipcomp_input_cb(struct cryptop *crp)
 	 */
 	if (m->m_len < skip + hlen && (m = m_pullup(m, skip + hlen)) == 0) {
 		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
-		DPRINTF(("%s: m_pullup failed\n", __func__));
+		DPRINTF("m_pullup failed\n");
 		error = EINVAL;
 		goto bad;
 	}
@@ -320,9 +320,9 @@ ipcomp_input_cb(struct cryptop *crp)
 	case IPPROTO_AH:
 	case IPPROTO_ESP:
 		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
-		DPRINTF(("%s: nested ipcomp, IPCA %s/%08lx\n", __func__,
+		DPRINTF("nested ipcomp, IPCA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		error = EINVAL;
 		goto bad;
 	default:
@@ -333,9 +333,9 @@ ipcomp_input_cb(struct cryptop *crp)
 	error = m_striphdr(m, skip, hlen);
 	if (error) {
 		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
-		DPRINTF(("%s: bad mbuf chain, IPCA %s/%08lx\n", __func__,
+		DPRINTF("bad mbuf chain, IPCA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		goto bad;
 	}
 
@@ -406,21 +406,21 @@ ipcomp_output(struct mbuf *m, const stru
 #endif
 	default:
 		IPCOMP_STATINC(IPCOMP_STAT_NOPF);
-		DPRINTF(("%s: unknown/unsupported protocol family %d"
-		    ", IPCA %s/%08lx\n", __func__,
+		DPRINTF("unknown/unsupported protocol family %d"
+		    ", IPCA %s/%08lx\n",
 		    sav->sah->saidx.dst.sa.sa_family,
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		error = EPFNOSUPPORT;
 		goto bad;
 	}
 	if (skip + hlen + ralen > maxpacketsize) {
 		IPCOMP_STATINC(IPCOMP_STAT_TOOBIG);
-		DPRINTF(("%s: packet in IPCA %s/%08lx got too big "
-		    "(len %u, max len %u)\n", __func__,
+		DPRINTF("packet in IPCA %s/%08lx got too big "
+		    "(len %u, max len %u)\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
 		    (u_long) ntohl(sav->spi),
-		    skip + hlen + ralen, maxpacketsize));
+		    skip + hlen + ralen, maxpacketsize);
 		error = EMSGSIZE;
 		goto bad;
 	}
@@ -431,10 +431,9 @@ ipcomp_output(struct mbuf *m, const stru
 	m = m_clone(m);
 	if (m == NULL) {
 		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
-		DPRINTF(("%s: cannot clone mbuf chain, IPCA %s/%08lx\n",
-		    __func__,
+		DPRINTF("cannot clone mbuf chain, IPCA %s/%08lx\n",
 		    ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
-		    (u_long) ntohl(sav->spi)));
+		    (u_long) ntohl(sav->spi));
 		error = ENOBUFS;
 		goto bad;
 	}
@@ -445,8 +444,7 @@ ipcomp_output(struct mbuf *m, const stru
 	crp = crypto_getreq(1);
 	if (crp == NULL) {
 		IPCOMP_STATINC(IPCOMP_STAT_CRYPTO);
-		DPRINTF(("%s: failed to acquire crypto descriptor\n",
-		    __func__));
+		DPRINTF("failed to acquire crypto descriptor\n");
 		error = ENOBUFS;
 		goto bad;
 	}
@@ -465,7 +463,7 @@ ipcomp_output(struct mbuf *m, const stru
 	tc = pool_cache_get(ipcomp_tdb_crypto_pool_cache, PR_NOWAIT);
 	if (tc == NULL) {
 		IPCOMP_STATINC(IPCOMP_STAT_CRYPTO);
-		DPRINTF(("%s: failed to allocate tdb_crypto\n", __func__));
+		DPRINTF("failed to allocate tdb_crypto\n");
 		crypto_freereq(crp);
 		error = ENOBUFS;
 		goto bad;
@@ -554,7 +552,7 @@ ipcomp_output_cb(struct cryptop *crp)
 			return crypto_dispatch(crp);
 		}
 		IPCOMP_STATINC(IPCOMP_STAT_NOXFORM);
-		DPRINTF(("%s: crypto error %d\n", __func__, crp->crp_etype));
+		DPRINTF("crypto error %d\n", crp->crp_etype);
 		error = crp->crp_etype;
 		goto bad;
 	}
@@ -566,10 +564,10 @@ ipcomp_output_cb(struct cryptop *crp)
 		mo = m_makespace(m, skip, IPCOMP_HLENGTH, &roff);
 		if (mo == NULL) {
 			IPCOMP_STATINC(IPCOMP_STAT_WRAP);
-			DPRINTF(("%s: failed to inject IPCOMP header for "
-			    "IPCA %s/%08lx\n", __func__,
+			DPRINTF("failed to inject IPCOMP header for "
+			    "IPCA %s/%08lx\n",
 			    ipsec_address(&sav->sah->saidx.dst, buf,
-			    sizeof(buf)), (u_long) ntohl(sav->spi)));
+			    sizeof(buf)), (u_long) ntohl(sav->spi));
 			error = ENOBUFS;
 			goto bad;
 		}
@@ -616,20 +614,19 @@ ipcomp_output_cb(struct cryptop *crp)
 #endif
 		default:
 			IPCOMP_STATINC(IPCOMP_STAT_NOPF);
-			DPRINTF(("ipcomp_output: unknown/unsupported protocol "
+			DPRINTF("unknown/unsupported protocol "
 			    "family %d, IPCA %s/%08lx\n",
 			    sav->sah->saidx.dst.sa.sa_family,
 			    ipsec_address(&sav->sah->saidx.dst, buf,
-			    sizeof(buf)), (u_long) ntohl(sav->spi)));
+			    sizeof(buf)), (u_long) ntohl(sav->spi));
 			error = EPFNOSUPPORT;
 			goto bad;
 		}
 	} else {
 		/* compression was useless, we have lost time */
 		IPCOMP_STATINC(IPCOMP_STAT_USELESS);
-		DPRINTF(("ipcomp_output_cb: compression was useless: initial"
-		    "size was %d and compressed size is %d\n", rlen,
-		    crp->crp_olen));
+		DPRINTF("compression was useless: initial size was %d "
+		    "and compressed size is %d\n", rlen, crp->crp_olen);
 	}
 
