summaryrefslogtreecommitdiffstats
path: root/sys/netinet
diff options
context:
space:
mode:
authorrgrimes <rgrimes@FreeBSD.org>1995-05-30 08:16:23 +0000
committerrgrimes <rgrimes@FreeBSD.org>1995-05-30 08:16:23 +0000
commitc86f0c7a71e7ade3e38b325c186a9cf374e0411e (patch)
tree176f04f674860c7cfae9ac5d2ff4d4e1d73cb2b7 /sys/netinet
parent423ba8f9bc23d93bfc244aca9b12563b1c9de90d (diff)
downloadFreeBSD-src-c86f0c7a71e7ade3e38b325c186a9cf374e0411e.zip
FreeBSD-src-c86f0c7a71e7ade3e38b325c186a9cf374e0411e.tar.gz
Remove trailing whitespace.
Diffstat (limited to 'sys/netinet')
-rw-r--r--sys/netinet/if_ether.c4
-rw-r--r--sys/netinet/if_ether.h8
-rw-r--r--sys/netinet/if_fddi.h4
-rw-r--r--sys/netinet/igmp.c40
-rw-r--r--sys/netinet/igmp.h10
-rw-r--r--sys/netinet/in.c18
-rw-r--r--sys/netinet/in_cksum.c4
-rw-r--r--sys/netinet/in_pcb.c16
-rw-r--r--sys/netinet/in_proto.c4
-rw-r--r--sys/netinet/in_rmx.c14
-rw-r--r--sys/netinet/in_var.h6
-rw-r--r--sys/netinet/ip.h10
-rw-r--r--sys/netinet/ip_fw.c122
-rw-r--r--sys/netinet/ip_fw.h6
-rw-r--r--sys/netinet/ip_fwdef.c4
-rw-r--r--sys/netinet/ip_icmp.c12
-rw-r--r--sys/netinet/ip_icmp.h4
-rw-r--r--sys/netinet/ip_input.c18
-rw-r--r--sys/netinet/ip_mroute.c106
-rw-r--r--sys/netinet/ip_mroute.h14
-rw-r--r--sys/netinet/ip_output.c4
-rw-r--r--sys/netinet/ip_var.h6
-rw-r--r--sys/netinet/raw_ip.c8
-rw-r--r--sys/netinet/tcp.h6
-rw-r--r--sys/netinet/tcp_input.c70
-rw-r--r--sys/netinet/tcp_output.c22
-rw-r--r--sys/netinet/tcp_reass.c70
-rw-r--r--sys/netinet/tcp_subr.c8
-rw-r--r--sys/netinet/tcp_timer.c4
-rw-r--r--sys/netinet/tcp_timewait.c8
-rw-r--r--sys/netinet/tcp_usrreq.c8
-rw-r--r--sys/netinet/udp_usrreq.c4
32 files changed, 321 insertions, 321 deletions
diff --git a/sys/netinet/if_ether.c b/sys/netinet/if_ether.c
index cc1611f..0beb578 100644
--- a/sys/netinet/if_ether.c
+++ b/sys/netinet/if_ether.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)if_ether.c 8.1 (Berkeley) 6/10/93
- * $Id: if_ether.c,v 1.15 1995/05/09 13:35:44 davidg Exp $
+ * $Id: if_ether.c,v 1.16 1995/05/11 00:13:16 wollman Exp $
*/
/*
@@ -516,7 +516,7 @@ reply:
(void)memcpy(ea->arp_sha, ac->ac_enaddr, sizeof(ea->arp_sha));
rtfree(rt);
#ifdef DEBUG_PROXY
- printf("arp: proxying for %s\n",
+ printf("arp: proxying for %s\n",
inet_ntoa(itaddr));
#endif
#else
diff --git a/sys/netinet/if_ether.h b/sys/netinet/if_ether.h
index 935788c..2551fe3 100644
--- a/sys/netinet/if_ether.h
+++ b/sys/netinet/if_ether.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)if_ether.h 8.1 (Berkeley) 6/10/93
- * $Id: if_ether.h,v 1.7 1994/12/22 22:00:30 wollman Exp $
+ * $Id: if_ether.h,v 1.8 1995/04/02 01:26:26 wpaul Exp $
*/
#ifndef _NETINET_IF_ETHER_H_
@@ -92,7 +92,7 @@ struct ether_addr {
* Ethernet Address Resolution Protocol.
*
* See RFC 826 for protocol description. Structure below is adapted
- * to resolving internet addresses. Field names used correspond to
+ * to resolving internet addresses. Field names used correspond to
* RFC 826.
*/
struct ether_arp {
@@ -119,10 +119,10 @@ struct arpcom {
u_char ac_enaddr[6]; /* ethernet hardware address */
struct in_addr ac_ipaddr; /* copy of ip address- XXX */
struct ether_multi *ac_multiaddrs; /* list of ether multicast addrs */
- int ac_multicnt; /* length of ac_multiaddrs list */
+ int ac_multicnt; /* length of ac_multiaddrs list */
};
-struct llinfo_arp {
+struct llinfo_arp {
struct llinfo_arp *la_next;
struct llinfo_arp *la_prev;
struct rtentry *la_rt;
diff --git a/sys/netinet/if_fddi.h b/sys/netinet/if_fddi.h
index a8efc5a..14ec343 100644
--- a/sys/netinet/if_fddi.h
+++ b/sys/netinet/if_fddi.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)if_fddi.h 8.1 (Berkeley) 6/10/93
- * $Id: if_fddi.h,v 1.1 1995/03/10 17:43:45 thomas Exp $
+ * $Id: if_fddi.h,v 1.1 1995/03/14 09:14:14 davidg Exp $
*/
#ifndef _NETINET_IF_FDDI_H_
@@ -77,7 +77,7 @@ struct fddi_header {
void fddi_ifattach __P((struct ifnet *));
void fddi_input __P((struct ifnet *, struct fddi_header *, struct mbuf *));
int fddi_output __P((struct ifnet *,
- struct mbuf *, struct sockaddr *, struct rtentry *));
+ struct mbuf *, struct sockaddr *, struct rtentry *));
#endif
diff --git a/sys/netinet/igmp.c b/sys/netinet/igmp.c
index c864e14..dac0add 100644
--- a/sys/netinet/igmp.c
+++ b/sys/netinet/igmp.c
@@ -35,7 +35,7 @@
* SUCH DAMAGE.
*
* @(#)igmp.c 8.1 (Berkeley) 7/19/93
- * $Id: igmp.c,v 1.9 1995/04/26 18:10:53 pst Exp $
+ * $Id: igmp.c,v 1.10 1995/05/16 01:28:29 davidg Exp $
*/
/*
@@ -97,12 +97,12 @@ fill_rti(inm)
#endif
while (rti) {
if (rti->ifp == inm->inm_ifp){ /* ? is it ok to compare */
- /* pointers */
+ /* pointers */
inm->inm_rti = rti;
#ifdef IGMP_DEBUG
printf("[igmp.c, _fill_rti] --> found old entry \n");
#endif
- if (rti->type == IGMP_OLD_ROUTER)
+ if (rti->type == IGMP_OLD_ROUTER)
return IGMP_HOST_MEMBERSHIP_REPORT;
else
return IGMP_HOST_NEW_MEMBERSHIP_REPORT;
@@ -114,7 +114,7 @@ fill_rti(inm)
rti->type = IGMP_NEW_ROUTER;
rti->time = IGMP_AGE_THRESHOLD;
rti->next = Head;
- Head = rti;
+ Head = rti;
inm->inm_rti = rti;
#ifdef IGMP_DEBUG
printf("[igmp.c, _fill_rti] --> created new entry \n");
@@ -166,7 +166,7 @@ igmp_input(m, iphlen)
register struct in_ifaddr *ia;
struct in_multistep step;
struct router_info *rti;
-
+
int timer; /** timer value in the igmp query header **/
++igmpstat.igps_rcv_total;
@@ -237,9 +237,9 @@ igmp_input(m, iphlen)
*/
IN_FIRST_MULTI(step, inm);
while (inm != NULL) {
- if (inm->inm_ifp == ifp
+ if (inm->inm_ifp == ifp
&& inm->inm_timer == 0
- && inm->inm_addr.s_addr
+ && inm->inm_addr.s_addr
!= igmp_all_hosts_group) {
inm->inm_state = IGMP_DELAYING_MEMBER;
@@ -254,7 +254,7 @@ igmp_input(m, iphlen)
/*
** New Router
*/
-
+
if (ip->ip_dst.s_addr != igmp_all_hosts_group) {
if (!(m->m_flags & M_MCAST)) {
++igmpstat.igps_rcv_badqueries;
@@ -263,14 +263,14 @@ igmp_input(m, iphlen)
}
}
if (ip->ip_dst.s_addr == igmp_all_hosts_group) {
-
+
/*
* - Start the timers in all of our membership records
* for the interface on which the query arrived
* excl. those that belong to the "all-hosts" group.
* - For timers already running check if they need to
* be reset.
- * - Use the igmp->igmp_code filed as the maximum
+ * - Use the igmp->igmp_code filed as the maximum
* delay possible
*/
IN_FIRST_MULTI(step, inm);
@@ -307,7 +307,7 @@ igmp_input(m, iphlen)
/*
** group specific query
*/
-
+
IN_FIRST_MULTI(step, inm);
while (inm != NULL) {
if (inm->inm_addr.s_addr == ip->ip_dst.s_addr) {
@@ -382,7 +382,7 @@ igmp_input(m, iphlen)
if (inm != NULL) {
inm->inm_timer = 0;
++igmpstat.igps_rcv_ourreports;
-
+
switch(inm->inm_state){
case IGMP_IDLE_MEMBER:
case IGMP_LAZY_MEMBER:
@@ -398,7 +398,7 @@ igmp_input(m, iphlen)
break;
}
}
-
+
break;
case IGMP_HOST_NEW_MEMBERSHIP_REPORT:
@@ -406,17 +406,17 @@ igmp_input(m, iphlen)
* an new report
*/
++igmpstat.igps_rcv_reports;
-
+
if (ifp->if_flags & IFF_LOOPBACK)
break;
-
+
if (!IN_MULTICAST(ntohl(igmp->igmp_group.s_addr)) ||
igmp->igmp_group.s_addr != ip->ip_dst.s_addr) {
++igmpstat.igps_rcv_badreports;
m_freem(m);
return;
}
-
+
/*
* KLUDGE: if the IP source address of the report has an
* unspecified (i.e., zero) subnet number, as is allowed for
@@ -430,7 +430,7 @@ igmp_input(m, iphlen)
IFP_TO_IA(ifp, ia);
if (ia) ip->ip_src.s_addr = htonl(ia->ia_subnet);
}
-
+
/*
* If we belong to the group being reported, stop
* our timer for that group.
@@ -439,7 +439,7 @@ igmp_input(m, iphlen)
if (inm != NULL) {
inm->inm_timer = 0;
++igmpstat.igps_rcv_ourreports;
-
+
switch(inm->inm_state){
case IGMP_DELAYING_MEMBER:
case IGMP_IDLE_MEMBER:
@@ -558,7 +558,7 @@ igmp_slowtimo()
}
rti = rti->next;
}
-#ifdef IGMP_DEBUG
+#ifdef IGMP_DEBUG
printf("[igmp.c,_slowtimo] -- > exiting \n");
#endif
splx(s);
@@ -638,7 +638,7 @@ igmp_sysctl(int *name, u_int namelen, void *oldp, size_t *oldlenp,
switch(name[0]) {
case IGMPCTL_STATS:
- return sysctl_rdstruct(oldp, oldlenp, newp, &igmpstat,
+ return sysctl_rdstruct(oldp, oldlenp, newp, &igmpstat,
sizeof igmpstat);
default:
return ENOPROTOOPT;
diff --git a/sys/netinet/igmp.h b/sys/netinet/igmp.h
index 1e082c4..4011b4c 100644
--- a/sys/netinet/igmp.h
+++ b/sys/netinet/igmp.h
@@ -35,7 +35,7 @@
* SUCH DAMAGE.
