Module Name:    src
Committed By:   maxv
Date:           Thu Feb 15 13:51:32 UTC 2018

Modified Files:
        src/sys/netipsec: xform_ipcomp.c

Log Message:
Style and simplify.


To generate a diff of this commit:
cvs rdiff -u -r1.56 -r1.57 src/sys/netipsec/xform_ipcomp.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/xform_ipcomp.c
diff -u src/sys/netipsec/xform_ipcomp.c:1.56 src/sys/netipsec/xform_ipcomp.c:1.57
--- src/sys/netipsec/xform_ipcomp.c:1.56	Thu Feb 15 04:24:32 2018
+++ src/sys/netipsec/xform_ipcomp.c	Thu Feb 15 13:51:32 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: xform_ipcomp.c,v 1.56 2018/02/15 04:24:32 ozaki-r Exp $	*/
+/*	$NetBSD: xform_ipcomp.c,v 1.57 2018/02/15 13:51:32 maxv Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/xform_ipcomp.c,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $	*/
 /* $OpenBSD: ip_ipcomp.c,v 1.1 2001/07/05 12:08:52 jjbg Exp $ */
 
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.56 2018/02/15 04:24:32 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform_ipcomp.c,v 1.57 2018/02/15 13:51:32 maxv Exp $");
 
 /* IP payload compression protocol (IPComp), see RFC 2393 */
 #if defined(_KERNEL_OPT)
@@ -74,7 +74,7 @@ __KERNEL_RCSID(0, "$NetBSD: xform_ipcomp
 
 percpu_t *ipcompstat_percpu;
 
-int	ipcomp_enable = 1;
+int ipcomp_enable = 1;
 
 #ifdef __FreeBSD__
 SYSCTL_DECL(_net_inet_ipcomp);
@@ -258,7 +258,7 @@ ipcomp_input_cb(struct cryptop *crp)
 	struct secasindex *saidx __diagused;
 	int hlen = IPCOMP_HLENGTH, error, clen;
 	uint8_t nproto;
-	void *addr;
+	struct ipcomp *ipc;
 	uint16_t dport;
 	uint16_t sport;
 	IPSEC_DECLARE_LOCK_VARIABLE;
@@ -303,27 +303,28 @@ ipcomp_input_cb(struct cryptop *crp)
 	/* Update the counters */
 	IPCOMP_STATADD(IPCOMP_STAT_IBYTES, m->m_pkthdr.len - skip - hlen);
 
-
-	clen = crp->crp_olen;		/* Length of data after processing */
+	/* Length of data after processing */
+	clen = crp->crp_olen;
 
 	/* Release the crypto descriptors */
 	pool_cache_put(ipcomp_tdb_crypto_pool_cache, tc);
 	tc = NULL;
-	crypto_freereq(crp), crp = NULL;
+	crypto_freereq(crp);
+	crp = NULL;
 
 	/* In case it's not done already, adjust the size of the mbuf chain */
 	m->m_pkthdr.len = clen + hlen + skip;
 
 	if (m->m_len < skip + hlen && (m = m_pullup(m, skip + hlen)) == 0) {
-		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);	/*XXX*/
+		IPCOMP_STATINC(IPCOMP_STAT_HDROPS);
 		DPRINTF(("%s: m_pullup failed\n", __func__));
-		error = EINVAL;				/*XXX*/
+		error = EINVAL;
 		goto bad;
 	}
 
 	/* Keep the next protocol field */
-	addr = (uint8_t*) mtod(m, struct ip *) + skip;
-	nproto = ((struct ipcomp *) addr)->comp_nxt;
+	ipc = (struct ipcomp *)(mtod(m, uint8_t *) + skip);
+	nproto = ipc->comp_nxt;
 	switch (nproto) {
 	case IPPROTO_IPCOMP:
 	case IPPROTO_AH:
@@ -349,13 +350,14 @@ ipcomp_input_cb(struct cryptop *crp)
 	}
 
 	/* Restore the Next Protocol field */
-	m_copyback(m, protoff, sizeof(uint8_t), (uint8_t *) &nproto);
+	m_copyback(m, protoff, sizeof(uint8_t), (uint8_t *)&nproto);
 
 	IPSEC_COMMON_INPUT_CB(m, sav, skip, protoff);
 
