diff options
Diffstat (limited to 'sys/netinet6/ipsec.c')
-rw-r--r-- | sys/netinet6/ipsec.c | 78 |
1 files changed, 39 insertions, 39 deletions
diff --git a/sys/netinet6/ipsec.c b/sys/netinet6/ipsec.c index 6587dea..6ae18f0 100644 --- a/sys/netinet6/ipsec.c +++ b/sys/netinet6/ipsec.c @@ -247,7 +247,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error) /* sanity check */ if (m == NULL || inp == NULL || error == NULL) - panic("ipsec4_getpolicybysock: NULL pointer was passed.\n"); + panic("ipsec4_getpolicybysock: NULL pointer was passed."); /* set spidx in pcb */ #ifdef INET6 @@ -262,7 +262,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error) /* sanity check */ if (pcbsp == NULL) - panic("ipsec4_getpolicybysock: pcbsp is NULL.\n"); + panic("ipsec4_getpolicybysock: pcbsp is NULL."); switch (dir) { case IPSEC_DIR_INBOUND: @@ -272,12 +272,12 @@ ipsec4_getpolicybypcb(m, dir, inp, error) currsp = pcbsp->sp_out; break; default: - panic("ipsec4_getpolicybysock: illegal direction.\n"); + panic("ipsec4_getpolicybysock: illegal direction."); } /* sanity check */ if (currsp == NULL) - panic("ipsec4_getpolicybysock: currsp is NULL.\n"); + panic("ipsec4_getpolicybysock: currsp is NULL."); /* when privilieged socket */ if (pcbsp->priv) { @@ -383,7 +383,7 @@ ipsec4_getpolicybysock(m, dir, so, error) { if (so == NULL) - panic("ipsec4_getpolicybysock: NULL pointer was passed.\n"); + panic("ipsec4_getpolicybysock: NULL pointer was passed."); return (ipsec4_getpolicybypcb(m, dir, sotoinpcb(so), error)); } @@ -408,7 +408,7 @@ ipsec4_getpolicybyaddr(m, dir, flag, error) /* sanity check */ if (m == NULL || error == NULL) - panic("ipsec4_getpolicybyaddr: NULL pointer was passed.\n"); + panic("ipsec4_getpolicybyaddr: NULL pointer was passed."); { struct secpolicyindex spidx; @@ -471,11 +471,11 @@ ipsec6_getpolicybypcb(m, dir, inp, error) /* sanity check */ if (m == NULL || inp == NULL || error == NULL) - panic("ipsec6_getpolicybysock: NULL pointer was passed.\n"); + panic("ipsec6_getpolicybysock: NULL pointer was passed."); #ifdef DIAGNOSTIC if ((inp->inp_vflag & INP_IPV6PROTO) == 0) - panic("ipsec6_getpolicybysock: socket domain != inet6\n"); + panic("ipsec6_getpolicybysock: socket domain != inet6"); #endif /* set spidx in pcb */ @@ -484,7 +484,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error) /* sanity check */ if (pcbsp == NULL) - panic("ipsec6_getpolicybysock: pcbsp is NULL.\n"); + panic("ipsec6_getpolicybysock: pcbsp is NULL."); switch (dir) { case IPSEC_DIR_INBOUND: @@ -494,12 +494,12 @@ ipsec6_getpolicybypcb(m, dir, inp, error) currsp = pcbsp->sp_out; break; default: - panic("ipsec6_getpolicybysock: illegal direction.\n"); + panic("ipsec6_getpolicybysock: illegal direction."); } /* sanity check */ if (currsp == NULL) - panic("ipsec6_getpolicybysock: currsp is NULL.\n"); + panic("ipsec6_getpolicybysock: currsp is NULL."); /* when privilieged socket */ if (pcbsp->priv) { @@ -606,7 +606,7 @@ ipsec6_getpolicybysock(m, dir, so, error) { if (so == NULL) - panic("ipsec6_getpolicybysock: NULL pointer was passed.