aboutsummaryrefslogtreecommitdiff
path: root/sys/netipsec
diff options
context:
space:
mode:
authorMateusz Guzik <mjg@FreeBSD.org>2020-09-01 21:19:14 +0000
committerMateusz Guzik <mjg@FreeBSD.org>2020-09-01 21:19:14 +0000
commit662c13053f4bf2d6245ba7e2b66c10d1cd5c1fb9 (patch)
tree5cffe4473640975abc443ef4b8047b34cdb4a039 /sys/netipsec
parent586ee69f09c5060621486b34722a4a806581f93d (diff)
downloadsrc-662c13053f4bf2d6245ba7e2b66c10d1cd5c1fb9.tar.gz
src-662c13053f4bf2d6245ba7e2b66c10d1cd5c1fb9.zip
net: clean up empty lines in .c and .h files
Notes
Notes: svn path=/head/; revision=365071
Diffstat (limited to 'sys/netipsec')
-rw-r--r--sys/netipsec/esp.h2
-rw-r--r--sys/netipsec/ipsec.c2
-rw-r--r--sys/netipsec/ipsec_input.c2
-rw-r--r--sys/netipsec/ipsec_output.c1
-rw-r--r--sys/netipsec/ipsec_pcb.c1
-rw-r--r--sys/netipsec/key.c8
-rw-r--r--sys/netipsec/key_debug.c2
-rw-r--r--sys/netipsec/udpencap.c1
8 files changed, 2 insertions, 17 deletions
diff --git a/sys/netipsec/esp.h b/sys/netipsec/esp.h
index 94612b878514..2e7c0c9cffa3 100644
--- a/sys/netipsec/esp.h
+++ b/sys/netipsec/esp.h
@@ -64,6 +64,6 @@ struct esptail {
u_int8_t esp_nxt; /* Next header */
/*variable size, 32bit bound*/ /* Authentication data (new IPsec)*/
};
-
+
#define ESP_ALEN 12 /* 96-bit authenticator */
#endif /*_NETIPSEC_ESP_H_*/
diff --git a/sys/netipsec/ipsec.c b/sys/netipsec/ipsec.c
index f8ba71cf6635..7d336641b96e 100644
--- a/sys/netipsec/ipsec.c
+++ b/sys/netipsec/ipsec.c
@@ -1303,7 +1303,6 @@ ipsec_updatereplay(uint32_t seq, struct secasvar *sav)
ok:
if (replay->count == ~0) {
-
/* Set overflow flag. */
replay->overflow++;
@@ -1392,7 +1391,6 @@ def_policy_init(const void *unused __unused)
printf("%s: failed to initialize default policy\n", __func__);
}
-
static void
def_policy_uninit(const void *unused __unused)
{
diff --git a/sys/netipsec/ipsec_input.c b/sys/netipsec/ipsec_input.c
index 7f9317bee8b6..48acba68a1fe 100644
--- a/sys/netipsec/ipsec_input.c
+++ b/sys/netipsec/ipsec_input.c
@@ -98,7 +98,6 @@ __FBSDID("$FreeBSD$");
#include <machine/in_cksum.h>
#include <machine/stdarg.h>
-
#define IPSEC_ISTAT(proto, name) do { \
if ((proto) == IPPROTO_ESP) \
ESPSTAT_INC(esps_##name); \
@@ -516,7 +515,6 @@ ipsec6_common_input_cb(struct mbuf *m, struct secasvar *sav, int skip,
/* Fix IPv6 header */
if (m->m_len < sizeof(struct ip6_hdr) &&
(m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) {
-
DPRINTF(("%s: processing failed for SA %s/%08lx\n",
__func__, ipsec_address(&sav->sah->saidx.dst, buf,
sizeof(buf)), (u_long) ntohl(sav->spi)));
diff --git a/sys/netipsec/ipsec_output.c b/sys/netipsec/ipsec_output.c
index 557c0d1d4a4e..f95a35226f6f 100644
--- a/sys/netipsec/ipsec_output.c
+++ b/sys/netipsec/ipsec_output.c
@@ -965,4 +965,3 @@ ipsec_encap(struct mbuf **mp, struct secasindex *saidx)
(*mp)->m_flags &= ~(M_BCAST | M_MCAST);
return (0);
}
-
diff --git a/sys/netipsec/ipsec_pcb.c b/sys/netipsec/ipsec_pcb.c
index 93f60b10e788..63ad288ab0da 100644
--- a/sys/netipsec/ipsec_pcb.c
+++ b/sys/netipsec/ipsec_pcb.c
@@ -480,4 +480,3 @@ ipsec6_pcbctl(struct inpcb *inp, struct sockopt *sopt)
return (ipsec_control_pcbpolicy(inp, sopt));
}
#endif
-
diff --git a/sys/netipsec/key.c b/sys/netipsec/key.c
index 0497187db856..cd99f3d251d8 100644
--- a/sys/netipsec/key.c
+++ b/sys/netipsec/key.c
@@ -871,7 +871,6 @@ key_do_allocsp(struct secpolicyindex *spidx, u_int dir)
return (sp);
}
-
/*
* allocating a SP for OUTBOUND or INBOUND packet.
