Module Name:    src
Committed By:   maxv
Date:           Sun Oct 14 08:27:39 UTC 2018

Modified Files:
        src/crypto/dist/ipsec-tools/src/setkey: Makefile.am extern.h parse.y
            setkey.c token.l
Removed Files:
        src/crypto/dist/ipsec-tools/src/setkey: scriptdump.pl test-pfkey.c

Log Message:
Clean up setkey: remove dead wood, KNF, localify, and slightly improve.


To generate a diff of this commit:
cvs rdiff -u -r1.2 -r1.3 src/crypto/dist/ipsec-tools/src/setkey/Makefile.am
cvs rdiff -u -r1.6 -r1.7 src/crypto/dist/ipsec-tools/src/setkey/extern.h
cvs rdiff -u -r1.21 -r1.22 src/crypto/dist/ipsec-tools/src/setkey/parse.y \
    src/crypto/dist/ipsec-tools/src/setkey/token.l
cvs rdiff -u -r1.1.1.1 -r0 \
    src/crypto/dist/ipsec-tools/src/setkey/scriptdump.pl
cvs rdiff -u -r1.18 -r1.19 src/crypto/dist/ipsec-tools/src/setkey/setkey.c
cvs rdiff -u -r1.7 -r0 src/crypto/dist/ipsec-tools/src/setkey/test-pfkey.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/dist/ipsec-tools/src/setkey/Makefile.am
diff -u src/crypto/dist/ipsec-tools/src/setkey/Makefile.am:1.2 src/crypto/dist/ipsec-tools/src/setkey/Makefile.am:1.3
--- src/crypto/dist/ipsec-tools/src/setkey/Makefile.am:1.2	Wed Jul 23 09:06:51 2008
+++ src/crypto/dist/ipsec-tools/src/setkey/Makefile.am	Sun Oct 14 08:27:39 2018
@@ -18,5 +18,4 @@ setkey_LDADD = $(LEXLIB)
 noinst_HEADERS = vchar.h extern.h
 man8_MANS = setkey.8
 
-EXTRA_DIST = ${man8_MANS} sample-policy01.cf sample-policy02.cf sample.cf \
-	scriptdump.pl test-pfkey.c
+EXTRA_DIST = ${man8_MANS} sample-policy01.cf sample-policy02.cf sample.cf

Index: src/crypto/dist/ipsec-tools/src/setkey/extern.h
diff -u src/crypto/dist/ipsec-tools/src/setkey/extern.h:1.6 src/crypto/dist/ipsec-tools/src/setkey/extern.h:1.7
--- src/crypto/dist/ipsec-tools/src/setkey/extern.h:1.6	Mon May 28 20:34:45 2018
+++ src/crypto/dist/ipsec-tools/src/setkey/extern.h	Sun Oct 14 08:27:39 2018
@@ -1,33 +1,54 @@
-/*	$NetBSD: extern.h,v 1.6 2018/05/28 20:34:45 maxv Exp $	*/
-
+/*	$NetBSD: extern.h,v 1.7 2018/10/14 08:27:39 maxv Exp $	*/
 
+/*
+ * Copyright (c) 2018 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
 
+/* parse.y */
 void parse_init(void);
+
+/* token.l */
 int parse(FILE **);
 int parse_string(char *);
 
-int setkeymsg(char *, size_t *);
+/* setkey.c */
 int sendkeymsg(char *, size_t);
+uint32_t *sendkeymsg_spigrep(unsigned int, struct addrinfo *,
+    struct addrinfo *, int *);
 
 int yylex(void);
 int yyparse(void);
 void yyfatal(const char *);
 void yyerror(const char *);
 
-u_int32_t *sendkeymsg_spigrep(unsigned int, struct addrinfo *,
-				   struct addrinfo *, int *);
-
+#ifdef HAVE_POLICY_FWD
 extern int f_rfcmode;
+#endif
 extern int lineno;
-extern int last_msg_type;
-extern u_int32_t last_priority;
 extern int exit_now;
-
-extern u_char m_buf[BUFSIZ];
-extern u_int m_len;
-extern int f_debug;
-
 #ifdef HAVE_PFKEY_POLICY_PRIORITY
 extern int last_msg_type;
-extern u_int32_t last_priority;
+extern uint32_t last_priority;
 #endif