\n"); + panic("ipsec6_getpolicybysock: NULL pointer was passed."); return (ipsec6_getpolicybypcb(m, dir, sotoin6pcb(so), error)); } @@ -637,7 +637,7 @@ ipsec6_getpolicybyaddr(m, dir, flag, error) /* sanity check */ if (m == NULL || error == NULL) - panic("ipsec6_getpolicybyaddr: NULL pointer was passed.\n"); + panic("ipsec6_getpolicybyaddr: NULL pointer was passed."); { struct secpolicyindex spidx; @@ -697,7 +697,7 @@ ipsec_setspidx_mbuf(spidx, dir, family, m, needport) /* sanity check */ if (spidx == NULL || m == NULL) - panic("ipsec_setspidx_mbuf: NULL pointer was passed.\n"); + panic("ipsec_setspidx_mbuf: NULL pointer was passed."); bzero(spidx, sizeof(*spidx)); @@ -724,11 +724,11 @@ ipsec4_setspidx_inpcb(m, pcb) /* sanity check */ if (pcb == NULL) - panic("ipsec4_setspidx_inpcb: no PCB found.\n"); + panic("ipsec4_setspidx_inpcb: no PCB found."); if (pcb->inp_sp == NULL) - panic("ipsec4_setspidx_inpcb: no inp_sp found.\n"); + panic("ipsec4_setspidx_inpcb: no inp_sp found."); if (pcb->inp_sp->sp_out == NULL || pcb->inp_sp->sp_in == NULL) - panic("ipsec4_setspidx_inpcb: no sp_in/out found.\n"); + panic("ipsec4_setspidx_inpcb: no sp_in/out found."); bzero(&pcb->inp_sp->sp_in->spidx, sizeof(*spidx)); bzero(&pcb->inp_sp->sp_out->spidx, sizeof(*spidx)); @@ -764,11 +764,11 @@ ipsec6_setspidx_in6pcb(m, pcb) /* sanity check */ if (pcb == NULL) - panic("ipsec6_setspidx_in6pcb: no PCB found.\n"); + panic("ipsec6_setspidx_in6pcb: no PCB found."); if (pcb->in6p_sp == NULL) - panic("ipsec6_setspidx_in6pcb: no in6p_sp found.\n"); + panic("ipsec6_setspidx_in6pcb: no in6p_sp found."); if (pcb->in6p_sp->sp_out == NULL || pcb->in6p_sp->sp_in == NULL) - panic("ipsec6_setspidx_in6pcb: no sp_in/out found.\n"); + panic("ipsec6_setspidx_in6pcb: no sp_in/out found."); bzero(&pcb->in6p_sp->sp_in->spidx, sizeof(*spidx)); bzero(&pcb->in6p_sp->sp_out->spidx, sizeof(*spidx)); @@ -813,7 +813,7 @@ ipsec_setspidx(m, spidx, needport) int error; if (m == NULL) - panic("ipsec_setspidx: m == 0 passed.\n"); + panic("ipsec_setspidx: m == 0 passed."); /* * validate m->m_pkthdr.len. we see incorrect length if we @@ -896,9 +896,9 @@ ipsec4_get_ulp(m, spidx, needport) /* sanity check */ if (m == NULL) - panic("ipsec4_get_ulp: NULL pointer was passed.\n"); + panic("ipsec4_get_ulp: NULL pointer was passed."); if (m->m_pkthdr.len < sizeof(ip)) - panic("ipsec4_get_ulp: too short\n"); + panic("ipsec4_get_ulp: too short"); /* set default */ spidx->ul_proto = IPSEC_ULPROTO_ANY; @@ -1004,7 +1004,7 @@ ipsec6_get_ulp(m, spidx, needport) /* sanity check */ if (m == NULL) - panic("ipsec6_get_ulp: NULL pointer was passed.\n"); + panic("ipsec6_get_ulp: NULL pointer was passed."); KEYDEBUG(KEYDEBUG_IPSEC_DUMP, printf("ipsec6_get_ulp:\n"); kdebug_mbuf(m)); @@ -1117,7 +1117,7 @@ ipsec_init_policy(so, pcb_sp) /* sanity check. */ if (so == NULL || pcb_sp == NULL) - panic("ipsec_init_policy: NULL pointer was passed.\n"); + panic("ipsec_init_policy: NULL pointer was passed."); new = ipsec_newpcbpolicy(); if (new == NULL) { @@ -1358,7 +1358,7 @@ ipsec4_get_policy(inp, request, len, mp) if (inp == NULL || request == NULL || mp == NULL) return EINVAL; if (inp->inp_sp == NULL) - panic("policy in PCB is NULL\n"); + panic("policy in PCB is NULL"); if (len < sizeof(*xpl)) return EINVAL; xpl = (struct sadb_x_policy *)request; @@ -1387,7 +1387,7 @@ ipsec4_delete_pcbpolicy(inp) { /* sanity check. */ if (inp == NULL) - panic("ipsec4_delete_pcbpolicy: NULL pointer was passed.