* Must call key_freesp() later.
@@ -1036,7 +1035,6 @@ key_allocsa_policy(struct secpolicy *sp, const struct secasindex *saidx,
kdebug_secash(sah, " "));
if (key_cmpsaidx(&sah->saidx, saidx, CMP_MODE_REQID))
break;
-
}
if (sah != NULL) {
/*
@@ -4066,7 +4064,6 @@ key_dup_keymsg(const struct sadb_key *src, size_t len,
} else {
ipseclog((LOG_DEBUG, "%s: No more memory.\n",
__func__));
-
}
return (dst);
}
@@ -4133,7 +4130,6 @@ key_cmpsaidx(const struct secasindex *saidx0, const struct secasindex *saidx1,
saidx0->dst.sa.sa_len) != 0)
return 0;
} else {
-
/* CMP_MODE_REQID, CMP_REQID, CMP_HEAD */
if (flag == CMP_MODE_REQID || flag == CMP_REQID) {
/*
@@ -5031,7 +5027,6 @@ key_do_getnewspi(struct sadb_spirange *spirange, struct secasindex *saidx)
count--; /* taking one cost. */
newspi = min;
} else {
-
/* init SPI */
newspi = 0;
@@ -8536,7 +8531,7 @@ key_setlifetime(struct seclifetime *src, uint16_t exttype)
p->sadb_lifetime_bytes = src->bytes;
p->sadb_lifetime_addtime = src->addtime;
p->sadb_lifetime_usetime = src->usetime;
-
+
return m;
}
@@ -8573,4 +8568,3 @@ comp_algorithm_lookup(int alg)
return (supported_calgs[i].xform);
return (NULL);
}
-
diff --git a/sys/netipsec/key_debug.c b/sys/netipsec/key_debug.c
index 3041d6368755..d746bfbbe800 100644
--- a/sys/netipsec/key_debug.c
+++ b/sys/netipsec/key_debug.c
@@ -163,7 +163,6 @@ kdebug_sadb_exttype(uint16_t type)
#undef X_NAME
}
-
/* %%%: about struct sadb_msg */
void
kdebug_sadb(struct sadb_msg *base)
@@ -1030,7 +1029,6 @@ ipsec_bindump(caddr_t buf, int len)
return;
}
-
void
ipsec_hexdump(caddr_t buf, int len)
{
diff --git a/sys/netipsec/udpencap.c b/sys/netipsec/udpencap.c
index b982d6fbdb80..0fafbd919d6e 100644
--- a/sys/netipsec/udpencap.c
+++ b/sys/netipsec/udpencap.c
@@ -291,4 +291,3 @@ udp_ipsec_adjust_cksum(struct mbuf *m, struct secasvar *sav, int proto,
m->m_pkthdr.csum_flags &= ~CSUM_DELAY_DATA;
}
}
-