Module Name:    src
Committed By:   ozaki-r
Date:           Thu Jul 13 01:22:44 UTC 2017

Modified Files:
        src/sys/netipsec: ipsec_output.c key.c key.h

Log Message:
Simplify; omit unnecessary saidx passing

- ipsec_nextisr returns a saidx but no caller uses it
- key_checkrequest is passed a saidx but it can be gotton by
  another argument (isr)


To generate a diff of this commit:
cvs rdiff -u -r1.51 -r1.52 src/sys/netipsec/ipsec_output.c
cvs rdiff -u -r1.180 -r1.181 src/sys/netipsec/key.c
cvs rdiff -u -r1.20 -r1.21 src/sys/netipsec/key.h

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/ipsec_output.c
diff -u src/sys/netipsec/ipsec_output.c:1.51 src/sys/netipsec/ipsec_output.c:1.52
--- src/sys/netipsec/ipsec_output.c:1.51	Wed Jul 12 07:00:40 2017
+++ src/sys/netipsec/ipsec_output.c	Thu Jul 13 01:22:44 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_output.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $	*/
+/*	$NetBSD: ipsec_output.c,v 1.52 2017/07/13 01:22:44 ozaki-r Exp $	*/
 
 /*-
  * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
@@ -29,7 +29,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.52 2017/07/13 01:22:44 ozaki-r Exp $");
 
 /*
  * IPsec output processing.
@@ -293,7 +293,6 @@ ipsec_nextisr(
 	struct mbuf *m,
 	struct ipsecrequest *isr,
 	int af,
-	struct secasindex *saidx,
 	int *error
 )
 {
@@ -313,6 +312,7 @@ do {									\
 } while (/*CONSTCOND*/0)
 
 	struct secasvar *sav;
+	struct secasindex *saidx;
 
 	IPSEC_SPLASSERT_SOFTNET("ipsec_nextisr");
 	KASSERTMSG(af == AF_INET || af == AF_INET6,
@@ -323,7 +323,7 @@ again:
 	 * we only fillin unspecified SA peers for transport
 	 * mode; for tunnel mode they must already be filled in.
 	 */
-	*saidx = isr->saidx;
+	saidx = &isr->saidx;
 	if (isr->saidx.mode == IPSEC_MODE_TRANSPORT) {
 		/* Fillin unspecified SA peers only for transport mode */
 		if (af == AF_INET) {
@@ -380,7 +380,7 @@ again:
 	/*
 	 * Lookup SA and validate it.
 	 */
-	*error = key_checkrequest(isr, saidx);
+	*error = key_checkrequest(isr);
 	if (*error != 0) {
 		/*
 		 * IPsec processing is required, but no SA found.
@@ -442,7 +442,6 @@ bad:
 int
 ipsec4_process_packet(struct mbuf *m, struct ipsecrequest *isr)
 {
-	struct secasindex saidx;
 	struct secasvar *sav;
 	struct ip *ip;
 	int s, error, i, off;
@@ -454,7 +453,7 @@ ipsec4_process_packet(struct mbuf *m, st
 
 	s = splsoftnet();			/* insure SA contents don't change */
 
-	isr = ipsec_nextisr(m, isr, AF_INET, &saidx, &error);
+	isr = ipsec_nextisr(m, isr, AF_INET, &error);
 	if (isr == NULL) {
 		if (error != 0) {
 			goto bad;
@@ -674,7 +673,6 @@ ipsec6_process_packet(
  	struct ipsecrequest *isr
     )
 {
-	struct secasindex saidx;
 	struct secasvar *sav;
 	struct ip6_hdr *ip6;
 	int s, error, i, off;
@@ -685,7 +683,7 @@ ipsec6_process_packet(
 
 	s = splsoftnet();   /* insure SA contents don't change */
 
-	isr = ipsec_nextisr(m, isr, AF_INET6, &saidx, &error);
+	isr = ipsec_nextisr(m, isr, AF_INET6, &error);
 	if (isr == NULL) {
 		if (error != 0) {
 			/* XXX Should we send a notification ? */

Index: src/sys/netipsec/key.c
diff -u src/sys/netipsec/key.c:1.180 src/sys/netipsec/key.c:1.181
--- src/sys/netipsec/key.c:1.180	Wed Jul 12 07:33:37 2017
+++ src/sys/netipsec/key.c	Thu Jul 13 01:22:44 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.c,v 1.180 2017/07/12 07:33:37 ozaki-r Exp $	*/
+/*	$NetBSD: key.c,v 1.181 2017/07/13 01:22:44 ozaki-r Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.180 2017/07/12 07:33:37 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.181 2017/07/13 01:22:44 ozaki-r Exp $");
 
 /*
  * This code is referd to RFC 2367
@@ -838,14 +838,14 @@ done:
  *	ENOENT: policy may be valid, but SA with REQUIRE is on acquiring.
  */
 int
-key_checkrequest(struct ipsecrequest *isr, const struct secasindex *saidx)
+key_checkrequest(struct ipsecrequest *isr)
 {
 	u_int level;
 	int error;
 	struct secasvar *oldsav = NULL;
+	const struct secasindex *saidx = &isr->saidx;
 
 	KASSERT(isr != NULL);
-	KASSERT(saidx != NULL);
 	KASSERTMSG(saidx->mode == IPSEC_MODE_TRANSPORT ||
 	    saidx->mode == IPSEC_MODE_TUNNEL,
 	    "unexpected policy %u", saidx->mode);

Index: src/sys/netipsec/key.h
diff -u src/sys/netipsec/key.h:1.20 src/sys/netipsec/key.h:1.21
--- src/sys/netipsec/key.h:1.20	Fri Jul  7 01:37:34 2017
+++ src/sys/netipsec/key.h	Thu Jul 13 01:22:44 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.h,v 1.20 2017/07/07 01:37:34 ozaki-r Exp $	*/
+/*	$NetBSD: key.h,v 1.21 2017/07/13 01:22:44 ozaki-r Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/key.h,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /*	$KAME: key.h,v 1.21 2001/07/27 03:51:30 itojun Exp $	*/
 
@@ -90,7 +90,7 @@ void key_freesav(struct secasvar **, con
 	key_freesav(psav, __func__, __LINE__)
 
 int key_checktunnelsanity (struct secasvar *, u_int, void *, void *);
-int key_checkrequest (struct ipsecrequest *isr, const struct secasindex *);
+int key_checkrequest(struct ipsecrequest *);
 
 struct secpolicy *key_msg2sp (const struct sadb_x_policy *, size_t, int *);
 struct mbuf *key_sp2msg (const struct secpolicy *);

Reply via email to