summaryrefslogtreecommitdiff
path: root/sys/netinet6/ip6_ipsec.c
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2007-07-05 16:29:40 +0000
committerXin LI <delphij@FreeBSD.org>2007-07-05 16:29:40 +0000
commit2a463222be46a5f7ab718d440aa9cab6ecd50d56 (patch)
tree0d5c02eb5ad8b661ab1f502bb251562a254ddc3d /sys/netinet6/ip6_ipsec.c
parent1272577e22d8f1c1c5b5e88f2624836e93aecb17 (diff)
Notes
Diffstat (limited to 'sys/netinet6/ip6_ipsec.c')
-rw-r--r--sys/netinet6/ip6_ipsec.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/sys/netinet6/ip6_ipsec.c b/sys/netinet6/ip6_ipsec.c
index 6900681036e9..12b43f292bbb 100644
--- a/sys/netinet6/ip6_ipsec.c
+++ b/sys/netinet6/ip6_ipsec.c
@@ -110,7 +110,7 @@ ip6_ipsec_fwd(struct mbuf *m)
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
} else {
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
- IP_FORWARDING, &error);
+ IP_FORWARDING, &error);
}
if (sp == NULL) { /* NB: can happen if error */
splx(s);
@@ -161,7 +161,7 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
* done. If so, then just pass it along. This tag gets
* set during AH, ESP, etc. input handling, before the
* packet is returned to the ip input queue for delivery.
- */
+ */
mtag = m_tag_find(m, PACKET_TAG_IPSEC_IN_DONE, NULL);
s = splnet();
if (mtag != NULL) {
@@ -169,7 +169,7 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
sp = ipsec_getpolicy(tdbi, IPSEC_DIR_INBOUND);
} else {
sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND,
- IP_FORWARDING, &error);
+ IP_FORWARDING, &error);
}
if (sp != NULL) {
/*
@@ -194,12 +194,12 @@ ip6_ipsec_input(struct mbuf *m, int nxt)
/*
* Called from ip6_output().
* 1 = drop packet, 0 = continue processing packet,
- * -1 = packet was reinjected and stop processing packet
- */
+ * -1 = packet was reinjected and stop processing packet
+ */
int
ip6_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
- struct ifnet **ifp, struct secpolicy **sp)
+ struct ifnet **ifp, struct secpolicy **sp)
{
#ifdef IPSEC
struct tdb_ident *tdbi;
@@ -221,7 +221,7 @@ ip6_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
/*
* There are four return cases:
- * sp != NULL apply IPsec policy
+ * sp != NULL apply IPsec policy
* sp == NULL, error == 0 no IPsec handling needed
* sp == NULL, error == -EINVAL discard packet w/o error
* sp == NULL, error != 0 discard packet, report error