Index: src/crypto/dist/ipsec-tools/src/setkey/parse.y
diff -u src/crypto/dist/ipsec-tools/src/setkey/parse.y:1.21 src/crypto/dist/ipsec-tools/src/setkey/parse.y:1.22
--- src/crypto/dist/ipsec-tools/src/setkey/parse.y:1.21	Mon May 28 20:34:45 2018
+++ src/crypto/dist/ipsec-tools/src/setkey/parse.y	Sun Oct 14 08:27:39 2018
@@ -1,5 +1,4 @@
-/*	$NetBSD: parse.y,v 1.21 2018/05/28 20:34:45 maxv Exp $	*/
-
+/*	$NetBSD: parse.y,v 1.22 2018/10/14 08:27:39 maxv Exp $	*/
 /*	$KAME: parse.y,v 1.81 2003/07/01 04:01:48 itojun Exp $	*/
 
 /*
@@ -92,7 +91,7 @@ static int p_aiflags = 0, p_aifamily = P
 
 static struct addrinfo *parse_addr(char *, char *);
 static int fix_portstr(int, vchar_t *, vchar_t *, vchar_t *);
-static int setvarbuf(char *, int *, struct sadb_ext *, int, 
+static int setvarbuf(char *, int *, struct sadb_ext *, int,
     const void *, int);
 void parse_init(void);
 void free_buffer(void);
@@ -488,14 +487,14 @@ auth_alg
 			p_key_auth = $2.buf;
 #ifdef SADB_X_AALG_TCP_MD5
 			if (p_alg_auth == SADB_X_AALG_TCP_MD5) {
-				if ((p_key_auth_len < 1) || 
+				if ((p_key_auth_len < 1) ||
 				    (p_key_auth_len > 80))
 					return -1;
-			} else 
+			} else
 #endif
 			{
 				if (ipsec_check_keylen(SADB_EXT_SUPPORTED_AUTH,
-				    p_alg_auth, 
+				    p_alg_auth,
 				    PFKEY_UNUNIT64(p_key_auth_len)) < 0) {
 					yyerror(ipsec_strerror());
 					return -1;
@@ -849,8 +848,8 @@ portstr_notempty
 upper_spec
 	:	DECSTRING { $$ = $1; }
 	|	ANY { $$ = IPSEC_ULPROTO_ANY; }
-	|	PR_TCP { 
-				$$ = IPPROTO_TCP; 
+	|	PR_TCP {
+				$$ = IPPROTO_TCP;
 			}
 	|	STRING
 		{
@@ -1047,13 +1046,13 @@ setkeymsg_spdaddr(unsigned int type, uns
 				m_sec_ctx.sadb_x_sec_len =
 				PFKEY_UNIT64(slen + PFKEY_ALIGN8(sec_ctx.len));
 
-				m_sec_ctx.sadb_x_sec_exttype = 
+				m_sec_ctx.sadb_x_sec_exttype =
 					SADB_X_EXT_SEC_CTX;
 				m_sec_ctx.sadb_x_ctx_len = sec_ctx.len;/*bytes*/
 				m_sec_ctx.sadb_x_ctx_doi = sec_ctx.doi;
 				m_sec_ctx.sadb_x_ctx_alg = sec_ctx.alg;
-				setvarbuf(buf, &l, 
-					  (struct sadb_ext *)&m_sec_ctx, slen, 
+				setvarbuf(buf, &l,
+					  (struct sadb_ext *)&m_sec_ctx, slen,
 					  (caddr_t)sec_ctx.buf, sec_ctx.len);
 			}
 #endif
@@ -1386,7 +1385,7 @@ setkeymsg_add(unsigned int type, unsigne
 		m_sec_ctx.sadb_x_ctx_doi = sec_ctx.doi;
 		m_sec_ctx.sadb_x_ctx_alg = sec_ctx.alg;
 		setvarbuf(buf, &l, (struct sadb_ext *)&m_sec_ctx, slen,
-			  (caddr_t)sec_ctx.buf, sec_ctx.len); 
+			  (caddr_t)sec_ctx.buf, sec_ctx.len);
 	}
 #endif
 
