Module Name:    src
Committed By:   christos
Date:           Fri Dec  7 15:29:38 UTC 2012

Modified Files:
        src/sys/netipsec: ipsec.c

Log Message:
rename pcb_sp to policy to avoid:
$SRC/arch/arm/include/pcb.h:#define     pcb_sp          pcb_un.un_32.pcb32_sp
$SRC/arch/arm/include/pcb.h:#define     pcb_sp          pcb_sf.sf_r13


To generate a diff of this commit:
cvs rdiff -u -r1.56 -r1.57 src/sys/netipsec/ipsec.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec.c
diff -u src/sys/netipsec/ipsec.c:1.56 src/sys/netipsec/ipsec.c:1.57
--- src/sys/netipsec/ipsec.c:1.56	Tue Mar 13 14:41:00 2012
+++ src/sys/netipsec/ipsec.c	Fri Dec  7 10:29:38 2012
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec.c,v 1.56 2012/03/13 18:41:00 elad Exp $	*/
+/*	$NetBSD: ipsec.c,v 1.57 2012/12/07 15:29:38 christos Exp $	*/
 /*	$FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $	*/
 /*	$KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.56 2012/03/13 18:41:00 elad Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.57 2012/12/07 15:29:38 christos Exp $");
 
 /*
  * IPsec controller part.
@@ -1155,12 +1155,12 @@ ipsec_delpcbpolicy(struct inpcbpolicy *p
 
 /* initialize policy in PCB */
 int
-ipsec_init_policy(struct socket *so, struct inpcbpolicy **pcb_sp)
+ipsec_init_policy(struct socket *so, struct inpcbpolicy **policy)
 {
 	struct inpcbpolicy *new;
 
 	/* sanity check. */
-	if (so == NULL || pcb_sp == NULL)
+	if (so == NULL || policy == NULL)
 		panic("ipsec_init_policy: NULL pointer was passed");
 
 	new = malloc(sizeof(*new), M_SECA, M_NOWAIT|M_ZERO);
@@ -1189,7 +1189,7 @@ ipsec_init_policy(struct socket *so, str
 	new->sp_out->state = IPSEC_SPSTATE_ALIVE;
 	new->sp_out->policy = IPSEC_POLICY_ENTRUST;
 
-	*pcb_sp = new;
+	*policy = new;
 
 	return 0;
 }
@@ -1278,7 +1278,7 @@ fail:
 /* set policy and ipsec request if present. */
 static int
 ipsec_set_policy(
-	struct secpolicy **pcb_sp,
+	struct secpolicy **policy,
 	int optname,
 	const void *request,
 	size_t len,
@@ -1290,7 +1290,7 @@ ipsec_set_policy(
 	int error;
 
 	/* sanity check. */
-	if (pcb_sp == NULL || *pcb_sp == NULL || request == NULL)
+	if (policy == NULL || *policy == NULL || request == NULL)
 		return EINVAL;
 	if (len < sizeof(*xpl))
 		return EINVAL;
@@ -1321,8 +1321,8 @@ ipsec_set_policy(
 	newsp->state = IPSEC_SPSTATE_ALIVE;
 
 	/* clear old SP and set new SP */
-	KEY_FREESP(pcb_sp);
-	*pcb_sp = newsp;
+	KEY_FREESP(policy);
+	*policy = newsp;
 	KEYDEBUG(KEYDEBUG_IPSEC_DUMP,
 		printf("ipsec_set_policy: new policy\n");
 		kdebug_secpolicy(newsp));
@@ -1331,14 +1331,14 @@ ipsec_set_policy(
 }
 
 static int
-ipsec_get_policy(struct secpolicy *pcb_sp, struct mbuf **mp)
+ipsec_get_policy(struct secpolicy *policy, struct mbuf **mp)
 {
 
 	/* sanity check. */
-	if (pcb_sp == NULL || mp == NULL)
+	if (policy == NULL || mp == NULL)
 		return EINVAL;
 
-	*mp = key_sp2msg(pcb_sp);
+	*mp = key_sp2msg(policy);
 	if (!*mp) {
 		ipseclog((LOG_DEBUG, "ipsec_get_policy: No more memory.\n"));
 		return ENOBUFS;
@@ -1357,7 +1357,7 @@ ipsec4_set_policy(struct inpcb *inp, int
 		  size_t len, kauth_cred_t cred)
 {
 	const struct sadb_x_policy *xpl;
-	struct secpolicy **pcb_sp;
+	struct secpolicy **policy;
 