*
* @(#)igmp.h 8.1 (Berkeley) 6/10/93
- * $Id: igmp.h,v 1.3 1994/08/21 05:27:25 paul Exp $
+ * $Id: igmp.h,v 1.4 1994/09/06 22:42:17 wollman Exp $
*/
#ifndef _NETINET_IGMP_H_
@@ -76,15 +76,15 @@ struct igmp {
#define IGMP_DELAYING_MEMBER 1
#define IGMP_IDLE_MEMBER 2
-#define IGMP_LAZY_MEMBER 3
-#define IGMP_SLEEPING_MEMBER 4
-#define IGMP_AWAKENING_MEMBER 5
+#define IGMP_LAZY_MEMBER 3
+#define IGMP_SLEEPING_MEMBER 4
+#define IGMP_AWAKENING_MEMBER 5
#define IGMP_OLD_ROUTER 0
#define IGMP_NEW_ROUTER 1
-#define IGMP_AGE_THRESHOLD 540
+#define IGMP_AGE_THRESHOLD 540
#ifdef IGMP_STATES
static char *tostate[]={"","DELAYING_MEMBER","IDLE","LAZY","SLEEPING",
diff --git a/sys/netinet/in.c b/sys/netinet/in.c
index 230ff10..1ebbab3 100644
--- a/sys/netinet/in.c
+++ b/sys/netinet/in.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)in.c 8.2 (Berkeley) 11/15/93
- * $Id: in.c,v 1.12 1995/04/25 19:50:20 wollman Exp $
+ * $Id: in.c,v 1.13 1995/04/26 18:10:54 pst Exp $
*/
#include <sys/param.h>
@@ -209,7 +209,7 @@ in_control(so, cmd, data, ifp)
ifra->ifra_addr.sin_addr.s_addr)
break;
}
- if ((ifp->if_flags & IFF_POINTOPOINT)
+ if ((ifp->if_flags & IFF_POINTOPOINT)
&& (cmd == SIOCAIFADDR)
&& (ifra->ifra_dstaddr.sin_addr.s_addr
== INADDR_ANY)) {
@@ -411,7 +411,7 @@ in_control(so, cmd, data, ifp)
IFP_TO_IA(oia->ia_ifp, ia);
if (ia) { /* there is another address */
struct in_multi *inm;
- for(inm = oia->ia_multiaddrs.lh_first; inm;
+ for(inm = oia->ia_multiaddrs.lh_first; inm;
inm = inm->inm_entry.le_next) {
IFAFREE(&inm->inm_ia->ia_ifa);
ia->ia_ifa.ifa_refcnt++;
@@ -426,7 +426,7 @@ in_control(so, cmd, data, ifp)
LIST_INIT(&mk->mk_head);
mk->mk_ifp = ifp;
- for(inm = oia->ia_multiaddrs.lh_first; inm;
+ for(inm = oia->ia_multiaddrs.lh_first; inm;
inm = inm->inm_entry.le_next) {
LIST_INSERT_HEAD(&mk->mk_head, inm, inm_entry);
}
@@ -437,7 +437,7 @@ in_control(so, cmd, data, ifp)
FREE(mk, M_IPMADDR);
}
}
-
+
IFAFREE((&oia->ia_ifa));
break;
@@ -551,20 +551,20 @@ in_ifinit(ifp, ia, sin, scrub)
/*
* Continuation of multicast address hack:
- * If there was a multicast group list previously saved
+ * If there was a multicast group list previously saved
* for this interface, then we re-attach it to the first
* address configured on the i/f.
*/
for(mk = in_mk.lh_first; mk; mk = mk->mk_entry.le_next) {
if(mk->mk_ifp == ifp) {
struct in_multi *inm;
-
- for(inm = mk->mk_head.lh_first; inm;
+
+ for(inm = mk->mk_head.lh_first; inm;
inm = inm->inm_entry.le_next) {
IFAFREE(&inm->inm_ia->ia_ifa);
ia->ia_ifa.ifa_refcnt++;
inm->inm_ia = ia;
- LIST_INSERT_HEAD(&ia->ia_multiaddrs,
+ LIST_INSERT_HEAD(&ia->ia_multiaddrs,
inm, inm_entry);
}
LIST_REMOVE(mk, mk_entry);
diff --git a/sys/netinet/in_cksum.c b/sys/netinet/in_cksum.c
index daac129..9f12495 100644
--- a/sys/netinet/in_cksum.c
+++ b/sys/netinet/in_cksum.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)in_cksum.c 8.1 (Berkeley) 6/10/93
- * $Id$
+ * $Id: in_cksum.c,v 1.2 1994/08/02 07:48:16 davidg Exp $
*/
#include <sys/param.h>
@@ -76,7 +76,7 @@ in_cksum(m, len)
* of a word spanning between this mbuf and the
* last mbuf.
*
- * s_util.c[0] is already saved when scanning previous
+ * s_util.c[0] is already saved when scanning previous
* mbuf.
*/
s_util.c[1] = *(char *)w;
diff --git a/sys/netinet/in_pcb.c b/sys/netinet/in_pcb.c
index 16dabf7..6f8fe0e 100644
--- a/sys/netinet/in_pcb.c
+++ b/sys/netinet/in_pcb.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)in_pcb.c 8.2 (Berkeley) 1/4/94
- * $Id: in_pcb.c,v 1.10 1995/04/10 08:52:45 davidg Exp $
+ * $Id: in_pcb.c,v 1.11 1995/05/03 07:16:51 davidg Exp $
*/
#include <sys/param.h>
@@ -208,14 +208,14 @@ in_pcbladdr(inp, nam, plocal_sin)
register struct route *ro;
ia = (struct in_ifaddr *)0;
- /*
+ /*
* If route is known or can be allocated now,
* our src addr is taken from the i/f, else punt.
*/
ro = &inp->inp_route;
if (ro->ro_rt &&
(satosin(&ro->ro_dst)->sin_addr.s_addr !=
- sin->sin_addr.s_addr ||
+ sin->sin_addr.s_addr ||
inp->inp_socket->so_options & SO_DONTROUTE)) {
RTFREE(ro->ro_rt);
ro->ro_rt = (struct rtentry *)0;
@@ -276,7 +276,7 @@ in_pcbladdr(inp, nam, plocal_sin)
* and exit to caller, that will do the lookup.
*/
*plocal_sin = &ia->ia_addr;
-
+
}
return(0);
}
@@ -357,7 +357,7 @@ in_setsockaddr(inp, nam)
struct mbuf *nam;
{
register struct sockaddr_in *sin;
-
+
nam->m_len = sizeof (*sin);
sin = mtod(nam, struct sockaddr_in *);
bzero((caddr_t)sin, sizeof (*sin));
@@ -373,7 +373,7 @@ in_setpeeraddr(inp, nam)
struct mbuf *nam;
{
register struct sockaddr_in *sin;
-
+
nam->m_len = sizeof (*sin);
sin = mtod(nam, struct sockaddr_in *);
bzero((caddr_t)sin, sizeof (*sin));
@@ -470,9 +470,9 @@ in_losing(inp)
rt_missmsg(RTM_LOSING, &info, rt->rt_flags, 0);
if (rt->rt_flags & RTF_DYNAMIC)
(void) rtrequest(RTM_DELETE, rt_key(rt),
- rt->rt_gateway, rt_mask(rt), rt->rt_flags,
+ rt->rt_gateway, rt_mask(rt), rt->rt_flags,
(struct rtentry **)0);
- else
+ else
/*
* A new route can be allocated
* the next time output is attempted.
diff --git a/sys/netinet/in_proto.c b/sys/netinet/in_proto.c
index 82fcde2..1a5f6d9 100644
--- a/sys/netinet/in_proto.c
+++ b/sys/netinet/in_proto.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* From: @(#)in_proto.c 8.1 (Berkeley) 6/10/93
- * $Id: in_proto.c,v 1.13 1995/04/09 01:29:20 davidg Exp $
+ * $Id: in_proto.c,v 1.14 1995/05/11 00:13:17 wollman Exp $
*/
#include <sys/param.h>
@@ -160,7 +160,7 @@ struct protosw inetsw[] = {
extern int in_inithead(void **, int);
struct domain inetdomain =
- { AF_INET, "internet", 0, 0, 0,
+ { AF_INET, "internet", 0, 0, 0,
inetsw, &inetsw[sizeof(inetsw)/sizeof(inetsw[0])], 0,
in_inithead, 32, sizeof(struct sockaddr_in)
};
diff --git a/sys/netinet/in_rmx.c b/sys/netinet/in_rmx.c
index 73b91b5..150d989 100644
--- a/sys/netinet/in_rmx.c
+++ b/sys/netinet/in_rmx.c
@@ -12,7 +12,7 @@
* no representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied
* warranty.
- *
+ *
* THIS SOFTWARE IS PROVIDED BY M.I.T. ``AS IS''. M.I.T. DISCLAIMS
* ALL EXPRESS OR IMPLIED WARRANTIES WITH REGARD TO THIS SOFTWARE,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
@@ -26,7 +26,7 @@
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * $Id: in_rmx.c,v 1.11 1995/02/20 15:48:44 davidg Exp $
+ * $Id: in_rmx.c,v 1.12 1995/03/19 14:29:01 davidg Exp $
*/
/*
@@ -114,14 +114,14 @@ static void
in_clsroute(struct radix_node *rn, struct radix_node_head *head)
{
struct rtentry *rt = (struct rtentry *)rn;
-
+
if(!(rt->rt_flags & RTF_UP))
return; /* prophylactic measures */
if((rt->rt_flags & (RTF_LLINFO | RTF_HOST)) != RTF_HOST)
return;
- if((rt->rt_flags & (RTF_WASCLONED | RTPRF_OURS))
+ if((rt->rt_flags & (RTF_WASCLONED | RTPRF_OURS))
!= RTF_WASCLONED)
return;
@@ -180,10 +180,10 @@ in_rtqkill(struct radix_node *rn, void *rock)
ap->killed++;
}
} else {
- if(ap->updating
- && (time.tv_sec - rt->rt_rmx.rmx_expire
+ if(ap->updating
+ && (time.tv_sec - rt->rt_rmx.rmx_expire
> rtq_reallyold)) {
- rt->rt_rmx.rmx_expire = time.tv_sec
+ rt->rt_rmx.rmx_expire = time.tv_sec
+ rtq_reallyold;
}
ap->nextstop = lmin(ap->nextstop,
diff --git a/sys/netinet/in_var.h b/sys/netinet/in_var.h
index f4548c6..a21ec47 100644
--- a/sys/netinet/in_var.h
+++ b/sys/netinet/in_var.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)in_var.h 8.1 (Berkeley) 6/10/93
- * $Id: in_var.h,v 1.8 1995/03/16 18:14:53 bde Exp $
+ * $Id: in_var.h,v 1.9 1995/03/23 18:14:41 wollman Exp $
*/
#ifndef _NETINET_IN_VAR_H_
@@ -60,7 +60,7 @@ struct in_ifaddr {
struct sockaddr_in ia_dstaddr; /* reserve space for broadcast addr */
#define ia_broadaddr ia_dstaddr
struct sockaddr_in ia_sockmask; /* reserve space for general netmask */
- LIST_HEAD(in_multihead, in_multi) ia_multiaddrs;
+ LIST_HEAD(in_multihead, in_multi) ia_multiaddrs;
/* list of multicast addresses */
};
@@ -80,7 +80,7 @@ struct in_aliasreq {
#define IN_LNAOF(in, ifa) \
((ntohl((in).s_addr) & ~((struct in_ifaddr *)(ifa)->ia_subnetmask))
-
+
#ifdef KERNEL
extern struct in_ifaddr *in_ifaddr;
diff --git a/sys/netinet/ip.h b/sys/netinet/ip.h
index d3e3517..864474a 100644
--- a/sys/netinet/ip.h
+++ b/sys/netinet/ip.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip.h 8.1 (Berkeley) 6/10/93
- * $Id: ip.h,v 1.3 1994/08/21 05:27:30 paul Exp $
+ * $Id: ip.h,v 1.4 1995/05/05 14:36:38 ache Exp $
*/
#ifndef _NETINET_IP_H_
@@ -51,11 +51,11 @@
* against negative integers quite easily, and fail in subtle ways.