Index: src/crypto/dist/ipsec-tools/src/setkey/token.l
diff -u src/crypto/dist/ipsec-tools/src/setkey/token.l:1.21 src/crypto/dist/ipsec-tools/src/setkey/token.l:1.22
--- src/crypto/dist/ipsec-tools/src/setkey/token.l:1.21	Mon May 28 19:52:18 2018
+++ src/crypto/dist/ipsec-tools/src/setkey/token.l	Sun Oct 14 08:27:39 2018
@@ -1,5 +1,4 @@
-/*	$NetBSD: token.l,v 1.21 2018/05/28 19:52:18 maxv Exp $	*/
-
+/*	$NetBSD: token.l,v 1.22 2018/10/14 08:27:39 maxv Exp $	*/
 /*	$KAME: token.l,v 1.44 2003/10/21 07:20:58 itojun Exp $	*/
 
 /*
@@ -170,8 +169,8 @@ ah-old		{ yylval.num = 1; return(PR_AH);
 esp-old		{ yylval.num = 1; return(PR_ESP); }
 esp-udp		{ yylval.num = 0; return(PR_ESPUDP); }
 ipcomp		{ yylval.num = 0; return(PR_IPCOMP); }
-tcp		{ 
-			yylval.num = 0; return(PR_TCP); 
+tcp		{
+			yylval.num = 0; return(PR_TCP);
 		}
 
 	/* authentication alogorithm */
@@ -188,11 +187,11 @@ tcp		{ 
 <S_AUTHALG>hmac-sha512 { yylval.num = SADB_X_AALG_SHA2_512; BEGIN INITIAL; return(ALG_AUTH); }
 <S_AUTHALG>hmac-ripemd160 { yylval.num = SADB_X_AALG_RIPEMD160HMAC; BEGIN INITIAL; return(ALG_AUTH); }
 <S_AUTHALG>aes-xcbc-mac { yylval.num = SADB_X_AALG_AES_XCBC_MAC; BEGIN INITIAL; return(ALG_AUTH); }
-<S_AUTHALG>tcp-md5	{ 
+<S_AUTHALG>tcp-md5	{
 #ifdef SADB_X_AALG_TCP_MD5
-				yylval.num = SADB_X_AALG_TCP_MD5; 
-				BEGIN INITIAL; 
-				return(ALG_AUTH); 
+				yylval.num = SADB_X_AALG_TCP_MD5;
+				BEGIN INITIAL;
+				return(ALG_AUTH);
 #endif
 			}
 <S_AUTHALG>null { yylval.num = SADB_X_AALG_NULL; BEGIN INITIAL; return(ALG_AUTH_NOKEY); }
@@ -208,20 +207,20 @@ tcp		{ 
 <S_ENCALG>des-deriv	{ yylval.num = SADB_EALG_DESCBC; BEGIN INITIAL; return(ALG_ENC_DESDERIV); }
 <S_ENCALG>des-32iv	{ yylval.num = SADB_EALG_DESCBC; BEGIN INITIAL; return(ALG_ENC_DES32IV); }
 <S_ENCALG>twofish-cbc	{ yylval.num = SADB_X_EALG_TWOFISHCBC; BEGIN INITIAL; return(ALG_ENC); }
-<S_ENCALG>aes-cbc	{ 
+<S_ENCALG>aes-cbc	{
 #ifdef SADB_X_EALG_AESCBC
-	yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); 
+	yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC);
 #endif
 }
-<S_ENCALG>rijndael-cbc	{ 
+<S_ENCALG>rijndael-cbc	{
 #ifdef SADB_X_EALG_AESCBC
-	yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC); 
+	yylval.num = SADB_X_EALG_AESCBC; BEGIN INITIAL; return(ALG_ENC);
 #endif
 }
 <S_ENCALG>aes-ctr	{ yylval.num = SADB_X_EALG_AESCTR; BEGIN INITIAL; return(ALG_ENC); }
-<S_ENCALG>camellia-cbc	{ 
+<S_ENCALG>camellia-cbc	{
 #ifdef SADB_X_EALG_CAMELLIACBC
-	yylval.num = SADB_X_EALG_CAMELLIACBC; BEGIN INITIAL; return(ALG_ENC); 
+	yylval.num = SADB_X_EALG_CAMELLIACBC; BEGIN INITIAL; return(ALG_ENC);
 #endif
 }
 <S_ENCALG>aes-gcm-16	{
@@ -355,7 +354,7 @@ parse(FILE **fp)
 }
 
 int
-parse_string (char *src)
+parse_string(char *src)
 {
 	int             result;
 	YY_BUFFER_STATE buf_state;