 	KEY_SA_UNREF(&sav);
 	IPSEC_RELEASE_GLOBAL_LOCKS();
 	return error;
+
 bad:
 	if (sav)
 		KEY_SA_UNREF(&sav);
@@ -373,14 +375,8 @@ bad:
  * IPComp output routine, called by ipsec[46]_process_packet()
  */
 static int
-ipcomp_output(
-    struct mbuf *m,
-    const struct ipsecrequest *isr,
-    struct secasvar *sav,
-    struct mbuf **mp,
-    int skip,
-    int protoff
-)
+ipcomp_output(struct mbuf *m, const struct ipsecrequest *isr,
+    struct secasvar *sav, struct mbuf **mp, int skip, int protoff)
 {
 	char buf[IPSEC_ADDRSTRLEN];
 	const struct comp_algo *ipcompx;
@@ -394,9 +390,10 @@ ipcomp_output(
 	KASSERT(sav->tdb_compalgxform != NULL);
 	ipcompx = sav->tdb_compalgxform;
 
-	ralen = m->m_pkthdr.len - skip;	/* Raw payload length before comp. */
-    
-    /* Don't process the packet if it is too short */
+	/* Raw payload length before comp. */
+	ralen = m->m_pkthdr.len - skip;
+
+	/* Don't process the packet if it is too short */
 	if (ralen < ipcompx->minlen) {
 		IPCOMP_STATINC(IPCOMP_STAT_MINLEN);
 		return ipsec_process_done(m, isr, sav);
@@ -410,14 +407,14 @@ ipcomp_output(
 	switch (sav->sah->saidx.dst.sa.sa_family) {
 #ifdef INET
 	case AF_INET:
-		maxpacketsize =  IP_MAXPACKET;
+		maxpacketsize = IP_MAXPACKET;
 		break;
-#endif /* INET */
+#endif
 #ifdef INET6
 	case AF_INET6:
-		maxpacketsize =  IPV6_MAXPACKET;
+		maxpacketsize = IPV6_MAXPACKET;
 		break;
-#endif /* INET6 */
+#endif
 	default:
 		IPCOMP_STATINC(IPCOMP_STAT_NOPF);
 		DPRINTF(("%s: unknown/unsupported protocol family %d"
@@ -522,10 +519,11 @@ ipcomp_output(
 	crp->crp_sid = sav->tdb_cryptoid;
 
 	return crypto_dispatch(crp);
+
 bad:
 	if (m)
 		m_freem(m);
-	return (error);
+	return error;
 }
 
 /*
@@ -594,18 +592,18 @@ ipcomp_output_cb(struct cryptop *crp)
 #ifdef INET
 		case AF_INET:
 			ipcomp->comp_nxt = mtod(m, struct ip *)->ip_p;
-			 break;
-#endif /* INET */
+			break;
+#endif
 #ifdef INET6
 		case AF_INET6:
 			ipcomp->comp_nxt = mtod(m, struct ip6_hdr *)->ip6_nxt;
-		break;
+			break;
 #endif
 		}
 		ipcomp->comp_flags = 0;
 
 		if ((sav->flags & SADB_X_EXT_RAWCPI) == 0)
-			 cpi = sav->alg_enc;
+			cpi = sav->alg_enc;
 		else
 			cpi = ntohl(sav->spi) & 0xffff;
 		ipcomp->comp_cpi = htons(cpi);
@@ -620,13 +618,13 @@ ipcomp_output_cb(struct cryptop *crp)
 		case AF_INET:
 			mtod(m, struct ip *)->ip_len = htons(m->m_pkthdr.len);
 			break;
-#endif /* INET */
+#endif
 #ifdef INET6
 		case AF_INET6:
 			mtod(m, struct ip6_hdr *)->ip6_plen =
-				htons(m->m_pkthdr.len) - sizeof(struct ip6_hdr);
+			    htons(m->m_pkthdr.len) - sizeof(struct ip6_hdr);
 			break;
-#endif /* INET6 */
+#endif
 		default:
 			IPCOMP_STATINC(IPCOMP_STAT_NOPF);
 			DPRINTF(("ipcomp_output: unknown/unsupported protocol "
@@ -640,11 +638,11 @@ ipcomp_output_cb(struct cryptop *crp)
 	} else {
 		/* compression was useless, we have lost time */
 		IPCOMP_STATINC(IPCOMP_STAT_USELESS);
-		DPRINTF(("ipcomp_output_cb: compression was useless : initial size was %d"
-				   	"and compressed size is %d\n", rlen, crp->crp_olen));
+		DPRINTF(("ipcomp_output_cb: compression was useless: initial"
+		    "size was %d and compressed size is %d\n", rlen,
+		    crp->crp_olen));
 	}
 
-
 	/* Release the crypto descriptor */
 	pool_cache_put(ipcomp_tdb_crypto_pool_cache, tc);
 	crypto_freereq(crp);
@@ -655,6 +653,7 @@ ipcomp_output_cb(struct cryptop *crp)
 	KEY_SP_UNREF(&isr->sp);
 	IPSEC_RELEASE_GLOBAL_LOCKS();
 	return error;
+
 bad:
 	if (sav)
 		KEY_SA_UNREF(&sav);

Reply via email to