*/
struct ip {
-#if BYTE_ORDER == LITTLE_ENDIAN
+#if BYTE_ORDER == LITTLE_ENDIAN
u_char ip_hl:4, /* header length */
ip_v:4; /* version */
#endif
-#if BYTE_ORDER == BIG_ENDIAN
+#if BYTE_ORDER == BIG_ENDIAN
u_char ip_v:4, /* version */
ip_hl:4; /* header length */
#endif
@@ -131,11 +131,11 @@ struct ip_timestamp {
u_char ipt_code; /* IPOPT_TS */
u_char ipt_len; /* size of structure (variable) */
u_char ipt_ptr; /* index of current entry */
-#if BYTE_ORDER == LITTLE_ENDIAN
+#if BYTE_ORDER == LITTLE_ENDIAN
u_char ipt_flg:4, /* flags, see below */
ipt_oflw:4; /* overflow counter */
#endif
-#if BYTE_ORDER == BIG_ENDIAN
+#if BYTE_ORDER == BIG_ENDIAN
u_char ipt_oflw:4, /* overflow counter */
ipt_flg:4; /* flags, see below */
#endif
diff --git a/sys/netinet/ip_fw.c b/sys/netinet/ip_fw.c
index a4bf19f..8e0bc5b 100644
--- a/sys/netinet/ip_fw.c
+++ b/sys/netinet/ip_fw.c
@@ -24,7 +24,7 @@
#include <sys/protosw.h>
#include <sys/socket.h>
#include <sys/errno.h>
-#include <sys/time.h>
+#include <sys/time.h>
#include <sys/kernel.h>
#include <net/if.h>
@@ -42,13 +42,13 @@
#include <netinet/ip_fw.h>
-#ifdef IPFIREWALL_DEBUG
+#ifdef IPFIREWALL_DEBUG
#define dprintf1(a) printf(a)
#define dprintf2(a1,a2) printf(a1,a2)
#define dprintf3(a1,a2,a3) printf(a1,a2,a3)
#define dprintf4(a1,a2,a3,a4) printf(a1,a2,a3,a4)
#else
-#define dprintf1(a)
+#define dprintf1(a)
#define dprintf2(a1,a2)
#define dprintf3(a1,a2,a3)
#define dprintf4(a1,a2,a3,a4)
@@ -63,7 +63,7 @@
#ifdef IPFIREWALL_DEBUG
#define dprint_ip(a) print_ip(a)
#else
-#define dprint_ip(a)
+#define dprint_ip(a)
#endif
@@ -118,13 +118,13 @@ struct ip_fw *chain;
/*
* If the chain is empty
- * allow any packet-this is equal
+ * allow any packet-this is equal
* to disabling firewall.
*/
- if (!chain)
- return(1);
+ if (!chain)
+ return(1);
- /*
+ /*
* This way we handle fragmented packets.
* we ignore all fragments but the first one
* so the whole packet can't be reassembled.
@@ -181,7 +181,7 @@ struct ip_fw *chain;
dprintf1("\n");
- for (f=chain;f;f=f->fw_next)
+ for (f=chain;f;f=f->fw_next)
if ((src.s_addr&f->fw_smsk.s_addr)==f->fw_src.s_addr
&& (dst.s_addr&f->fw_dmsk.s_addr)==f->fw_dst.s_addr) {
@@ -190,7 +190,7 @@ struct ip_fw *chain;
if (f->fw_flg&IP_FW_F_IFNAME) {
- if (!f->fw_via_name[0])
+ if (!f->fw_via_name[0])
goto via_match; /* No name/unit set,match any */
if (rif->if_unit==f->fw_via_unit &&
@@ -198,9 +198,9 @@ struct ip_fw *chain;
goto via_match;
} else {
- if (!f->fw_via_ip.s_addr)
+ if (!f->fw_via_ip.s_addr)
goto via_match; /* No via ip set,match any */
-
+
for (ia_p=ia;ia_p;ia_p=ia_p->ifa_next) {
if (!ia_p->ifa_addr||ia_p->ifa_addr->sa_family!=AF_INET)
continue;
@@ -212,11 +212,11 @@ struct ip_fw *chain;
}
}
- /*
+ /*
* If we got here,no "via"'s matched,so
* we should continue to the next firewall entry.
*/
- continue;
+ continue;
via_match:
f_prt=f->fw_flg&IP_FW_F_KIND;
if (f_prt==IP_FW_F_ALL) {
@@ -224,8 +224,8 @@ via_match:
goto got_match;
} else {
/*
- * This is actually buggy as if you set SYN flag
- * on UDp or ICMP firewall it will never work,but
+ * This is actually buggy as if you set SYN flag
+ * on UDp or ICMP firewall it will never work,but
* actually it is a concern of software which sets
* firewall entries.
*/
@@ -286,7 +286,7 @@ got_match:
break;
}
print_ip(ip->ip_src);
- if (ip->ip_p==IPPROTO_TCP || ip->ip_p==IPPROTO_UDP)
+ if (ip->ip_p==IPPROTO_TCP || ip->ip_p==IPPROTO_UDP)
printf(":%d",src_port);
printf(" ");
print_ip(ip->ip_dst);
@@ -317,10 +317,10 @@ bad_packet:
*/
if (!(f->fw_flg&IP_FW_F_ICMPRPL))
return 0;
- m = m_get(M_DONTWAIT, MT_SOOPTS);
+ m = m_get(M_DONTWAIT, MT_SOOPTS);
/*
- * We never retry,we don't want to
- * waste time-it is not so critical
+ * We never retry,we don't want to
+ * waste time-it is not so critical
* if ICMP unsent.
*/
if (!m)
@@ -363,8 +363,8 @@ int nh_conv;
u_short f_prt, prt=0;
char rev=0;
- if (!chain)
- return;
+ if (!chain)
+ return;
if (ip->ip_off&IP_OFFMASK)
return;
@@ -402,7 +402,7 @@ int nh_conv;
}
if ((f->fw_flg&IP_FW_F_BIDIR) &&
((src.s_addr&f->fw_smsk.s_addr)==f->fw_dst.s_addr
- && (dst.s_addr&f->fw_dmsk.s_addr)==f->fw_src.s_addr)) {
+ && (dst.s_addr&f->fw_dmsk.s_addr)==f->fw_src.s_addr)) {
rev=1;
goto addr_match;
}
@@ -410,7 +410,7 @@ int nh_conv;
addr_match:
/*
* We use here same code for "via" matching
- * as in firewall.This is wrong and does not do
+ * as in firewall.This is wrong and does not do
* much use,because in most cases instead of interface
* passed NULL pointer.Need to be completely
* rewritten.
@@ -420,7 +420,7 @@ addr_match:
if (f->fw_flg&IP_FW_F_IFNAME) {
- if (!f->fw_via_name[0])
+ if (!f->fw_via_name[0])
goto via_match; /* No name/unit set,match any */
if (rif->if_unit==f->fw_via_unit &&
@@ -428,9 +428,9 @@ addr_match:
goto via_match;
} else {
- if (!f->fw_via_ip.s_addr)
+ if (!f->fw_via_ip.s_addr)
goto via_match; /* No via ip set,match any */
-
+
for (ia_p=ia;ia_p;ia_p=ia_p->ifa_next) {
if (!ia_p->ifa_addr||ia_p->ifa_addr->sa_family!=AF_INET)
continue;
@@ -442,11 +442,11 @@ addr_match:
}
}
- /*
+ /*
* If we got here,no "via"'s matched,so
* we should continue to the next firewall entry.
*/
- continue;
+ continue;
via_match:
f_prt=f->fw_flg&IP_FW_F_KIND;
if (f_prt==IP_FW_F_ALL) {
@@ -457,10 +457,10 @@ via_match:
/*
* Rise byte count,
* if need to convert from
- * host to network byte
+ * host to network byte
* order,do it.
*/
- if (nh_conv)
+ if (nh_conv)
f->fw_bcnt+=ntohs(ip->ip_len);
else
f->fw_bcnt+=ip->ip_len;
@@ -476,7 +476,7 @@ via_match:
f->fw_flg&IP_FW_F_SRNG) &&
port_match(&f->fw_pts[f->fw_nsp],f->fw_ndp,dst_port,
f->fw_flg&IP_FW_F_DRNG)))
- || ((rev)
+ || ((rev)
&& (port_match(&f->fw_pts[0],f->fw_nsp,dst_port,
f->fw_flg&IP_FW_F_SRNG)
&& port_match(&f->fw_pts[f->fw_nsp],f->fw_ndp,src_port,
@@ -486,10 +486,10 @@ via_match:
/*
* Rise byte count,
* if need to convert from
- * host to network byte
+ * host to network byte
* order,do it.
*/
- if (nh_conv)
+ if (nh_conv)
f->fw_bcnt+=ntohs(ip->ip_len);
else
f->fw_bcnt+=ip->ip_len;
@@ -540,7 +540,7 @@ struct ip_fw *frwl;
int s=splnet();
u_long m_src_mask,m_dst_mask;
u_long n_sa,n_da,o_sa,o_da,o_sm,o_dm,n_sm,n_dm;
- u_short n_sr,n_dr,o_sr,o_dr;
+ u_short n_sr,n_dr,o_sr,o_dr;
u_short oldkind,newkind;
int addb4=0;
int n_o,n_n;
@@ -572,7 +572,7 @@ struct ip_fw *frwl;
newkind=ftmp->fw_flg & IP_FW_F_KIND;
oldkind=chtmp->fw_flg & IP_FW_F_KIND;
- if (newkind!=IP_FW_F_ALL
+ if (newkind!=IP_FW_F_ALL
&& oldkind!=IP_FW_F_ALL
&& oldkind!=newkind) {
chtmp_prev=chtmp;
@@ -596,9 +596,9 @@ struct ip_fw *frwl;
m_dst_mask = o_dm & n_dm;
if ((o_sa & m_src_mask) == (n_sa & m_src_mask)) {
- if (n_sm > o_sm)
+ if (n_sm > o_sm)
addb4++;
- if (n_sm < o_sm)
+ if (n_sm < o_sm)
addb4--;
}
@@ -629,15 +629,15 @@ struct ip_fw *frwl;
* of ports.
*/
- if (ftmp->fw_flg & IP_FW_F_SRNG)
+ if (ftmp->fw_flg & IP_FW_F_SRNG)
n_sr=ftmp->fw_pts[1]-ftmp->fw_pts[0];
- else
+ else
n_sr=(ftmp->fw_nsp)?
ftmp->fw_nsp : USHRT_MAX;
-
- if (chtmp->fw_flg & IP_FW_F_SRNG)
+
+ if (chtmp->fw_flg & IP_FW_F_SRNG)
o_sr=chtmp->fw_pts[1]-chtmp->fw_pts[0];
- else
+ else
o_sr=(chtmp->fw_nsp)?
chtmp->fw_nsp : USHRT_MAX;
@@ -645,7 +645,7 @@ struct ip_fw *frwl;
addb4++;
if (n_sr>o_sr)
addb4--;
-
+
n_n=ftmp->fw_nsp;
n_o=chtmp->fw_nsp;
/*
@@ -657,15 +657,15 @@ struct ip_fw *frwl;
(n_o>(IP_FW_MAX_PORTS-2)))
goto skip_check;
- if (ftmp->fw_flg & IP_FW_F_DRNG)
+ if (ftmp->fw_flg & IP_FW_F_DRNG)
n_dr=ftmp->fw_pts[n_n+1]-ftmp->fw_pts[n_n];
- else
+ else
n_dr=(ftmp->fw_ndp)?
ftmp->fw_ndp : USHRT_MAX;
- if (chtmp->fw_flg & IP_FW_F_DRNG)
+ if (chtmp->fw_flg & IP_FW_F_DRNG)
o_dr=chtmp->fw_pts[n_o+1]-chtmp->fw_pts[n_o];
- else
+ else
o_dr=(chtmp->fw_ndp)?
