Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/sys/netipsec rename pcb_sp to policy to avoid:



details:   https://anonhg.NetBSD.org/src/rev/ee00f614049a
branches:  trunk
changeset: 783138:ee00f614049a
user:      christos <christos%NetBSD.org@localhost>
date:      Fri Dec 07 15:29:38 2012 +0000

description:
rename pcb_sp to policy to avoid:
$SRC/arch/arm/include/pcb.h:#define     pcb_sp          pcb_un.un_32.pcb32_sp
$SRC/arch/arm/include/pcb.h:#define     pcb_sp          pcb_sf.sf_r13

diffstat:

 sys/netipsec/ipsec.c |  56 ++++++++++++++++++++++++++--------------------------
 1 files changed, 28 insertions(+), 28 deletions(-)

diffs (213 lines):

diff -r 18eaeff54786 -r ee00f614049a sys/netipsec/ipsec.c
--- a/sys/netipsec/ipsec.c      Fri Dec 07 12:57:01 2012 +0000
+++ b/sys/netipsec/ipsec.c      Fri Dec 07 15:29:38 2012 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: ipsec.c,v 1.56 2012/03/13 18:41:00 elad Exp $  */
+/*     $NetBSD: ipsec.c,v 1.57 2012/12/07 15:29:38 christos Exp $      */
 /*     $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $       */
 /*     $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.56 2012/03/13 18:41:00 elad Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.57 2012/12/07 15:29:38 christos Exp $");
 
 /*
  * IPsec controller part.
@@ -1155,12 +1155,12 @@
 
 /* initialize policy in PCB */
 int
-ipsec_init_policy(struct socket *so, struct inpcbpolicy **pcb_sp)
+ipsec_init_policy(struct socket *so, struct inpcbpolicy **policy)
 {
        struct inpcbpolicy *new;
 
        /* sanity check. */
-       if (so == NULL || pcb_sp == NULL)
+       if (so == NULL || policy == NULL)
                panic("ipsec_init_policy: NULL pointer was passed");
 
        new = malloc(sizeof(*new), M_SECA, M_NOWAIT|M_ZERO);
@@ -1189,7 +1189,7 @@
        new->sp_out->state = IPSEC_SPSTATE_ALIVE;
        new->sp_out->policy = IPSEC_POLICY_ENTRUST;
 
-       *pcb_sp = new;
+       *policy = new;
 
        return 0;
 }
@@ -1278,7 +1278,7 @@
 /* set policy and ipsec request if present. */
 static int
 ipsec_set_policy(
-       struct secpolicy **pcb_sp,
+       struct secpolicy **policy,
        int optname,
        const void *request,
        size_t len,
@@ -1290,7 +1290,7 @@
        int error;
 
        /* sanity check. */
-       if (pcb_sp == NULL || *pcb_sp == NULL || request == NULL)
+       if (policy == NULL || *policy == NULL || request == NULL)
                return EINVAL;
        if (len < sizeof(*xpl))
                return EINVAL;
@@ -1321,8 +1321,8 @@
        newsp->state = IPSEC_SPSTATE_ALIVE;
 
        /* clear old SP and set new SP */
-       KEY_FREESP(pcb_sp);
-       *pcb_sp = newsp;
+       KEY_FREESP(policy);
+       *policy = newsp;
        KEYDEBUG(KEYDEBUG_IPSEC_DUMP,
                printf("ipsec_set_policy: new policy\n");
                kdebug_secpolicy(newsp));
@@ -1331,14 +1331,14 @@
 }
 
 static int
-ipsec_get_policy(struct secpolicy *pcb_sp, struct mbuf **mp)
+ipsec_get_policy(struct secpolicy *policy, struct mbuf **mp)
 {
 
        /* sanity check. */
-       if (pcb_sp == NULL || mp == NULL)
+       if (policy == NULL || mp == NULL)
                return EINVAL;
 
-       *mp = key_sp2msg(pcb_sp);
+       *mp = key_sp2msg(policy);
        if (!*mp) {
                ipseclog((LOG_DEBUG, "ipsec_get_policy: No more memory.\n"));
                return ENOBUFS;
@@ -1357,7 +1357,7 @@
                  size_t len, kauth_cred_t cred)
 {
        const struct sadb_x_policy *xpl;
-       struct secpolicy **pcb_sp;
+       struct secpolicy **policy;
 