 	/* Release the crypto descriptor */

Index: src/sys/netipsec/xform_ipip.c
diff -u src/sys/netipsec/xform_ipip.c:1.75 src/sys/netipsec/xform_ipip.c:1.76
--- src/sys/netipsec/xform_ipip.c:1.75	Sat Jan 26 21:08:48 2019
+++ src/sys/netipsec/xform_ipip.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipip.c,v 1.75 2019/01/27 02:08:48 pgoyette Exp $	*/
+/*	$NetBSD: xform_ipip.c,v 1.76 2019/06/12 22:23:50 christos Exp $	*/
 /*	$FreeBSD: xform_ipip.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_ipip.c,v 1.25 2002/06/10 18:04:55 itojun Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.75 2019/01/27 02:08:48 pgoyette Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.76 2019/06/12 22:23:50 christos Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -147,8 +147,8 @@ _ipip_input(struct mbuf *m, int iphlen)
 		break;
 #endif
 	default:
-		DPRINTF(("%s: bad protocol version 0x%x (%u) "
-		    "for outer header\n", __func__, v, v>>4));
+		DPRINTF("bad protocol version 0x%x (%u) "
+		    "for outer header\n", v, v>>4);
 		IPIP_STATINC(IPIP_STAT_FAMILY);
 		m_freem(m);
 		return;
@@ -157,7 +157,7 @@ _ipip_input(struct mbuf *m, int iphlen)
 	/* Bring the IP header in the first mbuf, if not there already */
 	if (m->m_len < hlen) {
 		if ((m = m_pullup(m, hlen)) == NULL) {
-			DPRINTF(("%s: m_pullup (1) failed\n", __func__));
+			DPRINTF("m_pullup (1) failed\n");
 			IPIP_STATINC(IPIP_STAT_HDROPS);
 			return;
 		}
@@ -205,8 +205,8 @@ _ipip_input(struct mbuf *m, int iphlen)
 		break;
 #endif
 	default:
-		DPRINTF(("%s: bad protocol version %#x (%u) "
-		    "for inner header\n", __func__, v, v >> 4));
+		DPRINTF("bad protocol version %#x (%u) "
+		    "for inner header\n", v, v >> 4);
 		IPIP_STATINC(IPIP_STAT_FAMILY);
 		m_freem(m);
 		return;
@@ -217,7 +217,7 @@ _ipip_input(struct mbuf *m, int iphlen)
 	 */
 	if (m->m_len < hlen) {
 		if ((m = m_pullup(m, hlen)) == NULL) {
-			DPRINTF(("%s: m_pullup (2) failed\n", __func__));
+			DPRINTF("m_pullup (2) failed\n");
 			IPIP_STATINC(IPIP_STAT_HDROPS);
 			return;
 		}
@@ -345,10 +345,10 @@ ipip_output(struct mbuf *m, struct secas
 		if (saidx->src.sa.sa_family != AF_INET ||
 		    saidx->src.sin.sin_addr.s_addr == INADDR_ANY ||
 		    saidx->dst.sin.sin_addr.s_addr == INADDR_ANY) {
-			DPRINTF(("%s: unspecified tunnel endpoint "
-			    "address in SA %s/%08lx\n", __func__,
+			DPRINTF("unspecified tunnel endpoint "
+			    "address in SA %s/%08lx\n",
 			    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-			    (u_long)ntohl(sav->spi)));
+			    (u_long)ntohl(sav->spi));
 			IPIP_STATINC(IPIP_STAT_UNSPEC);
 			error = EINVAL;
 			goto bad;
@@ -356,7 +356,7 @@ ipip_output(struct mbuf *m, struct secas
 