chtmp->fw_ndp : USHRT_MAX;
if (n_dr<o_dr)
@@ -678,7 +678,7 @@ skip_check:
}
if (addb4>0) {
if (chtmp_prev) {
- chtmp_prev->fw_next=ftmp;
+ chtmp_prev->fw_next=ftmp;
ftmp->fw_next=chtmp;
} else {
*chainptr=ftmp;
@@ -727,7 +727,7 @@ struct ip_fw *frwl;
while(ftmp)
{
matches=1;
- if (ftmp->fw_src.s_addr!=frwl->fw_src.s_addr
+ if (ftmp->fw_src.s_addr!=frwl->fw_src.s_addr
|| ftmp->fw_dst.s_addr!=frwl->fw_dst.s_addr
|| ftmp->fw_smsk.s_addr!=frwl->fw_smsk.s_addr
|| ftmp->fw_dmsk.s_addr!=frwl->fw_dmsk.s_addr
@@ -756,12 +756,12 @@ struct ip_fw *frwl;
}
else
{
- *chainptr=ftmp->fw_next;
+ *chainptr=ftmp->fw_next;
free(ftmp,M_IPFW);
ftmp=*chainptr;
}
-
- }
+
+ }
else
{
ltmp = ftmp;
@@ -795,7 +795,7 @@ struct ip_fw *frwl;
while(ftmp)
{
matches=1;
- if (ftmp->fw_src.s_addr!=frwl->fw_src.s_addr
+ if (ftmp->fw_src.s_addr!=frwl->fw_src.s_addr
|| ftmp->fw_dst.s_addr!=frwl->fw_dst.s_addr
|| ftmp->fw_smsk.s_addr!=frwl->fw_smsk.s_addr
|| ftmp->fw_dmsk.s_addr!=frwl->fw_dmsk.s_addr
@@ -885,7 +885,7 @@ if ( stage == IP_ACCT_FLUSH )
{
free_fw_chain(&ip_acct_chain);
return(0);
- }
+ }
if ( stage == IP_ACCT_ZERO )
{
zero_fw_chain(ip_acct_chain);
@@ -925,16 +925,16 @@ if ( stage == IP_ACCT_ADD
#ifdef IPFIREWALL
int
ip_fw_ctl(stage,m)
-int stage;
+int stage;
struct mbuf *m;
{
if ( stage == IP_FW_FLUSH )
{
free_fw_chain(&ip_fw_chain);
return(0);
- }
+ }
-if ( m == 0 )
+if ( m == 0 )
{
printf("ip_fw_ctl: NULL mbuf ptr\n");
return(EINVAL);
@@ -955,11 +955,11 @@ if ( stage == IP_FW_POLICY )
* to firewall chain or deleting'em
*/
-if ( stage == IP_FW_ADD ||
+if ( stage == IP_FW_ADD ||
stage == IP_FW_DEL ) {
struct ip_fw *frwl;
-
+
if (!(frwl=check_ipfw_struct(m)))
return (EINVAL);
@@ -976,7 +976,7 @@ if ( stage == IP_FW_ADD ||
return(EINVAL);
#endif
}
-}
+}
dprintf2("ip_fw_ctl: unknown request %d\n",stage);
return(EINVAL);
diff --git a/sys/netinet/ip_fw.h b/sys/netinet/ip_fw.h
index 87ba0fb..47e5131 100644
--- a/sys/netinet/ip_fw.h
+++ b/sys/netinet/ip_fw.h
@@ -86,15 +86,15 @@ struct ip_fw {
#define IP_FW_F_IFNAME 0x200 /* Use interface name/unit (not IP) */
#define IP_FW_F_MASK 0x3FF /* All possible flag bits mask */
-/*
+/*
* New IP firewall options for [gs]etsockopt at the RAW IP level.
- */
+ */
#define IP_FW_BASE_CTL 53
#define IP_FW_ADD (IP_FW_BASE_CTL)
#define IP_FW_DEL (IP_FW_BASE_CTL+4)
#define IP_FW_FLUSH (IP_FW_BASE_CTL+6)
-#define IP_FW_POLICY (IP_FW_BASE_CTL+7)
+#define IP_FW_POLICY (IP_FW_BASE_CTL+7)
#define IP_ACCT_ADD (IP_FW_BASE_CTL+10)
#define IP_ACCT_DEL (IP_FW_BASE_CTL+11)
diff --git a/sys/netinet/ip_fwdef.c b/sys/netinet/ip_fwdef.c
index c1050e5..2f2a966 100644
--- a/sys/netinet/ip_fwdef.c
+++ b/sys/netinet/ip_fwdef.c
@@ -13,7 +13,7 @@
*/
/*
- * Dumb definitions which needed when
+ * Dumb definitions which needed when
* firewall/accounting module is not loaded.
*/
@@ -22,7 +22,7 @@
#include <sys/domain.h>
#include <sys/socket.h>
#include <sys/errno.h>
-#include <sys/time.h>
+#include <sys/time.h>
#include <sys/kernel.h>
#include <net/if.h>
diff --git a/sys/netinet/ip_icmp.c b/sys/netinet/ip_icmp.c
index 031de2e..d7b4a11 100644
--- a/sys/netinet/ip_icmp.c
+++ b/sys/netinet/ip_icmp.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip_icmp.c 8.2 (Berkeley) 1/4/94
- * $Id: ip_icmp.c,v 1.5 1995/02/16 00:27:43 wollman Exp $
+ * $Id: ip_icmp.c,v 1.6 1995/03/16 18:14:54 bde Exp $
*/
#include <sys/param.h>
@@ -128,7 +128,7 @@ icmp_error(n, type, code, dest, destifp)
icp->icmp_gwaddr.s_addr = dest;
else {
icp->icmp_void = 0;
- /*
+ /*
* The following assignments assume an overlay with the
* zeroed icmp_void field.
*/
@@ -246,7 +246,7 @@ icmp_input(m, hlen)
case ICMP_UNREACH_NEEDFRAG:
code = PRC_MSGSIZE;
break;
-
+
case ICMP_UNREACH_NET_UNKNOWN:
case ICMP_UNREACH_NET_PROHIB:
case ICMP_UNREACH_TOSNET:
@@ -319,7 +319,7 @@ icmp_input(m, hlen)
icp->icmp_rtime = iptime();
icp->icmp_ttime = icp->icmp_rtime; /* bogus, do later! */
goto reflect;
-
+
case ICMP_MASKREQ:
#define satosin(sa) ((struct sockaddr_in *)(sa))
if (icmpmaskrepl == 0)
@@ -378,7 +378,7 @@ reflect:
icmpdst.sin_addr = icp->icmp_gwaddr;
#ifdef ICMPPRINTFS
if (icmpprintfs)
- printf("redirect dst %lx to %lx\n",
+ printf("redirect dst %lx to %lx\n",
NTOHL(icp->icmp_ip.ip_dst.s_addr),
NTOHL(icp->icmp_gwaddr.s_addr));
#endif
@@ -495,7 +495,7 @@ icmp_reflect(m)
/*
* Should check for overflow, but it "can't happen"
*/
- if (opt == IPOPT_RR || opt == IPOPT_TS ||
+ if (opt == IPOPT_RR || opt == IPOPT_TS ||
opt == IPOPT_SECURITY) {
bcopy((caddr_t)cp,
mtod(opts, caddr_t) + opts->m_len, len);
diff --git a/sys/netinet/ip_icmp.h b/sys/netinet/ip_icmp.h
index 1a73e0d..aa0e3e1 100644
--- a/sys/netinet/ip_icmp.h
+++ b/sys/netinet/ip_icmp.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip_icmp.h 8.1 (Berkeley) 6/10/93
- * $Id: ip_icmp.h,v 1.2 1994/08/02 07:48:35 davidg Exp $
+ * $Id: ip_icmp.h,v 1.3 1994/08/21 05:27:31 paul Exp $
*/
#ifndef _NETINET_IP_ICMP_H_
@@ -60,7 +60,7 @@ struct icmp {
/* ICMP_UNREACH_NEEDFRAG -- Path MTU Discovery (RFC1191) */
struct ih_pmtu {
- n_short ipm_void;
+ n_short ipm_void;
n_short ipm_nextmtu;
} ih_pmtu;
} icmp_hun;
diff --git a/sys/netinet/ip_input.c b/sys/netinet/ip_input.c
index 89498b9..22a4f45 100644
--- a/sys/netinet/ip_input.c
+++ b/sys/netinet/ip_input.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip_input.c 8.2 (Berkeley) 1/4/94
- * $Id: ip_input.c,v 1.20 1995/05/09 13:35:45 davidg Exp $
+ * $Id: ip_input.c,v 1.21 1995/05/11 00:13:18 wollman Exp $
*/
#include <sys/param.h>
@@ -255,12 +255,12 @@ next:
goto next;
/* greedy RSVP, snatches any PATH packet of the RSVP protocol and no
- * matter if it is destined to another node, or whether it is
+ * matter if it is destined to another node, or whether it is
* a multicast one, RSVP wants it! and prevents it from being forwarded
* anywhere else. Also checks if the rsvp daemon is running before
* grabbing the packet.
*/
- if (ip_rsvpd != NULL && ip->ip_p==IPPROTO_RSVP)
+ if (ip_rsvpd != NULL && ip->ip_p==IPPROTO_RSVP)
goto ours;
/*
@@ -357,9 +357,9 @@ ours:
/*
* If packet came to us we count it...
- * This way we count all incoming packets which has
+ * This way we count all incoming packets which has
* not been forwarded...
- * Do not convert ip_len to host byte order when
+ * Do not convert ip_len to host byte order when
* counting,ppl already made it for us before..
*/
if (ip_acct_cnt_ptr!=NULL)
@@ -747,7 +747,7 @@ ip_dooptions(m)
char buf[4*sizeof "123"];
strcpy(buf, inet_ntoa(ip->ip_dst));
- log(LOG_WARNING,
+ log(LOG_WARNING,
"attempted source route from %s to %s\n",
inet_ntoa(ip->ip_src), buf);
type = ICMP_UNREACH;
@@ -1207,17 +1207,17 @@ ip_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
case IPCTL_DEFTTL:
return (sysctl_int(oldp, oldlenp, newp, newlen, &ip_defttl));
case IPCTL_SOURCEROUTE:
- return (sysctl_int(oldp, oldlenp, newp, newlen,
+ return (sysctl_int(oldp, oldlenp, newp, newlen,
&ip_dosourceroute));
#ifdef notyet
case IPCTL_DEFMTU:
return (sysctl_int(oldp, oldlenp, newp, newlen, &ip_mtu));
#endif
case IPCTL_RTEXPIRE:
- return (sysctl_int(oldp, oldlenp, newp, newlen,
+ return (sysctl_int(oldp, oldlenp, newp, newlen,
&rtq_reallyold));
case IPCTL_RTMINEXPIRE:
- return (sysctl_int(oldp, oldlenp, newp, newlen,
+ return (sysctl_int(oldp, oldlenp, newp, newlen,
&rtq_minreallyold));
case IPCTL_RTMAXCACHE:
return (sysctl_int(oldp, oldlenp, newp, newlen,
diff --git a/sys/netinet/ip_mroute.c b/sys/netinet/ip_mroute.c
index fc5b618..7226fd4 100644
--- a/sys/netinet/ip_mroute.c
+++ b/sys/netinet/ip_mroute.c
@@ -138,8 +138,8 @@ u_long timeout_val = 0; /* count of outstanding upcalls */
/*
* Define the token bucket filter structures
- * tbftable -> each vif has one of these for storing info
- * qtable -> each interface has an associated queue of pkts
+ * tbftable -> each vif has one of these for storing info
+ * qtable -> each interface has an associated queue of pkts
*/
struct tbf tbftable[MAXVIFS];
@@ -169,7 +169,7 @@ struct ip multicast_encap_iphdr = {
sizeof(struct ip), /* total length */
0, /* id */
0, /* frag offset */
- ENCAP_TTL, ENCAP_PROTO,
+ ENCAP_TTL, ENCAP_PROTO,
0, /* checksum */
};
@@ -217,7 +217,7 @@ void multiencap_decap(struct mbuf *m);
/*
* A simple hash function: returns MFCHASHMOD of the low-order octet of
* the argument's network or subnet number and the multicast group assoc.
