Module Name:    src
Committed By:   mrg
Date:           Sun Nov  3 18:37:10 UTC 2013

Modified Files:
        src/sys/netipsec: ipsec_input.c ipsec_output.c key.c xform_ah.c
            xform_esp.c xform_ipcomp.c

Log Message:
- apply some __diagused
- remove unused variables
- move some variables inside their relevant use #ifdef


To generate a diff of this commit:
cvs rdiff -u -r1.30 -r1.31 src/sys/netipsec/ipsec_input.c \
    src/sys/netipsec/xform_ipcomp.c
cvs rdiff -u -r1.39 -r1.40 src/sys/netipsec/ipsec_output.c
cvs rdiff -u -r1.83 -r1.84 src/sys/netipsec/key.c
cvs rdiff -u -r1.41 -r1.42 src/sys/netipsec/xform_ah.c
cvs rdiff -u -r1.44 -r1.45 src/sys/netipsec/xform_esp.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec_input.c
diff -u src/sys/netipsec/ipsec_input.c:1.30 src/sys/netipsec/ipsec_input.c:1.31
--- src/sys/netipsec/ipsec_input.c:1.30	Tue Jun  4 22:47:37 2013
+++ src/sys/netipsec/ipsec_input.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_input.c,v 1.30 2013/06/04 22:47:37 christos Exp $	*/
+/*	$NetBSD: ipsec_input.c,v 1.31 2013/11/03 18:37:10 mrg Exp $	*/
 /*	$FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $	*/
 /*	$OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $	*/
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.30 2013/06/04 22:47:37 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.31 2013/11/03 18:37:10 mrg Exp $");
 
 /*
  * IPsec input processing.
@@ -278,7 +278,7 @@ int
 ipsec4_common_input_cb(struct mbuf *m, struct secasvar *sav,
     int skip, int protoff, struct m_tag *mt)
 {
-	int prot, af, sproto;
+	int prot, af __diagused, sproto;
 	struct ip *ip;
 	struct m_tag *mtag;
 	struct tdb_ident *tdbi;
Index: src/sys/netipsec/xform_ipcomp.c
diff -u src/sys/netipsec/xform_ipcomp.c:1.30 src/sys/netipsec/xform_ipcomp.c:1.31
--- src/sys/netipsec/xform_ipcomp.c:1.30	Tue Jun  4 22:47:37 2013
+++ src/sys/netipsec/xform_ipcomp.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipcomp.c,v 1.30 2013/06/04 22:47:37 christos Exp $	*/
+/*	$NetBSD: xform_ipcomp.c,v 1.31 2013/11/03 18:37:10 mrg Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */
 
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.30 2013/06/04 22:47:37 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.31 2013/11/03 18:37:10 mrg Exp $");
 
 /* IP payload compression protocol (IPComp), see RFC 2393 */
 #include "opt_inet.h"
@@ -233,26 +233,21 @@ ipcomp_input(struct mbuf *m, const struc
 static int
 ipcomp_input_cb(struct cryptop *crp)
 {
-	struct cryptodesc *crd;
 	struct tdb_crypto *tc;
 	int skip, protoff;
-	struct mtag *mtag;
 	struct mbuf *m;
 	struct secasvar *sav;
-	struct secasindex *saidx;
+	struct secasindex *saidx __diagused;
 	int s, hlen = IPCOMP_HLENGTH, error, clen;
 	u_int8_t nproto;
 	void *addr;
 	u_int16_t dport;
 	u_int16_t sport;
 
-	crd = crp->crp_desc;
-
 	tc = (struct tdb_crypto *) crp->crp_opaque;
 	IPSEC_ASSERT(tc != NULL, ("ipcomp_input_cb: null opaque crypto data area!"));
 	skip = tc->tc_skip;
 	protoff = tc->tc_protoff;
-	mtag = (struct mtag *) tc->tc_ptr;
 	m = (struct mbuf *) crp->crp_buf;
 