Index: src/crypto/dist/ipsec-tools/src/setkey/setkey.c
diff -u src/crypto/dist/ipsec-tools/src/setkey/setkey.c:1.18 src/crypto/dist/ipsec-tools/src/setkey/setkey.c:1.19
--- src/crypto/dist/ipsec-tools/src/setkey/setkey.c:1.18	Mon May 28 20:34:45 2018
+++ src/crypto/dist/ipsec-tools/src/setkey/setkey.c	Sun Oct 14 08:27:39 2018
@@ -1,8 +1,33 @@
-/*	$NetBSD: setkey.c,v 1.18 2018/05/28 20:34:45 maxv Exp $	*/
-
+/*	$NetBSD: setkey.c,v 1.19 2018/10/14 08:27:39 maxv Exp $	*/
 /*	$KAME: setkey.c,v 1.36 2003/09/24 23:52:51 itojun Exp $	*/
 
 /*
+ * Copyright (c) 2018 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+/*
  * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
  * All rights reserved.
  *
@@ -66,25 +91,24 @@
 #include "config.h"
 #include "libpfkey.h"
 #include "package_version.h"
-#define extern /* so that variables in extern.h are not extern... */
 #include "extern.h"
 
 #define strlcpy(d,s,l) (strncpy(d,s,l), (d)[(l)-1] = '\0')
 
-void usage(int);
-int main(int, char **);
-int get_supported(void);
-void sendkeyshort(u_int);
-void promisc(void);
-int postproc(struct sadb_msg *, int);
-int verifypriority(struct sadb_msg *m);
-int fileproc(const char *);
-const char *numstr(int);
-void shortdump_hdr(void);
-void shortdump(struct sadb_msg *);
+static int get_supported(void);
+static void sendkeyshort(u_int);
+static void promisc(void);
+static int postproc(struct sadb_msg *, int);
+#ifdef HAVE_PFKEY_POLICY_PRIORITY
+static int verifypriority(struct sadb_msg *);
+#endif
+static int fileproc(const char *);
+static const char *numstr(int);
+static void shortdump_hdr(void);
+static void shortdump(struct sadb_msg *);
 static void printdate(void);
 static int32_t gmt2local(time_t);
-void stdin_loop(void);
+static void stdin_loop(void);
 
 #define MODE_SCRIPT	1
 #define MODE_CMDDUMP	2
@@ -104,13 +128,16 @@ int f_hexdump = 0;
 int f_tflag = 0;
 int f_notreally = 0;
 int f_withports = 0;
+#ifdef HAVE_PFKEY_POLICY_PRIORITY
+int last_msg_type;
+uint32_t last_priority;
+#endif
 #ifdef HAVE_POLICY_FWD
 int f_rfcmode = 1;
 #define RK_OPTS "rk"
 #else
-int f_rkwarn = 0;
+static int f_rkwarn = 0;
 #define RK_OPTS ""
-static void rkwarn(void);
 static void
 rkwarn(void)
 {
@@ -119,15 +146,17 @@ rkwarn(void)
 		printf("warning: -r and -k options are not supported in this environment\n");
 	}
 }
-
 #endif
+
+int lineno;
+int exit_now;
 static time_t thiszone;
 
-void
+static void
 usage(int only_version)
 {
-	printf("setkey @(#) %s (%s)\n", TOP_PACKAGE_STRING, TOP_PACKAGE_URL); 
-	if (! only_version) {
+	printf("setkey @(#) %s (%s)\n", TOP_PACKAGE_STRING, TOP_PACKAGE_URL);
+	if (!only_version) {
 		printf("usage: setkey [-v" RK_OPTS "] file ...\n");
 		printf("       setkey [-nv" RK_OPTS "] -c\n");
 		printf("       setkey [-nv" RK_OPTS "] -f filename\n");
@@ -147,7 +176,6 @@ main(int argc, char **argv)
 