- */
+ */
static u_long
nethash_fc(m,n)
register u_long m;
@@ -269,7 +269,7 @@ struct mfc *mfchash[MFCHASHSIZ];
*/
static struct mfc *
mfcfind(origin, mcastgrp)
- u_long origin;
+ u_long origin;
u_long mcastgrp;
{
register struct mbuf *mb_rt;
@@ -538,7 +538,7 @@ X_ip_mrouter_done()
*/
last_encap_src = NULL;
last_encap_vif = NULL;
-
+
ip_mrouter = NULL;
splx(s);
@@ -632,12 +632,12 @@ add_vif(vifcp)
if (mrtdebug)
log(LOG_DEBUG, "add_vif #%d, lcladdr %x, %s %x, thresh %x, rate %d\n",
- vifcp->vifc_vifi,
+ vifcp->vifc_vifi,
ntohl(vifcp->vifc_lcl_addr.s_addr),
(vifcp->vifc_flags & VIFF_TUNNEL) ? "rmtaddr" : "mask",
ntohl(vifcp->vifc_rmt_addr.s_addr),
vifcp->vifc_threshold,
- vifcp->vifc_rate_limit);
+ vifcp->vifc_rate_limit);
return 0;
}
@@ -727,16 +727,16 @@ add_mfc(mfccp)
return 0;
}
- /*
+ /*
* Find the entry for which the upcall was made and update
*/
s = splnet();
hash = nethash_fc(mfccp->mfcc_origin.s_addr, mfccp->mfcc_mcastgrp.s_addr);
- for (prev_mb_rt = mb_rt = mfctable[hash], nstl = 0;
+ for (prev_mb_rt = mb_rt = mfctable[hash], nstl = 0;
mb_rt; prev_mb_rt = mb_rt, mb_rt = mb_rt->m_next) {
rt = mtod(mb_rt, struct mfc *);
- if (((rt->mfc_origin.s_addr & mfccp->mfcc_originmask.s_addr)
+ if (((rt->mfc_origin.s_addr & mfccp->mfcc_originmask.s_addr)
== mfccp->mfcc_origin.s_addr) &&
(rt->mfc_mcastgrp.s_addr == mfccp->mfcc_mcastgrp.s_addr) &&
(mb_rt->m_act != NULL)) {
@@ -768,14 +768,14 @@ add_mfc(mfccp)
while (mb_rt->m_act) {
mb_ntry = mb_rt->m_act;
rte = mtod(mb_ntry, struct rtdetq *);
- ip_mdq(rte->m, rte->ifp, rte->tunnel_src,
+ ip_mdq(rte->m, rte->ifp, rte->tunnel_src,
rt1, rte->imo);
mb_rt->m_act = mb_ntry->m_act;
m_freem(rte->m);
m_free(mb_ntry);
}
- /*
+ /*
* If more than one entry was created for a single upcall
* delete that entry
*/
@@ -796,12 +796,12 @@ add_mfc(mfccp)
ntohl(mfccp->mfcc_mcastgrp.s_addr),
ntohl(mfccp->mfcc_originmask.s_addr),
mfccp->mfcc_parent);
-
+
for (prev_mb_rt = mb_rt = mfctable[hash];
mb_rt; prev_mb_rt = mb_rt, mb_rt = mb_rt->m_next) {
-
+
rt = mtod(mb_rt, struct mfc *);
- if (((rt->mfc_origin.s_addr & mfccp->mfcc_originmask.s_addr)
+ if (((rt->mfc_origin.s_addr & mfccp->mfcc_originmask.s_addr)
== mfccp->mfcc_origin.s_addr) &&
(rt->mfc_mcastgrp.s_addr == mfccp->mfcc_mcastgrp.s_addr)) {
@@ -822,9 +822,9 @@ add_mfc(mfccp)
splx(s);
return ENOBUFS;
}
-
+
rt = mtod(mb_rt, struct mfc *);
-
+
/* insert new entry at head of hash chain */
rt->mfc_origin = mfccp->mfcc_origin;
rt->mfc_originmask = mfccp->mfcc_originmask;
@@ -834,7 +834,7 @@ add_mfc(mfccp)
VIFM_COPY(mfccp->mfcc_ttls[i], rt->mfc_ttls[i]);
/* initialize pkt counters per src-grp */
rt->mfc_pkt_cnt = 0;
-
+
/* link into table */
mb_rt->m_next = mfctable[hash];
mfctable[hash] = mb_rt;
@@ -964,7 +964,7 @@ X_ip_mforward(ip, ifp, m, imo)
* on intermediate routing hosts! Therefore, we hereby
* change the spec.
*/
-
+
/*
* Verify that the tunnel options are well-formed.
*/
@@ -1038,7 +1038,7 @@ X_ip_mforward(ip, ifp, m, imo)
hash = nethash_fc(ip->ip_src.s_addr, ip->ip_dst.s_addr);
for (mb_rt = mfctable[hash]; mb_rt; mb_rt = mb_rt->m_next) {
rt = mtod(mb_rt, struct mfc *);
- if (((ip->ip_src.s_addr & rt->mfc_originmask.s_addr) ==
+ if (((ip->ip_src.s_addr & rt->mfc_originmask.s_addr) ==
rt->mfc_origin.s_addr) &&
(ip->ip_dst.s_addr == rt->mfc_mcastgrp.s_addr) &&
(mb_rt->m_act != NULL))
@@ -1104,33 +1104,33 @@ X_ip_mforward(ip, ifp, m, imo)
splx(s);
if (hash == 0) {
- /*
- * Send message to routing daemon to install
+ /*
+ * Send message to routing daemon to install
* a route into the kernel table
*/
k_igmpsrc.sin_addr = ip->ip_src;
k_igmpdst.sin_addr = ip->ip_dst;
-
+
mm = m_copy(m, 0, M_COPYALL);
if (mm == NULL) {
splx(s);
return ENOBUFS;
}
-
+
k_data = mtod(mm, struct ip *);
k_data->ip_p = 0;
-
+
mrtstat.mrts_upcalls++;
rip_ip_input(mm, ip_mrouter, (struct sockaddr *)&k_igmpsrc);
-
+
/* set timer to cleanup entry if upcall is lost */
timeout(cleanup_cache, (caddr_t)mb_rt, 100);
timeout_val++;
}
-
+
return 0;
- }
+ }
}
#ifndef MROUTE_LKM
@@ -1158,8 +1158,8 @@ cleanup_cache(xmb_rt)
hash = nethash_fc(rt->mfc_origin.s_addr, rt->mfc_mcastgrp.s_addr);
if (mrtdebug)
- log(LOG_DEBUG, "ip_mforward: cleanup ipm %d h %d s %x g %x\n",
- ip_mrouter, hash, ntohl(rt->mfc_origin.s_addr),
+ log(LOG_DEBUG, "ip_mforward: cleanup ipm %d h %d s %x g %x\n",
+ ip_mrouter, hash, ntohl(rt->mfc_origin.s_addr),
ntohl(rt->mfc_mcastgrp.s_addr));
mrtstat.mrts_cache_cleanups++;
@@ -1172,7 +1172,7 @@ cleanup_cache(xmb_rt)
if (m0 == mb_rt)
break;
- /*
+ /*
* drop all the packets
* free the mbuf with the pkt, if, timing info
*/
@@ -1185,14 +1185,14 @@ cleanup_cache(xmb_rt)
m_free(m);
}
- /*
+ /*
* Delete the entry from the cache
*/
if (prev_m0 != m0) { /* if moved past head of list */
MFREE(m0, prev_m0->m_next);
} else /* delete head of list, it is in the table */
mfctable[hash] = m_free(m0);
-
+
timeout_val--;
splx(s);
}
@@ -1227,7 +1227,7 @@ ip_mdq(m, ifp, tunnel_src, rt, imo)
/* came in the wrong interface */
if (mrtdebug)
log(LOG_DEBUG, "wrong if: ifp %x vifi %d\n",
- ifp, vifi);
+ ifp, vifi);
++mrtstat.mrts_wrong_if;
return (int)tunnel_src;
}
@@ -1250,13 +1250,13 @@ ip_mdq(m, ifp, tunnel_src, rt, imo)
encap_send((ip), (vifp), (m)); \
else \
phyint_send((ip), (vifp), (m)); \
- }
+ }
-/* If no options or the imo_multicast_vif option is 0, don't do this part
+/* If no options or the imo_multicast_vif option is 0, don't do this part
*/
- if ((imo != NULL) &&
- (( vifi = imo->imo_multicast_vif - 1) < numvifs) /*&& (vifi>=0)*/)
- {
+ if ((imo != NULL) &&
+ (( vifi = imo->imo_multicast_vif - 1) < numvifs) /*&& (vifi>=0)*/)
+ {
MC_SEND(ip,viftable+vifi,m);
return (1); /* make sure we are done: No more physical sends */
}
@@ -1270,7 +1270,7 @@ ip_mdq(m, ifp, tunnel_src, rt, imo)
}
/* check if a vif number is legal/ok. This is used by ip_output, to export
- * numvifs there,
+ * numvifs there,
*/
int
X_legal_vif_num(vif)
@@ -1394,7 +1394,7 @@ srcrt_send(ip, vifp, m)
if (vifp->v_rate_limit <= 0)
tbf_send_packet(vifp, mb_opts, 0);
else
- tbf_control(vifp, mb_opts,
+ tbf_control(vifp, mb_opts,
mtod(mb_opts, struct ip *), ip_copy->ip_len, 0);
}
@@ -1502,7 +1502,7 @@ multiencap_decap(m)
}
if (ip->ip_src.s_addr != last_encap_src) {
register struct vif *vife;
-
+
vifp = viftable;
vife = vifp + numvifs;
last_encap_src = ip->ip_src.s_addr;
@@ -1564,7 +1564,7 @@ tbf_control(vifp, m, ip, p_len, imo)
{
tbf_update_tokens(vifp);
- /* if there are enough tokens,
+ /* if there are enough tokens,
* and the queue is empty,
* send this packet out
*/
@@ -1601,11 +1601,11 @@ tbf_control(vifp, m, ip, p_len, imo)
return;
}
-/*
+/*
* adds a packet to the queue at the interface
*/
void
-tbf_queue(vifp, m, ip, imo)
+tbf_queue(vifp, m, ip, imo)
register struct vif *vifp;
register struct mbuf *m;
register struct ip *ip;
@@ -1627,7 +1627,7 @@ tbf_queue(vifp, m, ip, imo)
}
-/*
+/*
* processes the queue at the interface
*/
void
@@ -1665,11 +1665,11 @@ tbf_process_q(vifp)
splx(s);
}
-/*
+/*
* removes the jth packet from the queue at the interface
*/
void
-tbf_dequeue(vifp,j)
+tbf_dequeue(vifp,j)
register struct vif *vifp;
register int j;
{
@@ -1681,7 +1681,7 @@ tbf_dequeue(vifp,j)
qtable[index][i-1].pkt_len = qtable[index][i].pkt_len;
qtable[index][i-1].pkt_ip = qtable[index][i].pkt_ip;
qtable[index][i-1].pkt_imo = qtable[index][i].pkt_imo;
- }
+ }
qtable[index][i-1].pkt_m = NULL;
qtable[index][i-1].pkt_len = NULL;
qtable[index][i-1].pkt_ip = NULL;
@@ -1698,7 +1698,7 @@ tbf_reprocess_q(xvifp)
void *xvifp;
{
register struct vif *vifp = xvifp;
- if (ip_mrouter == NULL)
+ if (ip_mrouter == NULL)
return;
tbf_update_tokens(vifp);
@@ -1806,7 +1806,7 @@ priority(vifp, ip)
/* temporary hack; will add general packet classifier some day */
prio = 50; /* default priority */
-
+
/* check for source route options and add option length to get dst */
if (vifp->v_flags & VIFF_SRCRT)
graddr = ntohl((ip+8)->ip_dst.s_addr);
@@ -1845,7 +1845,7 @@ priority(vifp, ip)
}
/*
- * End of token bucket filter modifications
+ * End of token bucket filter modifications
*/
#ifdef MROUTE_LKM
diff --git a/sys/netinet/ip_mroute.h b/sys/netinet/ip_mroute.h
index 945c6bd..4c815e8 100644
--- a/sys/netinet/ip_mroute.h
+++ b/sys/netinet/ip_mroute.h
@@ -35,7 +35,7 @@
* SUCH DAMAGE.