\n"); + panic("ipsec4_delete_pcbpolicy: NULL pointer was passed."); if (inp->inp_sp == NULL) return 0; @@ -1458,7 +1458,7 @@ ipsec6_get_policy(in6p, request, len, mp) if (in6p == NULL || request == NULL || mp == NULL) return EINVAL; if (in6p->in6p_sp == NULL) - panic("policy in PCB is NULL\n"); + panic("policy in PCB is NULL"); if (len < sizeof(*xpl)) return EINVAL; xpl = (struct sadb_x_policy *)request; @@ -1486,7 +1486,7 @@ ipsec6_delete_pcbpolicy(in6p) { /* sanity check. */ if (in6p == NULL) - panic("ipsec6_delete_pcbpolicy: NULL pointer was passed.\n"); + panic("ipsec6_delete_pcbpolicy: NULL pointer was passed."); if (in6p->in6p_sp == NULL) return 0; @@ -1521,10 +1521,10 @@ ipsec_get_reqlevel(isr) /* sanity check */ if (isr == NULL || isr->sp == NULL) - panic("ipsec_get_reqlevel: NULL pointer is passed.\n"); + panic("ipsec_get_reqlevel: NULL pointer is passed."); if (((struct sockaddr *)&isr->sp->spidx.src)->sa_family != ((struct sockaddr *)&isr->sp->spidx.dst)->sa_family) - panic("ipsec_get_reqlevel: family mismatched.\n"); + panic("ipsec_get_reqlevel: family mismatched."); /* XXX note that we have ipseclog() expanded here - code sync issue */ #define IPSEC_CHECK_DEFAULT(lev) \ @@ -1557,7 +1557,7 @@ ipsec_get_reqlevel(isr) break; #endif /* INET6 */ default: - panic("key_get_reqlevel: Unknown family. %d\n", + panic("key_get_reqlevel: Unknown family. %d", ((struct sockaddr *)&isr->sp->spidx.src)->sa_family); } @@ -1587,7 +1587,7 @@ ipsec_get_reqlevel(isr) break; default: panic("ipsec_get_reqlevel: " - "Illegal protocol defined %u\n", + "Illegal protocol defined %u", isr->saidx.proto); } break; @@ -1601,7 +1601,7 @@ ipsec_get_reqlevel(isr) break; default: - panic("ipsec_get_reqlevel: Illegal IPsec level %u\n", + panic("ipsec_get_reqlevel: Illegal IPsec level %u", isr->level); } @@ -1640,7 +1640,7 @@ ipsec_in_reject(sp, m) case IPSEC_POLICY_ENTRUST: default: - panic("ipsec_hdrsiz: Invalid policy found. %d\n", sp->policy); + panic("ipsec_hdrsiz: Invalid policy found. %d", sp->policy); } need_auth = 0; @@ -1821,7 +1821,7 @@ ipsec_hdrsiz(sp) case IPSEC_POLICY_ENTRUST: default: - panic("ipsec_hdrsiz: Invalid policy found. %d\n", sp->policy); + panic("ipsec_hdrsiz: Invalid policy found. %d", sp->policy); } siz = 0; @@ -2184,7 +2184,7 @@ ipsec_chkreplay(seq, sav) /* sanity check */ if (sav == NULL) - panic("ipsec_chkreplay: NULL pointer was passed.\n"); + panic("ipsec_chkreplay: NULL pointer was passed."); replay = sav->replay; @@ -2243,7 +2243,7 @@ ipsec_updatereplay(seq, sav) /* sanity check */ if (sav == NULL) - panic("ipsec_chkreplay: NULL pointer was passed.\n"); + panic("ipsec_chkreplay: NULL pointer was passed."); replay = sav->replay; @@ -2417,7 +2417,7 @@ ipsec_logsastr(sav) /* validity check */ if (((struct sockaddr *)&sav->sah->saidx.src)->sa_family != ((struct sockaddr *)&sav->sah->saidx.dst)->sa_family) - panic("ipsec_logsastr: family mismatched.\n"); + panic("ipsec_logsastr: family mismatched."); p = buf; snprintf(buf, sizeof(buf), "SA(SPI=%u ", (u_int32_t)ntohl(sav->spi)); |