 	/* find the source port for NAT-T */

Index: src/sys/netipsec/ipsec_output.c
diff -u src/sys/netipsec/ipsec_output.c:1.39 src/sys/netipsec/ipsec_output.c:1.40
--- src/sys/netipsec/ipsec_output.c:1.39	Tue Jun  4 22:47:37 2013
+++ src/sys/netipsec/ipsec_output.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_output.c,v 1.39 2013/06/04 22:47:37 christos Exp $	*/
+/*	$NetBSD: ipsec_output.c,v 1.40 2013/11/03 18:37:10 mrg Exp $	*/
 
 /*-
  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
@@ -29,7 +29,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.39 2013/06/04 22:47:37 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.40 2013/11/03 18:37:10 mrg Exp $");
 
 /*
  * IPsec output processing.
@@ -119,7 +119,9 @@ static int
 ipsec_reinject_ipstack(struct mbuf *m, int af)
 {
 #ifdef INET
-	struct ip * ip;
+#ifdef __FreeBSD__
+	struct ip *ip;
+#endif /* __FreeBSD_ */
 #endif /* INET */
 #if defined(INET) || defined(INET6)
 	int rv;
@@ -128,8 +130,8 @@ ipsec_reinject_ipstack(struct mbuf *m, i
 	switch (af) {
 #ifdef INET
 	case AF_INET:
-		ip = mtod(m, struct ip *);
 #ifdef __FreeBSD__
+		ip = mtod(m, struct ip *);
 		/* FreeBSD ip_output() expects ip_len, ip_off in host endian */
 		ip->ip_len = ntohs(ip->ip_len);
 		ip->ip_off = ntohs(ip->ip_off);

Index: src/sys/netipsec/key.c
diff -u src/sys/netipsec/key.c:1.83 src/sys/netipsec/key.c:1.84
--- src/sys/netipsec/key.c:1.83	Thu Sep 19 19:29:35 2013
+++ src/sys/netipsec/key.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.c,v 1.83 2013/09/19 19:29:35 christos Exp $	*/
+/*	$NetBSD: key.c,v 1.84 2013/11/03 18:37:10 mrg Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.83 2013/09/19 19:29:35 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.84 2013/11/03 18:37:10 mrg Exp $");
 
 /*
  * This code is referd to RFC 2367
@@ -7261,7 +7261,6 @@ key_parse(struct mbuf *m, struct socket 
 {
 	struct sadb_msg *msg;
 	struct sadb_msghdr mh;
-	u_int orglen;
 	int error;
 	int target;
 
@@ -7281,7 +7280,6 @@ key_parse(struct mbuf *m, struct socket 
 			return ENOBUFS;
 	}
 	msg = mtod(m, struct sadb_msg *);
-	orglen = PFKEY_UNUNIT64(msg->sadb_msg_len);
 	target = KEY_SENDUP_ONE;
 
 	if ((m->m_flags & M_PKTHDR) == 0 ||

Index: src/sys/netipsec/xform_ah.c
diff -u src/sys/netipsec/xform_ah.c:1.41 src/sys/netipsec/xform_ah.c:1.42
--- src/sys/netipsec/xform_ah.c:1.41	Wed Aug 28 15:24:41 2013
+++ src/sys/netipsec/xform_ah.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ah.c,v 1.41 2013/08/28 15:24:41 riastradh Exp $	*/
+/*	$NetBSD: xform_ah.c,v 1.42 2013/11/03 18:37:10 mrg Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/xform_ah.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_ah.c,v 1.63 2001/06/26 06:18:58 angelos Exp $ */
 /*
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.41 2013/08/28 15:24:41 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ah.c,v 1.42 2013/11/03 18:37:10 mrg Exp $");
 
 #include "opt_inet.h"
 #ifdef __FreeBSD__
@@ -818,8 +818,6 @@ ah_input_cb(struct cryptop *crp)
 	int rplen, error, skip, protoff;
 	unsigned char calc[AH_ALEN_MAX];
 	struct mbuf *m;
-	struct cryptodesc *crd;
-	const struct auth_hash *ahx;
 	struct tdb_crypto *tc;
 	struct m_tag *mtag;
 	struct secasvar *sav;
@@ -830,8 +828,6 @@ ah_input_cb(struct cryptop *crp)
 	u_int16_t dport;
 	u_int16_t sport;
 