*
* @(#)ip_mroute.h 8.1 (Berkeley) 6/10/93
- * $Id: ip_mroute.h,v 1.5 1994/09/14 03:10:12 wollman Exp $
+ * $Id: ip_mroute.h,v 1.6 1995/03/16 18:14:59 bde Exp $
*/
#ifndef _NETINET_IP_MROUTE_H_
@@ -125,7 +125,7 @@ struct vif_req {
u_char v_flags; /* VIFF_ flags defined above */
u_char v_threshold; /* min ttl required to forward on vif */
struct in_addr v_lcl_addr; /* local interface address */
- struct in_addr v_rmt_addr;
+ struct in_addr v_rmt_addr;
char v_if_name[IFNAMSIZ]; /* if name */
};
@@ -170,7 +170,7 @@ struct sioc_vif_req {
u_long icount;
u_long ocount;
};
-
+
#ifdef KERNEL
@@ -187,8 +187,8 @@ struct vif {
};
/*
- * The kernel's multicast forwarding cache entry structure
- * (A field for the type of service (mfc_tos) is to be added
+ * The kernel's multicast forwarding cache entry structure
+ * (A field for the type of service (mfc_tos) is to be added
* at a future point)
*/
struct mfc {
@@ -220,7 +220,7 @@ struct rtdetq {
#define MAX_UPQ 4 /* max. no of pkts in upcall Q */
/*
- * Token Bucket filter code
+ * Token Bucket filter code
*/
#define MAX_BKT_SIZE 10000 /* 10K bytes size */
#define MAXQSIZE 10 /* max # of pkts in queue */
@@ -228,7 +228,7 @@ struct rtdetq {
/*
* queue structure at each vif
*/
-struct pkt_queue
+struct pkt_queue
{
u_long pkt_len; /* length of packet in queue */
struct mbuf *pkt_m; /* pointer to packet mbuf */
diff --git a/sys/netinet/ip_output.c b/sys/netinet/ip_output.c
index 8869323..8e6fb56 100644
--- a/sys/netinet/ip_output.c
+++ b/sys/netinet/ip_output.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip_output.c 8.3 (Berkeley) 1/21/94
- * $Id: ip_output.c,v 1.17 1995/04/26 18:10:55 pst Exp $
+ * $Id: ip_output.c,v 1.18 1995/05/09 13:35:46 davidg Exp $
*/
#include <sys/param.h>
@@ -1065,7 +1065,7 @@ ip_getmoptions(optname, imo, mp)
switch (optname) {
- case IP_MULTICAST_VIF:
+ case IP_MULTICAST_VIF:
if (imo != NULL)
*(mtod(*mp, int *)) = imo->imo_multicast_vif;
else
diff --git a/sys/netinet/ip_var.h b/sys/netinet/ip_var.h
index a1f0c42..73bd43d 100644
--- a/sys/netinet/ip_var.h
+++ b/sys/netinet/ip_var.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)ip_var.h 8.1 (Berkeley) 6/10/93
- * $Id: ip_var.h,v 1.8 1995/03/16 16:25:42 wollman Exp $
+ * $Id: ip_var.h,v 1.9 1995/03/16 18:15:01 bde Exp $
*/
#ifndef _NETINET_IP_VAR_H_
@@ -71,11 +71,11 @@ struct ipq {
* Note: ipf_next must be at same offset as ipq_next above
*/
struct ipasfrag {
-#if BYTE_ORDER == LITTLE_ENDIAN
+#if BYTE_ORDER == LITTLE_ENDIAN
u_char ip_hl:4,
ip_v:4;
#endif
-#if BYTE_ORDER == BIG_ENDIAN
+#if BYTE_ORDER == BIG_ENDIAN
u_char ip_v:4,
ip_hl:4;
#endif
diff --git a/sys/netinet/raw_ip.c b/sys/netinet/raw_ip.c
index 441f5f5..89697a0 100644
--- a/sys/netinet/raw_ip.c
+++ b/sys/netinet/raw_ip.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)raw_ip.c 8.2 (Berkeley) 1/4/94
- * $Id: raw_ip.c,v 1.17 1995/04/09 01:29:23 davidg Exp $
+ * $Id: raw_ip.c,v 1.18 1995/05/12 20:00:21 ache Exp $
*/
#include <sys/param.h>
@@ -249,7 +249,7 @@ rip_ctloutput(op, so, level, optname, m)
}
if (op == PRCO_SETOPT) {
- error=(*ip_fw_ctl_ptr)(optname, *m);
+ error=(*ip_fw_ctl_ptr)(optname, *m);
if (*m)
(void)m_free(*m);
}
@@ -261,13 +261,13 @@ rip_ctloutput(op, so, level, optname, m)
case IP_ACCT_ADD:
case IP_ACCT_CLR:
case IP_ACCT_FLUSH:
- case IP_ACCT_ZERO:
+ case IP_ACCT_ZERO:
if (ip_acct_ctl_ptr==NULL) {
if (*m)
(void)m_free(*m);
return(EINVAL);
}
-
+
if (op == PRCO_SETOPT) {
error=(*ip_acct_ctl_ptr)(optname, *m);
if (*m)
diff --git a/sys/netinet/tcp.h b/sys/netinet/tcp.h
index cb7d75c..a79acf9 100644
--- a/sys/netinet/tcp.h
+++ b/sys/netinet/tcp.h
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp.h 8.1 (Berkeley) 6/10/93
- * $Id: tcp.h,v 1.4 1995/02/08 20:18:44 wollman Exp $
+ * $Id: tcp.h,v 1.5 1995/02/14 02:35:14 wollman Exp $
*/
#ifndef _NETINET_TCP_H_
@@ -49,11 +49,11 @@ struct tcphdr {
u_short th_dport; /* destination port */
tcp_seq th_seq; /* sequence number */
tcp_seq th_ack; /* acknowledgement number */
-#if BYTE_ORDER == LITTLE_ENDIAN
+#if BYTE_ORDER == LITTLE_ENDIAN
u_char th_x2:4, /* (unused) */
th_off:4; /* data offset */
#endif
-#if BYTE_ORDER == BIG_ENDIAN
+#if BYTE_ORDER == BIG_ENDIAN
u_char th_off:4, /* data offset */
th_x2:4; /* (unused) */
#endif
diff --git a/sys/netinet/tcp_input.c b/sys/netinet/tcp_input.c
index 47fd018..bf0fd0c 100644
--- a/sys/netinet/tcp_input.c
+++ b/sys/netinet/tcp_input.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* From: @(#)tcp_input.c 8.5 (Berkeley) 4/10/94
- * $Id: tcp_input.c,v 1.23 1995/05/09 12:32:06 olah Exp $
+ * $Id: tcp_input.c,v 1.24 1995/05/11 01:41:06 davidg Exp $
*/
#ifndef TUBA_INCLUDE
@@ -318,7 +318,7 @@ tcp_input(m, iphlen)
}
optlen = off - sizeof (struct tcphdr);
optp = mtod(m, caddr_t) + sizeof (struct tcpiphdr);
- /*
+ /*
* Do quick retrieval of timestamp options ("options
* prediction?"). If timestamp is the only option and it's
* formatted as recommended in RFC 1323 appendix A, we
@@ -382,7 +382,7 @@ findpcb:
goto dropwithreset;
if (tp->t_state == TCPS_CLOSED)
goto drop;
-
+
/* Unscale the window into a 32-bit value. */
if ((tiflags & TH_SYN) == 0)
tiwin = ti->ti_win << tp->snd_scale;
@@ -447,7 +447,7 @@ findpcb:
tcp_dooptions(tp, optp, optlen, ti,
&to);
- /*
+ /*
* Header prediction: check for the two common cases
* of a uni-directional data xfer. If the packet has
* no control flags, is in-sequence, the window didn't
@@ -480,7 +480,7 @@ findpcb:
tiwin && tiwin == tp->snd_wnd &&
tp->snd_nxt == tp->snd_max) {
- /*
+ /*
* If last ACK falls within this segment's sequence numbers,
* record the timestamp.
* NOTE that the test is modified according to the latest
@@ -666,7 +666,7 @@ findpcb:
tp->cc_recv = to.to_cc;
/*
* Perform TAO test on incoming CC (SEG.CC) option, if any.
- * - compare SEG.CC against cached CC from the same host,
+ * - compare SEG.CC against cached CC from the same host,
* if any.
* - if SEG.CC > chached value, SYN must be new and is accepted
* immediately: save new CC in the cache, mark the socket
@@ -794,7 +794,7 @@ findpcb:
/* Segment is acceptable, update cache if undefined. */
if (taop->tao_ccsent == 0)
taop->tao_ccsent = to.to_ccecho;
-
+
tp->rcv_adv += tp->rcv_wnd;
tp->snd_una++; /* SYN is acked */
/*
@@ -822,19 +822,19 @@ findpcb:
/*
* Received initial SYN in SYN-SENT[*] state => simul-
* taneous open. If segment contains CC option and there is
- * a cached CC, apply TAO test; if it succeeds, connection is
+ * a cached CC, apply TAO test; if it succeeds, connection is
* half-synchronized. Otherwise, do 3-way handshake:
* SYN-SENT -> SYN-RECEIVED
* SYN-SENT* -> SYN-RECEIVED*
* If there was no CC option, clear cached CC value.
*/
tp->t_flags |= TF_ACKNOW;
- tp->t_timer[TCPT_REXMT] = 0;
+ tp->t_timer[TCPT_REXMT] = 0;
if (to.to_flag & TOF_CC) {
if (taop->tao_cc != 0 &&
CC_GT(to.to_cc, taop->tao_cc)) {
/*
- * update cache and make transition:
+ * update cache and make transition:
* SYN-SENT -> ESTABLISHED*
* SYN-SENT* -> FIN-WAIT-1*
*/
@@ -852,7 +852,7 @@ findpcb:
taop->tao_cc = 0;
tp->t_state = TCPS_SYN_RECEIVED;
}
- }
+ }
trimthenstep6:
/*
@@ -877,7 +877,7 @@ trimthenstep6:
* our data will be ACK'd; if so, enter normal data segment
* processing in the middle of step 5, ack processing.
* Otherwise, goto step 6.
- */
+ */
if (tiflags & TH_ACK)
goto process_ACK;
goto step6;
@@ -893,8 +893,8 @@ trimthenstep6:
* segment, hoping to find new TCPCB in LISTEN state;
*
* else must be old SYN; drop it.
- * else do normal processing.
- */
+ * else do normal processing.
+ */
case TCPS_LAST_ACK:
case TCPS_CLOSING:
case TCPS_TIME_WAIT:
@@ -917,7 +917,7 @@ trimthenstep6:
* States other than LISTEN or SYN_SENT.
* First check timestamp, if present.
* Then check the connection count, if present.
- * Then check that at least some bytes of segment are within
+ * Then check that at least some bytes of segment are within
* receive window. If segment begins before rcv_nxt,
* drop leading data (and SYN); if nothing left, just ack.
*
@@ -965,7 +965,7 @@ trimthenstep6:
if (tiflags & TH_SYN) {
tiflags &= ~TH_SYN;
ti->ti_seq++;
- if (ti->ti_urp > 1)
+ if (ti->ti_urp > 1)
ti->ti_urp--;
else
tiflags &= ~TH_URG;
@@ -1064,7 +1064,7 @@ trimthenstep6:
* NOTE that the test is modified according to the latest
* proposal of the tcplw@cray.com list (Braden 1993/04/26).
*/
- if ((to.to_flag & TOF_TS) != 0 &&
+ if ((to.to_flag & TOF_TS) != 0 &&
SEQ_LEQ(ti->ti_seq, tp->last_ack_sent)) {
tp->ts_recent_age = tcp_now;
tp->ts_recent = to.to_tsval;
@@ -1125,7 +1125,7 @@ trimthenstep6:
else
goto drop;
}
-
+
/*
* Ack processing.
*/
@@ -1159,7 +1159,7 @@ trimthenstep6:
taop->tao_cc = tp->cc_recv;
/*
- * Make transitions:
+ * Make transitions:
* SYN-RECEIVED -> ESTABLISHED
* SYN-RECEIVED* -> FIN-WAIT-1
*/
@@ -1168,7 +1168,7 @@ trimthenstep6:
tp->t_flags &= ~TF_NEEDFIN;
} else
tp->t_state = TCPS_ESTABLISHED;
- /*
+ /*
* If segment contains data or ACK, will call tcp_reass()
* later; if not, do so now to pass queued data to user.
*/
@@ -1216,7 +1216,7 @@ trimthenstep6:
* the new ssthresh).
*
* Dup acks mean that packets have left the
- * network (they're now cached at the receiver)
+ * network (they're now cached at the receiver)
* so bump cwnd by the amount in the receiver
* to keep a constant cwnd packets in the
* network.
@@ -1265,11 +1265,11 @@ trimthenstep6:
goto dropafterack;
}
/*
- * If we reach this point, ACK is not a duplicate,
+ * If we reach this point, ACK is not a duplicate,
* i.e., it ACKs something we sent.
*/
if (tp->t_flags & TF_NEEDSYN) {
- /*
+ /*
* T/TCP: Connection was half-synchronized, and our
* SYN has been ACK'd (so connection is now fully
* synchronized). Go to non-starred state and
@@ -1422,7 +1422,7 @@ step6:
* Don't look at window if no ACK: TAC's send garbage on first SYN.
*/
if ((tiflags & TH_ACK) &&
- (SEQ_LT(tp->snd_wl1, ti->ti_seq) ||
+ (SEQ_LT(tp->snd_wl1, ti->ti_seq) ||
(tp->snd_wl1 == ti->ti_seq && (SEQ_LT(tp->snd_wl2, ti->ti_ack) ||
(tp->snd_wl2 == ti->ti_ack && tiwin > tp->snd_wnd))))) {
/* keep track of pure window updates */
@@ -1457,14 +1457,14 @@ step6:
* If this segment advances the known urgent pointer,
* then mark the data stream. This should not happen
* in CLOSE_WAIT, CLOSING, LAST_ACK or TIME_WAIT STATES since
- * a FIN has been received from the remote side.
+ * a FIN has been received from the remote side.
* In these states we ignore the URG.
*
* According to RFC961 (Assigned Protocols),
* the urgent pointer points to the last octet
* of urgent data. We continue, however,
* to consider it to indicate the first octet
- * of data past the urgent section as the original
+ * of data past the urgent section as the original
* spec states (in one of two places).
