diff options
Diffstat (limited to 'sys/netkey/key_debug.c')
-rw-r--r-- | sys/netkey/key_debug.c | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/sys/netkey/key_debug.c b/sys/netkey/key_debug.c index 5c6b78e..1de1146 100644 --- a/sys/netkey/key_debug.c +++ b/sys/netkey/key_debug.c @@ -90,7 +90,7 @@ kdebug_sadb(base) /* sanity check */ if (base == NULL) - panic("kdebug_sadb: NULL pointer was passed.\n"); + panic("kdebug_sadb: NULL pointer was passed."); printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n", base->sadb_msg_version, base->sadb_msg_type, @@ -179,7 +179,7 @@ kdebug_sadb_prop(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_prop: NULL pointer was passed.\n"); + panic("kdebug_sadb_prop: NULL pointer was passed."); len = (PFKEY_UNUNIT64(prop->sadb_prop_len) - sizeof(*prop)) / sizeof(*comb); @@ -228,7 +228,7 @@ kdebug_sadb_identity(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_identity: NULL pointer was passed.\n"); + panic("kdebug_sadb_identity: NULL pointer was passed."); len = PFKEY_UNUNIT64(id->sadb_ident_len) - sizeof(*id); printf("sadb_ident_%s{", @@ -272,7 +272,7 @@ kdebug_sadb_supported(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_supported: NULL pointer was passed.\n"); + panic("kdebug_sadb_supported: NULL pointer was passed."); len = (PFKEY_UNUNIT64(sup->sadb_supported_len) - sizeof(*sup)) / sizeof(*alg); @@ -317,7 +317,7 @@ kdebug_sadb_sa(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_sa: NULL pointer was passed.\n"); + panic("kdebug_sadb_sa: NULL pointer was passed."); printf("sadb_sa{ spi=%u replay=%u state=%u\n", (u_int32_t)ntohl(sa->sadb_sa_spi), sa->sadb_sa_replay, @@ -336,7 +336,7 @@ kdebug_sadb_address(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_address: NULL pointer was passed.\n"); + panic("kdebug_sadb_address: NULL pointer was passed."); printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n", addr->sadb_address_proto, addr->sadb_address_prefixlen, @@ -356,7 +356,7 @@ kdebug_sadb_key(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_key: NULL pointer was passed.\n"); + panic("kdebug_sadb_key: NULL pointer was passed."); printf("sadb_key{ bits=%u reserved=%u\n", key->sadb_key_bits, key->sadb_key_reserved); @@ -384,7 +384,7 @@ kdebug_sadb_x_sa2(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_x_sa2: NULL pointer was passed.\n"); + panic("kdebug_sadb_x_sa2: NULL pointer was passed."); printf("sadb_x_sa2{ mode=%u reqid=%u\n", sa2->sadb_x_sa2_mode, sa2->sadb_x_sa2_reqid); @@ -404,7 +404,7 @@ kdebug_sadb_x_policy(ext) /* sanity check */ if (ext == NULL) - panic("kdebug_sadb_x_policy: NULL pointer was passed.\n"); + panic("kdebug_sadb_x_policy: NULL pointer was passed."); printf("sadb_x_policy{ type=%u dir=%u id=%x }\n", xpl->sadb_x_policy_type, xpl->sadb_x_policy_dir, @@ -453,7 +453,7 @@ kdebug_sadb_x_policy(ext) } if (tlen != 0) - panic("kdebug_sadb_x_policy: wrong policy struct.\n"); + panic("kdebug_sadb_x_policy: wrong policy struct."); } return; @@ -467,7 +467,7 @@ kdebug_secpolicy(sp) { /* sanity check */ if (sp == NULL) - panic("kdebug_secpolicy: NULL pointer was passed.\n"); + panic("kdebug_secpolicy: NULL pointer was passed."); printf("secpolicy{ refcnt=%u state=%u policy=%u\n", sp->refcnt, sp->state, sp->policy); @@ -516,7 +516,7 @@ kdebug_secpolicyindex(spidx) { /* sanity check */ if (spidx == NULL) - panic("kdebug_secpolicyindex: NULL pointer was passed.\n"); + panic("kdebug_secpolicyindex: NULL pointer was passed."); printf("secpolicyindex{ dir=%u prefs=%u prefd=%u ul_proto=%u\n", spidx->dir, spidx->prefs, spidx->prefd, spidx->ul_proto); @@ -537,7 +537,7 @@ kdebug_secasindex(saidx) { /* sanity check */ if (saidx == NULL) - panic("kdebug_secpolicyindex: NULL pointer was passed.\n"); + panic("kdebug_secpolicyindex: NULL pointer was passed."); printf("secasindex{ mode=%u proto=%u\n", saidx->mode, saidx->proto); @@ -558,7 +558,7 @@ kdebug_secasv(sav) { /* sanity check */ if (sav == NULL) - panic("kdebug_secasv: NULL pointer was passed.\n"); + panic("kdebug_secasv: NULL pointer was passed."); printf("secas{"); kdebug_secasindex(&sav->sah->saidx); @@ -602,7 +602,7 @@ kdebug_secreplay(rpl) /* sanity check */ if (rpl == NULL) - panic("kdebug_secreplay: NULL pointer was passed.\n"); + panic("kdebug_secreplay: NULL pointer was passed."); printf(" secreplay{ count=%u wsize=%u seq=%u lastseq=%u", rpl->count, rpl->wsize, rpl->seq, rpl->lastseq); @@ -687,7 +687,7 @@ kdebug_sockaddr(addr) /* sanity check */ if (addr == NULL) - panic("kdebug_sockaddr: NULL pointer was passed.\n"); + panic("kdebug_sockaddr: NULL pointer was passed."); /* NOTE: We deal with port number as host byte order. */ printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family); |