 	if (argc == 1) {
 		usage(0);
-		/* NOTREACHED */
 	}
 
 	thiszone = gmt2local(0);
@@ -163,11 +191,10 @@ main(int argc, char **argv)
 			break;
 		case 'f':
 			f_mode = MODE_SCRIPT;
-			if (strcmp(optarg, "-") == 0)
+			if (strcmp(optarg, "-") == 0) {
 				fp = stdin;
-			else if ((fp = fopen(optarg, "r")) == NULL) {
+			} else if ((fp = fopen(optarg, "r")) == NULL) {
 				err(1, "Can't open `%s'", optarg);
-				/*NOTREACHED*/
 			}
 			break;
 		case 'D':
@@ -221,14 +248,12 @@ main(int argc, char **argv)
 		case 'V':
 			usage(1);
 			break;
-			/*NOTREACHED*/
 #ifndef __NetBSD__
 		case 'h':
 #endif
 		case '?':
 		default:
 			usage(0);
-			/*NOTREACHED*/
 		}
 	}
 
@@ -236,11 +261,11 @@ main(int argc, char **argv)
 	argv += optind;
 
 	if (argc > 0) {
-		while (argc--)
+		while (argc--) {
 			if (fileproc(*argv++) < 0) {
 				err(1, "%s", argv[-1]);
-				/*NOTREACHED*/
 			}
+		}
 		exit(0);
 	}
 
@@ -260,30 +285,27 @@ main(int argc, char **argv)
 	case MODE_SCRIPT:
 		if (get_supported() < 0) {
 			errx(1, "%s", ipsec_strerror());
-			/*NOTREACHED*/
 		}
 		if (parse(&fp))
-			exit (1);
+			exit(1);
 		break;
 	case MODE_STDIN:
 		if (get_supported() < 0) {
 			errx(1, "%s", ipsec_strerror());
-			/*NOTREACHED*/
 		}
 		stdin_loop();
 		break;
 	case MODE_PROMISC:
 		promisc();
-		/*NOTREACHED*/
+		/* NOTREACHED */
 	default:
 		usage(0);
-		/*NOTREACHED*/
 	}
 
 	exit(0);
 }
 
-int
+static int
 get_supported(void)
 {
 
@@ -293,23 +315,23 @@ get_supported(void)
 	if (pfkey_recv_register(so) < 0)
 		return -1;
 
-	return (0);
+	return 0;
 }
 
-void
+static void
 stdin_loop(void)
 {
 	char line[1024], *semicolon, *comment;
 	size_t linelen = 0;
-	
-	memset (line, 0, sizeof(line));
+
+	memset(line, 0, sizeof(line));
 
 	parse_init();
 	while (1) {
 #ifdef HAVE_READLINE
 		char *rbuf;
-		rbuf = readline ("");
-		if (! rbuf)
+		rbuf = readline("");
+		if (!rbuf)
 			break;
 #else
 		char rbuf[1024];
@@ -326,31 +348,30 @@ stdin_loop(void)
 		if (!rbuf[0])
 			continue;
 
-		linelen += snprintf (&line[linelen], sizeof(line) - linelen,
-				     "%s%s", linelen > 0 ? " " : "", rbuf);
+		linelen += snprintf(&line[linelen], sizeof(line) - linelen,
+		    "%s%s", linelen > 0 ? " " : "", rbuf);
 
 		semicolon = strchr(line, ';');
 		while (semicolon) {
 			char saved_char = *++semicolon;
 			*semicolon = '\0';
 #ifdef HAVE_READLINE
-			add_history (line);
+			add_history(line);
 #endif
 
 #ifdef HAVE_PFKEY_POLICY_PRIORITY
 			last_msg_type = -1;  /* invalid message type */
 #endif
 
-			parse_string (line);
+			parse_string(line);
 			if (exit_now)
 				return;
 			if (saved_char) {
 				*semicolon = saved_char;
-				linelen = strlen (semicolon);
-				memmove (line, semicolon, linelen + 1);
+				linelen = strlen(semicolon);
+				memmove(line, semicolon, linelen + 1);
 				semicolon = strchr(line, ';');
-			}
-			else {
+			} else {
 				semicolon = NULL;
 				linelen = 0;
 			}
@@ -358,7 +379,7 @@ stdin_loop(void)
 	}
 }
 