-	crd = crp->crp_desc;
-
 	tc = (struct tdb_crypto *) crp->crp_opaque;
 	IPSEC_ASSERT(tc != NULL, ("ah_input_cb: null opaque crypto data area!"));
 	skip = tc->tc_skip;
@@ -861,8 +857,6 @@ ah_input_cb(struct cryptop *crp)
 		("ah_input_cb: unexpected protocol family %u",
 		 saidx->dst.sa.sa_family));
 
-	ahx = sav->tdb_authalgxform;
-
 	/* Check for crypto errors. */
 	if (crp->crp_etype) {
 		if (sav->tdb_cryptoid != 0)
@@ -1235,7 +1229,7 @@ bad:
 static int
 ah_output_cb(struct cryptop *crp)
 {
-	int skip, protoff, error;
+	int skip, error;
 	struct tdb_crypto *tc;
 	struct ipsecrequest *isr;
 	struct secasvar *sav;
@@ -1246,7 +1240,6 @@ ah_output_cb(struct cryptop *crp)
 	tc = (struct tdb_crypto *) crp->crp_opaque;
 	IPSEC_ASSERT(tc != NULL, ("ah_output_cb: null opaque data area!"));
 	skip = tc->tc_skip;
-	protoff = tc->tc_protoff;
 	ptr = (tc + 1);
 	m = (struct mbuf *) crp->crp_buf;
 

Index: src/sys/netipsec/xform_esp.c
diff -u src/sys/netipsec/xform_esp.c:1.44 src/sys/netipsec/xform_esp.c:1.45
--- src/sys/netipsec/xform_esp.c:1.44	Wed Aug 28 15:24:41 2013
+++ src/sys/netipsec/xform_esp.c	Sun Nov  3 18:37:10 2013
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_esp.c,v 1.44 2013/08/28 15:24:41 riastradh Exp $	*/
+/*	$NetBSD: xform_esp.c,v 1.45 2013/11/03 18:37:10 mrg Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/xform_esp.c,v 1.2.2.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$OpenBSD: ip_esp.c,v 1.69 2001/06/26 06:18:59 angelos Exp $ */
 
@@ -39,7 +39,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.44 2013/08/28 15:24:41 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_esp.c,v 1.45 2013/11/03 18:37:10 mrg Exp $");
 
 #include "opt_inet.h"
 #ifdef __FreeBSD__
@@ -503,9 +503,8 @@ esp_input_cb(struct cryptop *crp)
 	u_int8_t lastthree[3], aalg[AH_ALEN_MAX];
 	int s, hlen, skip, protoff, error;
 	struct mbuf *m;
-	struct cryptodesc *crd;
+	struct cryptodesc *crd __diagused;
 	const struct auth_hash *esph;
-	const struct enc_xform *espx;
 	struct tdb_crypto *tc;
 	struct m_tag *mtag;
 	struct secasvar *sav;
@@ -547,7 +546,6 @@ esp_input_cb(struct cryptop *crp)
 		 saidx->dst.sa.sa_family));
 
 	esph = sav->tdb_authalgxform;
-	espx = sav->tdb_encalgxform;
 
 	/* Check for crypto errors */
 	if (crp->crp_etype) {
@@ -719,7 +717,7 @@ esp_output(
 {
 	const struct enc_xform *espx;
 	const struct auth_hash *esph;
-	int hlen, rlen, plen, padding, blks, alen, i, roff;
+	int hlen, rlen, padding, blks, alen, i, roff;
 	struct mbuf *mo = NULL;
 	struct tdb_crypto *tc;
 	const struct secasvar *sav;
@@ -753,7 +751,6 @@ esp_output(
 
 	/* XXX clamp padding length a la KAME??? */
 	padding = ((blks - ((rlen + 2) % blks)) % blks) + 2;
-	plen = rlen + padding;		/* Padded payload length. */
 
 	if (esph)
 		alen = esph->authsize;

Reply via email to