summaryrefslogtreecommitdiffstats
path: root/sys/netinet6/ip6_ipsec.c
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2007-07-05 16:29:40 +0000
committerdelphij <delphij@FreeBSD.org>2007-07-05 16:29:40 +0000
commit42fe5e7f836765d5e16a16ae1d90eb6a6e034549 (patch)
tree0d5c02eb5ad8b661ab1f502bb251562a254ddc3d /sys/netinet6/ip6_ipsec.c
parente6f8b0995d59e493018009921005c7f50759dc53 (diff)
downloadFreeBSD-src-42fe5e7f836765d5e16a16ae1d90eb6a6e034549.zip
FreeBSD-src-42fe5e7f836765d5e16a16ae1d90eb6a6e034549.tar.gz
Space cleanup
Approved by: re (rwatson)
Diffstat (limited to 'sys/netinet6/ip6_ipsec.c')
-rw-r--r--sys/netinet6/ip6_ipsec.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/sys/netinet6/ip6_ipsec.c b/sys/netinet6/ip6_ipsec.c
index 6900681..12b43f2 100644
--- a/sys/netinet6/ip6_ipsec.c
+++ b/sys/netinet6/ip6_ipsec.c
@@ -110,7 +110,7 @@ ip6_ipsec_fwd(struct mbuf *m)
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
} else {
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
- IP_FORWARDING, &error);
+ IP_FORWARDING, &error);
}
if (sp == NULL) { /* NB: can happen if error */
splx(s);
@@ -161,7 +161,7 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
* done. If so, then just pass it along. This tag gets
* set during AH, ESP, etc. input handling, before the
* packet is returned to the ip input queue for delivery.
- */
+ */
mtag = m_tag_find(m, PACKET_TAG_IPSEC_IN_DONE, NULL);
s = splnet();
if (mtag != NULL) {
@@ -169,7 +169,7 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
} else {
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
- IP_FORWARDING, &error);
+ IP_FORWARDING, &error);
}
if (sp != NULL) {
/*
@@ -194,12 +194,12 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
/*
* Called from ip6_output().
* 1 = drop packet, 0 = continue processing packet,
- * -1 = packet was reinjected and stop processing packet
- */
+ * -1 = packet was reinjected and stop processing packet
+ */
int
ip6_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
- struct ifnet **ifp, struct secpolicy **sp)
+ struct ifnet **ifp, struct secpolicy **sp)
{
#ifdef IPSEC
struct tdb_ident *tdbi;
@@ -221,7 +221,7 @@ ip6_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
/*
* There are four return cases:
- * sp != NULL apply IPsec policy
+ * sp != NULL apply IPsec policy
* sp == NULL, error == 0 no IPsec handling needed
* sp == NULL, error == -EINVAL discard packet w/o error
* sp == NULL, error != 0 discard packet, report error
OpenPOWER on IntegriCloud