-void
+static void
 sendkeyshort(u_int type)
 {
 	struct sadb_msg msg;
@@ -373,11 +394,9 @@ sendkeyshort(u_int type)
 	msg.sadb_msg_pid = getpid();
 
 	sendkeymsg((char *)&msg, sizeof(msg));
-
-	return;
 }
 
-void
+static void
 promisc(void)
 {
 	struct sadb_msg msg;
@@ -395,7 +414,6 @@ promisc(void)
 
 	if ((l = send(so, &msg, sizeof(msg), 0)) < 0) {
 		err(1, "send");
-		/*NOTREACHED*/
 	}
 
 	while (1) {
@@ -403,7 +421,6 @@ promisc(void)
 
 		if ((l = recv(so, rbuf, sizeof(*base), MSG_PEEK)) < 0) {
 			err(1, "recv");
-			/*NOTREACHED*/
 		}
 
 		if (l != sizeof(*base))
@@ -413,7 +430,6 @@ promisc(void)
 		if ((l = recv(so, rbuf, PFKEY_UNUNIT64(base->sadb_msg_len),
 				0)) < 0) {
 			err(1, "recv");
-			/*NOTREACHED*/
 		}
 		printdate();
 		if (f_hexdump) {
@@ -443,12 +459,13 @@ promisc(void)
 	}
 }
 
-/* Generate 'spi' array with SPIs matching 'satype', 'srcs', and 'dsts'
+/*
+ * Generate 'spi' array with SPIs matching 'satype', 'srcs', and 'dsts'.
  * Return value is dynamically generated array of SPIs, also number of
  * SPIs through num_spi pointer.
  * On any error, set *num_spi to 0 and return NULL.
  */
-u_int32_t *
+uint32_t *
 sendkeymsg_spigrep(unsigned int satype, struct addrinfo *srcs,
     struct addrinfo *dsts, int *num_spi)
 {
@@ -462,7 +479,7 @@ sendkeymsg_spigrep(unsigned int satype, 
 	struct sockaddr *s;
 	struct addrinfo *a;
 	struct sadb_sa *sa;
-	u_int32_t *spi = NULL;
+	uint32_t *spi = NULL;
 	int max_spi = 0, fail = 0;
 
 	*num_spi = 0;
@@ -576,12 +593,12 @@ sendkeymsg_spigrep(unsigned int satype, 
 
 		if (*num_spi >= max_spi) {
 			max_spi += 512;
-			spi = realloc(spi, max_spi * sizeof(u_int32_t));
+			spi = realloc(spi, max_spi * sizeof(uint32_t));
 		}
 
 		sa = (struct sadb_sa *)mhp[SADB_EXT_SA];
 		if (sa != NULL)
-			spi[(*num_spi)++] = (u_int32_t)ntohl(sa->sadb_sa_spi);
+			spi[(*num_spi)++] = (uint32_t)ntohl(sa->sadb_sa_spi);
 
 		m = (struct sadb_msg *)((caddr_t)m + PFKEY_UNUNIT64(m->sadb_msg_len));
 
@@ -674,10 +691,10 @@ again:
 	}
 
 end:
-	return (0);
+	return 0;
 }
 
-int
+static int
 postproc(struct sadb_msg *msg, int len)
 {
 #ifdef HAVE_PFKEY_POLICY_PRIORITY
@@ -689,7 +706,8 @@ postproc(struct sadb_msg *msg, int len)
 		const char *errmsg = NULL;
 
 		if (f_mode == MODE_SCRIPT)
-			snprintf(inf, sizeof(inf), "The result of line %d: ", lineno);
+			snprintf(inf, sizeof(inf), "The result of line %d: ",
+			    lineno);
 		else
 			inf[0] = '\0';
 
@@ -713,7 +731,7 @@ postproc(struct sadb_msg *msg, int len)
 			errmsg = strerror(msg->sadb_msg_errno);
 		}
 		printf("%s%s.\n", inf, errmsg);
-		return (-1);
+		return -1;
 	}
 
 	switch (msg->sadb_msg_type) {
@@ -748,35 +766,35 @@ postproc(struct sadb_msg *msg, int len)
 		break;
 
 	case SADB_X_SPDGET:
-		if (f_withports) 
+		if (f_withports)
 			pfkey_spdump_withports(msg);
 		else
 			pfkey_spdump(msg);
 		break;
 
