summaryrefslogtreecommitdiffstats
path: root/sys/netkey/key_debug.c
diff options
context:
space:
mode:
Diffstat (limited to 'sys/netkey/key_debug.c')
-rw-r--r--sys/netkey/key_debug.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/sys/netkey/key_debug.c b/sys/netkey/key_debug.c
index 5c6b78e..1de1146 100644
--- a/sys/netkey/key_debug.c
+++ b/sys/netkey/key_debug.c
@@ -90,7 +90,7 @@ kdebug_sadb(base)
/* sanity check */
if (base == NULL)
- panic("kdebug_sadb: NULL pointer was passed.\n");
+ panic("kdebug_sadb: NULL pointer was passed.");
printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n",
base->sadb_msg_version, base->sadb_msg_type,
@@ -179,7 +179,7 @@ kdebug_sadb_prop(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_prop: NULL pointer was passed.\n");
+ panic("kdebug_sadb_prop: NULL pointer was passed.");
len = (PFKEY_UNUNIT64(prop->sadb_prop_len) - sizeof(*prop))
/ sizeof(*comb);
@@ -228,7 +228,7 @@ kdebug_sadb_identity(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_identity: NULL pointer was passed.\n");
+ panic("kdebug_sadb_identity: NULL pointer was passed.");
len = PFKEY_UNUNIT64(id->sadb_ident_len) - sizeof(*id);
printf("sadb_ident_%s{",
@@ -272,7 +272,7 @@ kdebug_sadb_supported(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_supported: NULL pointer was passed.\n");
+ panic("kdebug_sadb_supported: NULL pointer was passed.");
len = (PFKEY_UNUNIT64(sup->sadb_supported_len) - sizeof(*sup))
/ sizeof(*alg);
@@ -317,7 +317,7 @@ kdebug_sadb_sa(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_sa: NULL pointer was passed.\n");
+ panic("kdebug_sadb_sa: NULL pointer was passed.");
printf("sadb_sa{ spi=%u replay=%u state=%u\n",
(u_int32_t)ntohl(sa->sadb_sa_spi), sa->sadb_sa_replay,
@@ -336,7 +336,7 @@ kdebug_sadb_address(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_address: NULL pointer was passed.\n");
+ panic("kdebug_sadb_address: NULL pointer was passed.");
printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n",
addr->sadb_address_proto, addr->sadb_address_prefixlen,
@@ -356,7 +356,7 @@ kdebug_sadb_key(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_key: NULL pointer was passed.\n");
+ panic("kdebug_sadb_key: NULL pointer was passed.");
printf("sadb_key{ bits=%u reserved=%u\n",
key->sadb_key_bits, key->sadb_key_reserved);
@@ -384,7 +384,7 @@ kdebug_sadb_x_sa2(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_x_sa2: NULL pointer was passed.\n");
+ panic("kdebug_sadb_x_sa2: NULL pointer was passed.");
printf("sadb_x_sa2{ mode=%u reqid=%u\n",
sa2->sadb_x_sa2_mode, sa2->sadb_x_sa2_reqid);
@@ -404,7 +404,7 @@ kdebug_sadb_x_policy(ext)
/* sanity check */
if (ext == NULL)
- panic("kdebug_sadb_x_policy: NULL pointer was passed.\n");
+ panic("kdebug_sadb_x_policy: NULL pointer was passed.");
printf("sadb_x_policy{ type=%u dir=%u id=%x }\n",
xpl->sadb_x_policy_type, xpl->sadb_x_policy_dir,
@@ -453,7 +453,7 @@ kdebug_sadb_x_policy(ext)
}
if (tlen != 0)
- panic("kdebug_sadb_x_policy: wrong policy struct.\n");
+ panic("kdebug_sadb_x_policy: wrong policy struct.");
}
return;
@@ -467,7 +467,7 @@ kdebug_secpolicy(sp)
{
/* sanity check */
if (sp == NULL)
- panic("kdebug_secpolicy: NULL pointer was passed.\n");
+ panic("kdebug_secpolicy: NULL pointer was passed.");
printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
sp->refcnt, sp->state, sp->policy);
@@ -516,7 +516,7 @@ kdebug_secpolicyindex(spidx)
{
/* sanity check */
if (spidx == NULL)
- panic("kdebug_secpolicyindex: NULL pointer was passed.\n");
+ panic("kdebug_secpolicyindex: NULL pointer was passed.");
printf("secpolicyindex{ dir=%u prefs=%u prefd=%u ul_proto=%u\n",
spidx->dir, spidx->prefs, spidx->prefd, spidx->ul_proto);
@@ -537,7 +537,7 @@ kdebug_secasindex(saidx)
{
/* sanity check */
if (saidx == NULL)
- panic("kdebug_secpolicyindex: NULL pointer was passed.\n");
+ panic("kdebug_secpolicyindex: NULL pointer was passed.");
printf("secasindex{ mode=%u proto=%u\n",
saidx->mode, saidx->proto);
@@ -558,7 +558,7 @@ kdebug_secasv(sav)
{
/* sanity check */
if (sav == NULL)
- panic("kdebug_secasv: NULL pointer was passed.\n");
+ panic("kdebug_secasv: NULL pointer was passed.");
printf("secas{");
kdebug_secasindex(&sav->sah->saidx);
@@ -602,7 +602,7 @@ kdebug_secreplay(rpl)
/* sanity check */
if (rpl == NULL)
- panic("kdebug_secreplay: NULL pointer was passed.\n");
+ panic("kdebug_secreplay: NULL pointer was passed.");
printf(" secreplay{ count=%u wsize=%u seq=%u lastseq=%u",
rpl->count, rpl->wsize, rpl->seq, rpl->lastseq);
@@ -687,7 +687,7 @@ kdebug_sockaddr(addr)
/* sanity check */
if (addr == NULL)
- panic("kdebug_sockaddr: NULL pointer was passed.\n");
+ panic("kdebug_sockaddr: NULL pointer was passed.");
/* NOTE: We deal with port number as host byte order. */
printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family);
OpenPOWER on IntegriCloud