*/
if (SEQ_GT(ti->ti_seq+ti->ti_urp, tp->rcv_up)) {
@@ -1532,11 +1532,11 @@ dodata: /* XXX */
* (ie SEND_SYN flag on) then delay ACK,
* so it may be piggybacked when SYN is sent.
* Otherwise, since we received a FIN then no
- * more input can be expected, send ACK now.
+ * more input can be expected, send ACK now.
*/
if (tp->t_flags & TF_NEEDSYN)
tp->t_flags |= TF_DELACK;
- else
+ else
tp->t_flags |= TF_ACKNOW;
tp->rcv_nxt++;
}
@@ -1561,7 +1561,7 @@ dodata: /* XXX */
/*
* In FIN_WAIT_2 state enter the TIME_WAIT state,
- * starting the time-wait timer, turning off the other
+ * starting the time-wait timer, turning off the other
* standard timers.
*/
case TCPS_FIN_WAIT_2:
@@ -1714,7 +1714,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
(char *)&to->to_tsecr, sizeof(to->to_tsecr));
NTOHL(to->to_tsecr);
- /*
+ /*
* A timestamp received in a SYN makes
* it ok to send timestamp requests and replies.
*/
@@ -1731,7 +1731,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
bcopy((char *)cp + 2,
(char *)&to->to_cc, sizeof(to->to_cc));
NTOHL(to->to_cc);
- /*
+ /*
* A CC or CC.new option received in a SYN makes
* it ok to send CC in subsequent segments.
*/
@@ -1747,7 +1747,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
bcopy((char *)cp + 2,
(char *)&to->to_cc, sizeof(to->to_cc));
NTOHL(to->to_cc);
- /*
+ /*
* A CC or CC.new option received in a SYN makes
* it ok to send CC in subsequent segments.
*/
@@ -1782,7 +1782,7 @@ tcp_pulloutofband(so, ti, m)
register struct mbuf *m;
{
int cnt = ti->ti_urp - 1;
-
+
while (cnt >= 0) {
if (m->m_len > cnt) {
char *cp = mtod(m, caddr_t) + cnt;
@@ -1841,7 +1841,7 @@ tcp_xmit_timer(tp, rtt)
if ((tp->t_rttvar += delta) <= 0)
tp->t_rttvar = 1;
} else {
- /*
+ /*
* No rtt measurement yet - use the unsmoothed rtt.
* Set the variance to half the rtt (so our first
* retransmit happens at 3*rtt).
@@ -1865,7 +1865,7 @@ tcp_xmit_timer(tp, rtt)
*/
TCPT_RANGESET(tp->t_rxtcur, TCP_REXMTVAL(tp),
tp->t_rttmin, TCPTV_REXMTMAX);
-
+
/*
* We received an ack for a packet that wasn't retransmitted;
* it is probably safe to discard any error indications we've
diff --git a/sys/netinet/tcp_output.c b/sys/netinet/tcp_output.c
index b3f5365..33a6b83 100644
--- a/sys/netinet/tcp_output.c
+++ b/sys/netinet/tcp_output.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_output.c 8.3 (Berkeley) 12/30/93
- * $Id: tcp_output.c,v 1.9 1995/04/09 01:29:25 davidg Exp $
+ * $Id: tcp_output.c,v 1.10 1995/05/09 13:35:47 davidg Exp $
*/
#include <sys/param.h>
@@ -226,7 +226,7 @@ again:
* window, then want to send a window update to peer.
*/
if (win > 0) {
- /*
+ /*
* "adv" is the amount we can increase the window,
* taking into account that we are limited by
* TCP_MAXWIN << tp->rcv_scale.
@@ -313,7 +313,7 @@ send:
mss = htons((u_short) tcp_mssopt(tp));
(void)memcpy(opt + 2, &mss, sizeof(mss));
optlen = TCPOLEN_MAXSEG;
-
+
if ((tp->t_flags & TF_REQ_SCALE) &&
((flags & TH_ACK) == 0 ||
(tp->t_flags & TF_RCVD_SCALE))) {
@@ -326,9 +326,9 @@ send:
}
}
}
-
+
/*
- * Send a timestamp and echo-reply if this is a SYN and our side
+ * Send a timestamp and echo-reply if this is a SYN and our side
* wants to use timestamps (TF_REQ_TSTMP is set) or both our side
* and our peer have sent timestamps in our SYN's.
*/
@@ -337,7 +337,7 @@ send:
((flags & TH_ACK) == 0 ||
(tp->t_flags & TF_RCVD_TSTMP))) {
u_long *lp = (u_long *)(opt + optlen);
-
+
/* Form timestamp option as shown in appendix A of RFC 1323. */
*lp++ = htonl(TCPOPT_TSTAMP_HDR);
*lp++ = htonl(tcp_now);
@@ -373,7 +373,7 @@ send:
opt[optlen++] = TCPOPT_CC;
opt[optlen++] = TCPOLEN_CC;
*(u_int32_t *)&opt[optlen] = htonl(tp->cc_send);
-
+
optlen += 4;
break;
@@ -408,7 +408,7 @@ send:
opt[optlen++] = TCPOPT_NOP;
opt[optlen++] = TCPOPT_CC;
opt[optlen++] = TCPOLEN_CC;
- *(u_int32_t *)&opt[optlen] =
+ *(u_int32_t *)&opt[optlen] =
htonl(tp->cc_send);
optlen += 4;
opt[optlen++] = TCPOPT_NOP;
@@ -424,7 +424,7 @@ send:
}
hdrlen += optlen;
-
+
/*
* Adjust data length if insertion of options will
* bump the packet length beyond the t_maxopd length.
@@ -527,7 +527,7 @@ send:
* window for use in delaying messages about window sizes.
* If resending a FIN, be sure not to use a new sequence number.
*/
- if (flags & TH_FIN && tp->t_flags & TF_SENTFIN &&
+ if (flags & TH_FIN && tp->t_flags & TF_SENTFIN &&
tp->snd_nxt == tp->snd_max)
tp->snd_nxt--;
/*
@@ -665,7 +665,7 @@ send:
error = ip_output(m, tp->t_inpcb->inp_options, &tp->t_inpcb->inp_route,
so->so_options & SO_DONTROUTE, 0);
#else
- error = ip_output(m, (struct mbuf *)0, &tp->t_inpcb->inp_route,
+ error = ip_output(m, (struct mbuf *)0, &tp->t_inpcb->inp_route,
so->so_options & SO_DONTROUTE);
#endif
}
diff --git a/sys/netinet/tcp_reass.c b/sys/netinet/tcp_reass.c
index 47fd018..bf0fd0c 100644
--- a/sys/netinet/tcp_reass.c
+++ b/sys/netinet/tcp_reass.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* From: @(#)tcp_input.c 8.5 (Berkeley) 4/10/94
- * $Id: tcp_input.c,v 1.23 1995/05/09 12:32:06 olah Exp $
+ * $Id: tcp_input.c,v 1.24 1995/05/11 01:41:06 davidg Exp $
*/
#ifndef TUBA_INCLUDE
@@ -318,7 +318,7 @@ tcp_input(m, iphlen)
}
optlen = off - sizeof (struct tcphdr);
optp = mtod(m, caddr_t) + sizeof (struct tcpiphdr);
- /*
+ /*
* Do quick retrieval of timestamp options ("options
* prediction?"). If timestamp is the only option and it's
* formatted as recommended in RFC 1323 appendix A, we
@@ -382,7 +382,7 @@ findpcb:
goto dropwithreset;
if (tp->t_state == TCPS_CLOSED)
goto drop;
-
+
/* Unscale the window into a 32-bit value. */
if ((tiflags & TH_SYN) == 0)
tiwin = ti->ti_win << tp->snd_scale;
@@ -447,7 +447,7 @@ findpcb:
tcp_dooptions(tp, optp, optlen, ti,
&to);
- /*
+ /*
* Header prediction: check for the two common cases
* of a uni-directional data xfer. If the packet has
* no control flags, is in-sequence, the window didn't
@@ -480,7 +480,7 @@ findpcb:
tiwin && tiwin == tp->snd_wnd &&
tp->snd_nxt == tp->snd_max) {
- /*
+ /*
* If last ACK falls within this segment's sequence numbers,
* record the timestamp.
* NOTE that the test is modified according to the latest
@@ -666,7 +666,7 @@ findpcb:
tp->cc_recv = to.to_cc;
/*
* Perform TAO test on incoming CC (SEG.CC) option, if any.
- * - compare SEG.CC against cached CC from the same host,
+ * - compare SEG.CC against cached CC from the same host,
* if any.
* - if SEG.CC > chached value, SYN must be new and is accepted
* immediately: save new CC in the cache, mark the socket
@@ -794,7 +794,7 @@ findpcb:
/* Segment is acceptable, update cache if undefined. */
if (taop->tao_ccsent == 0)
taop->tao_ccsent = to.to_ccecho;
-
+
tp->rcv_adv += tp->rcv_wnd;
tp->snd_una++; /* SYN is acked */
/*
@@ -822,19 +822,19 @@ findpcb:
/*
* Received initial SYN in SYN-SENT[*] state => simul-
* taneous open. If segment contains CC option and there is
- * a cached CC, apply TAO test; if it succeeds, connection is
+ * a cached CC, apply TAO test; if it succeeds, connection is
* half-synchronized. Otherwise, do 3-way handshake:
* SYN-SENT -> SYN-RECEIVED
* SYN-SENT* -> SYN-RECEIVED*
* If there was no CC option, clear cached CC value.
*/
tp->t_flags |= TF_ACKNOW;
- tp->t_timer[TCPT_REXMT] = 0;
+ tp->t_timer[TCPT_REXMT] = 0;
if (to.to_flag & TOF_CC) {
if (taop->tao_cc != 0 &&
CC_GT(to.to_cc, taop->tao_cc)) {
/*
- * update cache and make transition:
+ * update cache and make transition:
* SYN-SENT -> ESTABLISHED*
* SYN-SENT* -> FIN-WAIT-1*
*/
@@ -852,7 +852,7 @@ findpcb:
taop->tao_cc = 0;
tp->t_state = TCPS_SYN_RECEIVED;
}
- }
+ }
trimthenstep6:
/*
@@ -877,7 +877,7 @@ trimthenstep6:
* our data will be ACK'd; if so, enter normal data segment
* processing in the middle of step 5, ack processing.
* Otherwise, goto step 6.
- */
+ */
if (tiflags & TH_ACK)
goto process_ACK;
goto step6;
@@ -893,8 +893,8 @@ trimthenstep6:
* segment, hoping to find new TCPCB in LISTEN state;
*
* else must be old SYN; drop it.
- * else do normal processing.
- */
+ * else do normal processing.
+ */
case TCPS_LAST_ACK:
case TCPS_CLOSING:
case TCPS_TIME_WAIT:
@@ -917,7 +917,7 @@ trimthenstep6:
* States other than LISTEN or SYN_SENT.
* First check timestamp, if present.
* Then check the connection count, if present.
- * Then check that at least some bytes of segment are within
+ * Then check that at least some bytes of segment are within
* receive window. If segment begins before rcv_nxt,
* drop leading data (and SYN); if nothing left, just ack.
*
@@ -965,7 +965,7 @@ trimthenstep6:
if (tiflags & TH_SYN) {
tiflags &= ~TH_SYN;
ti->ti_seq++;
- if (ti->ti_urp > 1)
+ if (ti->ti_urp > 1)
ti->ti_urp--;
else
tiflags &= ~TH_URG;
@@ -1064,7 +1064,7 @@ trimthenstep6:
* NOTE that the test is modified according to the latest
* proposal of the tcplw@cray.com list (Braden 1993/04/26).
*/
- if ((to.to_flag & TOF_TS) != 0 &&
+ if ((to.to_flag & TOF_TS) != 0 &&
SEQ_LEQ(ti->ti_seq, tp->last_ack_sent)) {
tp->ts_recent_age = tcp_now;
tp->ts_recent = to.to_tsval;
@@ -1125,7 +1125,7 @@ trimthenstep6:
else
goto drop;
}
-
+
/*
* Ack processing.
*/
@@ -1159,7 +1159,7 @@ trimthenstep6:
taop->tao_cc = tp->cc_recv;
/*
- * Make transitions:
+ * Make transitions:
* SYN-RECEIVED -> ESTABLISHED
* SYN-RECEIVED* -> FIN-WAIT-1
*/
@@ -1168,7 +1168,7 @@ trimthenstep6:
tp->t_flags &= ~TF_NEEDFIN;
} else
tp->t_state = TCPS_ESTABLISHED;
- /*
+ /*
* If segment contains data or ACK, will call tcp_reass()
* later; if not, do so now to pass queued data to user.