 	case SADB_X_SPDDUMP:
-		if (f_withports) 
+		if (f_withports)
 			pfkey_spdump_withports(msg);
 		else
 			pfkey_spdump(msg);
 		break;
 #ifdef HAVE_PFKEY_POLICY_PRIORITY
 	case SADB_X_SPDADD:
-		if (last_msg_type == SADB_X_SPDADD && last_priority != 0 && 
+		if (last_msg_type == SADB_X_SPDADD && last_priority != 0 &&
 		    msg->sadb_msg_pid == getpid() && !priority_support_check) {
-			priority_support_check = 1;	
+			priority_support_check = 1;
 			if (!verifypriority(msg))
-				printf ("WARNING: Kernel does not support policy priorities\n");
+				printf("WARNING: Kernel does not support policy priorities\n");
 		}
 		break;
 #endif
 	}
 
-	return (0);
+	return 0;
 }
 
 #ifdef HAVE_PFKEY_POLICY_PRIORITY
-int
+static int
 verifypriority(struct sadb_msg *m)
 {
 	caddr_t mhp[SADB_EXT_MAX + 1];
@@ -803,11 +821,11 @@ verifypriority(struct sadb_msg *m)
 	if (last_priority != xpl->sadb_x_policy_priority)
 		return 0;
 
-	return 1; 
+	return 1;
 }
 #endif
 
-int
+static int
 fileproc(const char *filename)
 {
 	int fd;
@@ -852,11 +870,11 @@ fileproc(const char *filename)
 		p += len;
 	}
 
-	return (0);
+	return 0;
 }
 
+/* -------------------------------------------------------------------------- */
 
-/*------------------------------------------------------------*/
 static const char *satype[] = {
 	NULL, NULL, "ah", "esp"
 };
@@ -882,7 +900,7 @@ static const char *ipproto[] = {
 #define STR_OR_ID(x, tab) \
 	(((x) < sizeof(tab)/sizeof(tab[0]) && tab[(x)])	? tab[(x)] : numstr(x))
 
-const char *
+static const char *
 numstr(int x)
 {
 	static char buf[20];
@@ -890,14 +908,14 @@ numstr(int x)
 	return buf;
 }
 
-void
+static void
 shortdump_hdr(void)
 {
 	printf("%-4s %-3s %-1s %-8s %-7s %s -> %s\n",
-		"time", "p", "s", "spi", "ltime", "src", "dst");
+	    "time", "p", "s", "spi", "ltime", "src", "dst");
 }
 
-void
+static void
 shortdump(struct sadb_msg *msg)
 {
 	caddr_t mhp[SADB_EXT_MAX + 1];
@@ -918,7 +936,7 @@ shortdump(struct sadb_msg *msg)
 
 	if ((sa = (struct sadb_sa *)mhp[SADB_EXT_SA]) != NULL) {
 		printf(" %-1s", STR_OR_ID(sa->sadb_sa_state, sastate));
-		printf(" %08x", (u_int32_t)ntohl(sa->sadb_sa_spi));
+		printf(" %08x", (uint32_t)ntohl(sa->sadb_sa_spi));
 	} else
 		printf("%-1s %-8s", "?", "?");
 
@@ -996,13 +1014,12 @@ printdate(void)
 
 	if (f_tflag == 1) {
 		/* Default */
-		s = (tp.tv_sec + thiszone ) % 86400;
-		(void)printf("%02d:%02d:%02d.%06u ",
-		    s / 3600, (s % 3600) / 60, s % 60, (u_int32_t)tp.tv_usec);
+		s = (tp.tv_sec + thiszone) % 86400;
+		printf("%02d:%02d:%02d.%06u ",
+		    s / 3600, (s % 3600) / 60, s % 60, (uint32_t)tp.tv_usec);
 	} else if (f_tflag > 1) {
 		/* Unix timeval style */
-		(void)printf("%u.%06u ",
-		    (u_int32_t)tp.tv_sec, (u_int32_t)tp.tv_usec);
+		printf("%u.%06u ", (uint32_t)tp.tv_sec, (uint32_t)tp.tv_usec);
 	}
 
 	printf("\n");
@@ -1037,5 +1054,5 @@ gmt2local(time_t t)
 		dir = loc->tm_yday - gmt->tm_yday;
 	dt += dir * 24 * 60 * 60;
 
-	return (dt);
+	return dt;
 }

Reply via email to