 	/* sanity check. */
 	if (inp == NULL || request == NULL)
@@ -1372,10 +1372,10 @@ ipsec4_set_policy(struct inpcb *inp, int
 	/* select direction */
 	switch (xpl->sadb_x_policy_dir) {
 	case IPSEC_DIR_INBOUND:
-		pcb_sp = &inp->inp_sp->sp_in;
+		policy = &inp->inp_sp->sp_in;
 		break;
 	case IPSEC_DIR_OUTBOUND:
-		pcb_sp = &inp->inp_sp->sp_out;
+		policy = &inp->inp_sp->sp_out;
 		break;
 	default:
 		ipseclog((LOG_ERR, "ipsec4_set_policy: invalid direction=%u\n",
@@ -1383,7 +1383,7 @@ ipsec4_set_policy(struct inpcb *inp, int
 		return EINVAL;
 	}
 
-	return ipsec_set_policy(pcb_sp, optname, request, len, cred);
+	return ipsec_set_policy(policy, optname, request, len, cred);
 }
 
 int
@@ -1391,7 +1391,7 @@ ipsec4_get_policy(struct inpcb *inp, con
 		  struct mbuf **mp)
 {
 	const struct sadb_x_policy *xpl;
-	struct secpolicy *pcb_sp;
+	struct secpolicy *policy;
 
 	/* sanity check. */
 	if (inp == NULL || request == NULL || mp == NULL)
@@ -1404,10 +1404,10 @@ ipsec4_get_policy(struct inpcb *inp, con
 	/* select direction */
 	switch (xpl->sadb_x_policy_dir) {
 	case IPSEC_DIR_INBOUND:
-		pcb_sp = inp->inp_sp->sp_in;
+		policy = inp->inp_sp->sp_in;
 		break;
 	case IPSEC_DIR_OUTBOUND:
-		pcb_sp = inp->inp_sp->sp_out;
+		policy = inp->inp_sp->sp_out;
 		break;
 	default:
 		ipseclog((LOG_ERR, "ipsec4_set_policy: invalid direction=%u\n",
@@ -1415,7 +1415,7 @@ ipsec4_get_policy(struct inpcb *inp, con
 		return EINVAL;
 	}
 
-	return ipsec_get_policy(pcb_sp, mp);
+	return ipsec_get_policy(policy, mp);
 }
 
 /* delete policy in PCB */
@@ -1449,7 +1449,7 @@ ipsec6_set_policy(struct in6pcb *in6p, i
 		  size_t len, kauth_cred_t cred)
 {
 	const struct sadb_x_policy *xpl;
-	struct secpolicy **pcb_sp;
+	struct secpolicy **policy;
 
 	/* sanity check. */
 	if (in6p == NULL || request == NULL)
@@ -1461,10 +1461,10 @@ ipsec6_set_policy(struct in6pcb *in6p, i
 	/* select direction */
 	switch (xpl->sadb_x_policy_dir) {
 	case IPSEC_DIR_INBOUND:
-		pcb_sp = &in6p->in6p_sp->sp_in;
+		policy = &in6p->in6p_sp->sp_in;
 		break;
 	case IPSEC_DIR_OUTBOUND:
-		pcb_sp = &in6p->in6p_sp->sp_out;
+		policy = &in6p->in6p_sp->sp_out;
 		break;
 	default:
 		ipseclog((LOG_ERR, "ipsec6_set_policy: invalid direction=%u\n",
@@ -1472,7 +1472,7 @@ ipsec6_set_policy(struct in6pcb *in6p, i
 		return EINVAL;
 	}
 
-	return ipsec_set_policy(pcb_sp, optname, request, len, cred);
+	return ipsec_set_policy(policy, optname, request, len, cred);
 }
 
 int
@@ -1480,7 +1480,7 @@ ipsec6_get_policy(struct in6pcb *in6p, c
 		  struct mbuf **mp)
 {
 	const struct sadb_x_policy *xpl;
-	struct secpolicy *pcb_sp;
+	struct secpolicy *policy;
 
 	/* sanity check. */
 	if (in6p == NULL || request == NULL || mp == NULL)
@@ -1493,10 +1493,10 @@ ipsec6_get_policy(struct in6pcb *in6p, c
 	/* select direction */
 	switch (xpl->sadb_x_policy_dir) {
 	case IPSEC_DIR_INBOUND:
-		pcb_sp = in6p->in6p_sp->sp_in;
+		policy = in6p->in6p_sp->sp_in;
 		break;
 	case IPSEC_DIR_OUTBOUND:
-		pcb_sp = in6p->in6p_sp->sp_out;
+		policy = in6p->in6p_sp->sp_out;
 		break;
 	default:
 		ipseclog((LOG_ERR, "ipsec6_set_policy: invalid direction=%u\n",
@@ -1504,7 +1504,7 @@ ipsec6_get_policy(struct in6pcb *in6p, c
 		return EINVAL;
 	}
 
-	return ipsec_get_policy(pcb_sp, mp);
+	return ipsec_get_policy(policy, mp);
 }
 
 int

Reply via email to