*/
@@ -1216,7 +1216,7 @@ trimthenstep6:
* the new ssthresh).
*
* Dup acks mean that packets have left the
- * network (they're now cached at the receiver)
+ * network (they're now cached at the receiver)
* so bump cwnd by the amount in the receiver
* to keep a constant cwnd packets in the
* network.
@@ -1265,11 +1265,11 @@ trimthenstep6:
goto dropafterack;
}
/*
- * If we reach this point, ACK is not a duplicate,
+ * If we reach this point, ACK is not a duplicate,
* i.e., it ACKs something we sent.
*/
if (tp->t_flags & TF_NEEDSYN) {
- /*
+ /*
* T/TCP: Connection was half-synchronized, and our
* SYN has been ACK'd (so connection is now fully
* synchronized). Go to non-starred state and
@@ -1422,7 +1422,7 @@ step6:
* Don't look at window if no ACK: TAC's send garbage on first SYN.
*/
if ((tiflags & TH_ACK) &&
- (SEQ_LT(tp->snd_wl1, ti->ti_seq) ||
+ (SEQ_LT(tp->snd_wl1, ti->ti_seq) ||
(tp->snd_wl1 == ti->ti_seq && (SEQ_LT(tp->snd_wl2, ti->ti_ack) ||
(tp->snd_wl2 == ti->ti_ack && tiwin > tp->snd_wnd))))) {
/* keep track of pure window updates */
@@ -1457,14 +1457,14 @@ step6:
* If this segment advances the known urgent pointer,
* then mark the data stream. This should not happen
* in CLOSE_WAIT, CLOSING, LAST_ACK or TIME_WAIT STATES since
- * a FIN has been received from the remote side.
+ * a FIN has been received from the remote side.
* In these states we ignore the URG.
*
* According to RFC961 (Assigned Protocols),
* the urgent pointer points to the last octet
* of urgent data. We continue, however,
* to consider it to indicate the first octet
- * of data past the urgent section as the original
+ * of data past the urgent section as the original
* spec states (in one of two places).
*/
if (SEQ_GT(ti->ti_seq+ti->ti_urp, tp->rcv_up)) {
@@ -1532,11 +1532,11 @@ dodata: /* XXX */
* (ie SEND_SYN flag on) then delay ACK,
* so it may be piggybacked when SYN is sent.
* Otherwise, since we received a FIN then no
- * more input can be expected, send ACK now.
+ * more input can be expected, send ACK now.
*/
if (tp->t_flags & TF_NEEDSYN)
tp->t_flags |= TF_DELACK;
- else
+ else
tp->t_flags |= TF_ACKNOW;
tp->rcv_nxt++;
}
@@ -1561,7 +1561,7 @@ dodata: /* XXX */
/*
* In FIN_WAIT_2 state enter the TIME_WAIT state,
- * starting the time-wait timer, turning off the other
+ * starting the time-wait timer, turning off the other
* standard timers.
*/
case TCPS_FIN_WAIT_2:
@@ -1714,7 +1714,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
(char *)&to->to_tsecr, sizeof(to->to_tsecr));
NTOHL(to->to_tsecr);
- /*
+ /*
* A timestamp received in a SYN makes
* it ok to send timestamp requests and replies.
*/
@@ -1731,7 +1731,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
bcopy((char *)cp + 2,
(char *)&to->to_cc, sizeof(to->to_cc));
NTOHL(to->to_cc);
- /*
+ /*
* A CC or CC.new option received in a SYN makes
* it ok to send CC in subsequent segments.
*/
@@ -1747,7 +1747,7 @@ tcp_dooptions(tp, cp, cnt, ti, to)
bcopy((char *)cp + 2,
(char *)&to->to_cc, sizeof(to->to_cc));
NTOHL(to->to_cc);
- /*
+ /*
* A CC or CC.new option received in a SYN makes
* it ok to send CC in subsequent segments.
*/
@@ -1782,7 +1782,7 @@ tcp_pulloutofband(so, ti, m)
register struct mbuf *m;
{
int cnt = ti->ti_urp - 1;
-
+
while (cnt >= 0) {
if (m->m_len > cnt) {
char *cp = mtod(m, caddr_t) + cnt;
@@ -1841,7 +1841,7 @@ tcp_xmit_timer(tp, rtt)
if ((tp->t_rttvar += delta) <= 0)
tp->t_rttvar = 1;
} else {
- /*
+ /*
* No rtt measurement yet - use the unsmoothed rtt.
* Set the variance to half the rtt (so our first
* retransmit happens at 3*rtt).
@@ -1865,7 +1865,7 @@ tcp_xmit_timer(tp, rtt)
*/
TCPT_RANGESET(tp->t_rxtcur, TCP_REXMTVAL(tp),
tp->t_rttmin, TCPTV_REXMTMAX);
-
+
/*
* We received an ack for a packet that wasn't retransmitted;
* it is probably safe to discard any error indications we've
diff --git a/sys/netinet/tcp_subr.c b/sys/netinet/tcp_subr.c
index ea68652..381824d 100644
--- a/sys/netinet/tcp_subr.c
+++ b/sys/netinet/tcp_subr.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_subr.c 8.1 (Berkeley) 6/10/93
- * $Id: tcp_subr.c,v 1.9 1995/03/16 18:15:05 bde Exp $
+ * $Id: tcp_subr.c,v 1.10 1995/04/09 01:29:26 davidg Exp $
*/
#include <sys/param.h>
@@ -251,7 +251,7 @@ tcp_newtcpcb(inp)
tp->t_srtt = TCPTV_SRTTBASE;
tp->t_rttvar = tcp_rttdflt * PR_SLOWHZ << 2;
tp->t_rttmin = TCPTV_MIN;
- TCPT_RANGESET(tp->t_rxtcur,
+ TCPT_RANGESET(tp->t_rxtcur,
((TCPTV_SRTTBASE >> 2) + (TCPTV_SRTTDFLT << 2)) >> 1,
TCPTV_MIN, TCPTV_REXMTMAX);
tp->snd_cwnd = TCP_MAXWIN << TCP_MAX_WINSHIFT;
@@ -304,7 +304,7 @@ tcp_close(tp)
/*
* If we sent enough data to get some meaningful characteristics,
- * save them in the routing entry. 'Enough' is arbitrarily
+ * save them in the routing entry. 'Enough' is arbitrarily
* defined as the sendpipesize (default 4K) * 16. This would
* give us 16 rtt samples assuming we only get one sample per
* window (the usual case on a long haul net). 16 samples is
@@ -420,7 +420,7 @@ tcp_notify(inp, error)
} else if (tp->t_state < TCPS_ESTABLISHED && tp->t_rxtshift > 3 &&
tp->t_softerror)
so->so_error = error;
- else
+ else
tp->t_softerror = error;
wakeup((caddr_t) &so->so_timeo);
sorwakeup(so);
diff --git a/sys/netinet/tcp_timer.c b/sys/netinet/tcp_timer.c
index 4437ce0..ddab8d6 100644
--- a/sys/netinet/tcp_timer.c
+++ b/sys/netinet/tcp_timer.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_timer.c 8.1 (Berkeley) 6/10/93
- * $Id: tcp_timer.c,v 1.5 1995/04/09 01:29:27 davidg Exp $
+ * $Id: tcp_timer.c,v 1.6 1995/04/12 06:49:56 davidg Exp $
*/
#ifndef TUBA_INCLUDE
@@ -238,7 +238,7 @@ tcp_timers(tp, timer)
* size increase exponentially with time. If the
* window is larger than the path can handle, this
* exponential growth results in dropped packet(s)
- * almost immediately. To get more time between
+ * almost immediately. To get more time between
* drops but still "push" the network to take advantage
* of improving conditions, we switch from exponential
* to linear window opening at some threshhold size.
diff --git a/sys/netinet/tcp_timewait.c b/sys/netinet/tcp_timewait.c
index ea68652..381824d 100644
--- a/sys/netinet/tcp_timewait.c
+++ b/sys/netinet/tcp_timewait.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_subr.c 8.1 (Berkeley) 6/10/93
- * $Id: tcp_subr.c,v 1.9 1995/03/16 18:15:05 bde Exp $
+ * $Id: tcp_subr.c,v 1.10 1995/04/09 01:29:26 davidg Exp $
*/
#include <sys/param.h>
@@ -251,7 +251,7 @@ tcp_newtcpcb(inp)
tp->t_srtt = TCPTV_SRTTBASE;
tp->t_rttvar = tcp_rttdflt * PR_SLOWHZ << 2;
tp->t_rttmin = TCPTV_MIN;
- TCPT_RANGESET(tp->t_rxtcur,
+ TCPT_RANGESET(tp->t_rxtcur,
((TCPTV_SRTTBASE >> 2) + (TCPTV_SRTTDFLT << 2)) >> 1,
TCPTV_MIN, TCPTV_REXMTMAX);
tp->snd_cwnd = TCP_MAXWIN << TCP_MAX_WINSHIFT;
@@ -304,7 +304,7 @@ tcp_close(tp)
/*
* If we sent enough data to get some meaningful characteristics,
- * save them in the routing entry. 'Enough' is arbitrarily
+ * save them in the routing entry. 'Enough' is arbitrarily
* defined as the sendpipesize (default 4K) * 16. This would
* give us 16 rtt samples assuming we only get one sample per
* window (the usual case on a long haul net). 16 samples is
@@ -420,7 +420,7 @@ tcp_notify(inp, error)
} else if (tp->t_state < TCPS_ESTABLISHED && tp->t_rxtshift > 3 &&
tp->t_softerror)
so->so_error = error;
- else
+ else
tp->t_softerror = error;
wakeup((caddr_t) &so->so_timeo);
sorwakeup(so);
diff --git a/sys/netinet/tcp_usrreq.c b/sys/netinet/tcp_usrreq.c
index eb8237c..b2bc22c 100644
--- a/sys/netinet/tcp_usrreq.c
+++ b/sys/netinet/tcp_usrreq.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* From: @(#)tcp_usrreq.c 8.2 (Berkeley) 1/3/94
- * $Id: tcp_usrreq.c,v 1.12 1995/03/16 18:15:06 bde Exp $
+ * $Id: tcp_usrreq.c,v 1.13 1995/04/09 01:29:28 davidg Exp $
*/
#include <sys/param.h>
@@ -206,7 +206,7 @@ tcp_usrreq(so, req, m, nam, control)
error = EAFNOSUPPORT;
break;
}
-
+
if ((error = tcp_connect(tp, nam)) != 0)
break;
error = tcp_output(tp);
@@ -402,7 +402,7 @@ tcp_connect(tp, nam)
return error;
}
- /*
+ /*
* Cannot simply call in_pcbconnect, because there might be an
* earlier incarnation of this same connection still in
* TIME_WAIT state, creating an ADDRINUSE error.
@@ -697,7 +697,7 @@ tcp_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
case TCPCTL_RTTDFLT:
return (sysctl_int(oldp, oldlenp, newp, newlen, &tcp_rttdflt));
case TCPCTL_KEEPIDLE:
- return (sysctl_int(oldp, oldlenp, newp, newlen,
+ return (sysctl_int(oldp, oldlenp, newp, newlen,
&tcp_keepidle));
case TCPCTL_KEEPINTVL:
return (sysctl_int(oldp, oldlenp, newp, newlen,
diff --git a/sys/netinet/udp_usrreq.c b/sys/netinet/udp_usrreq.c
index 055d20b..7e13103 100644
--- a/sys/netinet/udp_usrreq.c
+++ b/sys/netinet/udp_usrreq.c
@@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)udp_usrreq.c 8.4 (Berkeley) 1/21/94
- * $Id: udp_usrreq.c,v 1.10 1995/05/03 07:16:53 davidg Exp $
+ * $Id: udp_usrreq.c,v 1.11 1995/05/09 13:35:48 davidg Exp $
*/
#include <sys/param.h>
@@ -650,7 +650,7 @@ udp_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
return (sysctl_rdstruct(oldp, oldlenp, newp, &udpstat,
sizeof udpstat));
case UDPCTL_MAXDGRAM:
- return (sysctl_int(oldp, oldlenp, newp, newlen,
+ return (sysctl_int(oldp, oldlenp, newp, newlen,
(int *)&udp_sendspace)); /* XXX */
case UDPCTL_RECVSPACE:
return (sysctl_int(oldp, oldlenp, newp, newlen,
OpenPOWER on IntegriCloud