 		M_PREPEND(m, sizeof(struct ip), M_DONTWAIT);
 		if (m == NULL) {
-			DPRINTF(("%s: M_PREPEND failed\n", __func__));
+			DPRINTF("M_PREPEND failed\n");
 			IPIP_STATINC(IPIP_STAT_HDROPS);
 			error = ENOBUFS;
 			goto bad;
@@ -420,10 +420,10 @@ ipip_output(struct mbuf *m, struct secas
 		if (IN6_IS_ADDR_UNSPECIFIED(&saidx->dst.sin6.sin6_addr) ||
 		    saidx->src.sa.sa_family != AF_INET6 ||
 		    IN6_IS_ADDR_UNSPECIFIED(&saidx->src.sin6.sin6_addr)) {
-			DPRINTF(("%s: unspecified tunnel endpoint "
-			    "address in SA %s/%08lx\n", __func__,
+			DPRINTF("unspecified tunnel endpoint "
+			    "address in SA %s/%08lx\n",
 			    ipsec_address(&saidx->dst, buf, sizeof(buf)),
-			    (u_long)ntohl(sav->spi)));
+			    (u_long)ntohl(sav->spi));
 			IPIP_STATINC(IPIP_STAT_UNSPEC);
 			error = ENOBUFS;
 			goto bad;
@@ -440,7 +440,7 @@ ipip_output(struct mbuf *m, struct secas
 
 		M_PREPEND(m, sizeof(struct ip6_hdr), M_DONTWAIT);
 		if (m == NULL) {
-			DPRINTF(("%s: M_PREPEND failed\n", __func__));
+			DPRINTF("M_PREPEND failed\n");
 			IPIP_STATINC(IPIP_STAT_HDROPS);
 			error = ENOBUFS;
 			goto bad;
@@ -495,8 +495,8 @@ ipip_output(struct mbuf *m, struct secas
 
 	default:
 nofamily:
-		DPRINTF(("%s: unsupported protocol family %u\n", __func__,
-		    saidx->dst.sa.sa_family));
+		DPRINTF("unsupported protocol family %u\n",
+		    saidx->dst.sa.sa_family);
 		IPIP_STATINC(IPIP_STAT_FAMILY);
 		error = EAFNOSUPPORT;
 		goto bad;
@@ -567,7 +567,7 @@ static int
 ipe4_input(struct mbuf *m, struct secasvar *sav, int skip, int protoff)
 {
 	/* This is a rather serious mistake, so no conditional printing. */
-	printf("%s: should never be called\n", __func__);
+	printf("should never be called\n");
 	if (m)
 		m_freem(m);
 	return EOPNOTSUPP;

Index: src/sys/netipsec/xform_tcp.c
diff -u src/sys/netipsec/xform_tcp.c:1.22 src/sys/netipsec/xform_tcp.c:1.23
--- src/sys/netipsec/xform_tcp.c:1.22	Sat Jan 26 21:08:48 2019
+++ src/sys/netipsec/xform_tcp.c	Wed Jun 12 18:23:50 2019
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_tcp.c,v 1.22 2019/01/27 02:08:48 pgoyette Exp $ */
+/*	$NetBSD: xform_tcp.c,v 1.23 2019/06/12 22:23:50 christos Exp $ */
 /*	$FreeBSD: xform_tcp.c,v 1.1.2.1 2004/02/14 22:24:09 bms Exp $ */
 
 /*
@@ -34,7 +34,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_tcp.c,v 1.22 2019/01/27 02:08:48 pgoyette Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_tcp.c,v 1.23 2019/06/12 22:23:50 christos Exp $");
 
 #if defined(_KERNEL_OPT)
 #include "opt_inet.h"
@@ -87,22 +87,21 @@ tcpsignature_init(struct secasvar *sav, 
 	int keylen;
 
 	if (sav->spi != htonl(TCP_SIG_SPI)) {
-		DPRINTF(("%s: SPI %x must be TCP_SIG_SPI (0x1000)\n",
-		    __func__, sav->alg_auth));
+		DPRINTF("SPI %x must be TCP_SIG_SPI (0x1000)\n", sav->alg_auth);
 		return EINVAL;
 	}
 	if (sav->alg_auth != SADB_X_AALG_TCP_MD5) {
-		DPRINTF(("%s: unsupported authentication algorithm %u\n",
-		    __func__, sav->alg_auth));
+		DPRINTF("unsupported authentication algorithm %u\n",
+		    sav->alg_auth);
 		return EINVAL;
 	}
 	if (sav->key_auth == NULL) {
-		DPRINTF(("%s: no authentication key present\n", __func__));
+		DPRINTF("no authentication key present\n");
 		return EINVAL;
 	}
 	keylen = _KEYLEN(sav->key_auth);
 	if ((keylen < TCP_KEYLEN_MIN) || (keylen > TCP_KEYLEN_MAX)) {
-		DPRINTF(("%s: invalid key length %u\n", __func__, keylen));
+		DPRINTF("invalid key length %u\n", keylen);
 		return EINVAL;
 	}
 

Reply via email to