        /* sanity check. */
        if (inp == NULL || request == NULL)
@@ -1372,10 +1372,10 @@
        /* select direction */
        switch (xpl->sadb_x_policy_dir) {
        case IPSEC_DIR_INBOUND:
-               pcb_sp = &inp->inp_sp->sp_in;
+               policy = &inp->inp_sp->sp_in;
                break;
        case IPSEC_DIR_OUTBOUND:
-               pcb_sp = &inp->inp_sp->sp_out;
+               policy = &inp->inp_sp->sp_out;
                break;
        default:
                ipseclog((LOG_ERR, "ipsec4_set_policy: invalid direction=%u\n",
@@ -1383,7 +1383,7 @@
                return EINVAL;
        }
 
-       return ipsec_set_policy(pcb_sp, optname, request, len, cred);
+       return ipsec_set_policy(policy, optname, request, len, cred);
 }
 
 int
@@ -1391,7 +1391,7 @@
                  struct mbuf **mp)
 {
        const struct sadb_x_policy *xpl;
-       struct secpolicy *pcb_sp;
+       struct secpolicy *policy;
 
        /* sanity check. */
        if (inp == NULL || request == NULL || mp == NULL)
@@ -1404,10 +1404,10 @@
        /* select direction */
        switch (xpl->sadb_x_policy_dir) {
        case IPSEC_DIR_INBOUND:
-               pcb_sp = inp->inp_sp->sp_in;
+               policy = inp->inp_sp->sp_in;
                break;
        case IPSEC_DIR_OUTBOUND:
-               pcb_sp = inp->inp_sp->sp_out;
+               policy = inp->inp_sp->sp_out;
                break;
        default:
                ipseclog((LOG_ERR, "ipsec4_set_policy: invalid direction=%u\n",
@@ -1415,7 +1415,7 @@
                return EINVAL;
        }
 
-       return ipsec_get_policy(pcb_sp, mp);
+       return ipsec_get_policy(policy, mp);
 }
 
 /* delete policy in PCB */
@@ -1449,7 +1449,7 @@
                  size_t len, kauth_cred_t cred)
 {
        const struct sadb_x_policy *xpl;
-       struct secpolicy **pcb_sp;
+       struct secpolicy **policy;
 
        /* sanity check. */
        if (in6p == NULL || request == NULL)
@@ -1461,10 +1461,10 @@
        /* select direction */
        switch (xpl->sadb_x_policy_dir) {
        case IPSEC_DIR_INBOUND:
-               pcb_sp = &in6p->in6p_sp->sp_in;
+               policy = &in6p->in6p_sp->sp_in;
                break;
        case IPSEC_DIR_OUTBOUND:
-               pcb_sp = &in6p->in6p_sp->sp_out;
+               policy = &in6p->in6p_sp->sp_out;
                break;
        default:
                ipseclog((LOG_ERR, "ipsec6_set_policy: invalid direction=%u\n",
@@ -1472,7 +1472,7 @@
                return EINVAL;
        }
 
-       return ipsec_set_policy(pcb_sp, optname, request, len, cred);
+       return ipsec_set_policy(policy, optname, request, len, cred);
 }
 
 int
@@ -1480,7 +1480,7 @@
                  struct mbuf **mp)
 {
        const struct sadb_x_policy *xpl;
-       struct secpolicy *pcb_sp;
+       struct secpolicy *policy;
 
        /* sanity check. */
        if (in6p == NULL || request == NULL || mp == NULL)
@@ -1493,10 +1493,10 @@
        /* select direction */
        switch (xpl->sadb_x_policy_dir) {
        case IPSEC_DIR_INBOUND:
-               pcb_sp = in6p->in6p_sp->sp_in;
+               policy = in6p->in6p_sp->sp_in;
                break;
        case IPSEC_DIR_OUTBOUND:
-               pcb_sp = in6p->in6p_sp->sp_out;
+               policy = in6p->in6p_sp->sp_out;
                break;
        default:
                ipseclog((LOG_ERR, "ipsec6_set_policy: invalid direction=%u\n",
@@ -1504,7 +1504,7 @@
                return EINVAL;
        }
 
-       return ipsec_get_policy(pcb_sp, mp);
+       return ipsec_get_policy(policy, mp);
 }
 
 int



Home | Main Index | Thread Index | Old Index