diff options
-rw-r--r-- | sys/net/if_bridge.c | 20 | ||||
-rw-r--r-- | sys/net/if_ethersubr.c | 4 | ||||
-rw-r--r-- | sys/net/pf.c | 10 | ||||
-rw-r--r-- | sys/net/pfkey.c | 6 | ||||
-rw-r--r-- | sys/net/pfkeyv2.c | 236 | ||||
-rw-r--r-- | sys/net/pfkeyv2.h | 10 | ||||
-rw-r--r-- | sys/net/pfkeyv2_convert.c | 4 | ||||
-rw-r--r-- | sys/net/pfkeyv2_parsemessage.c | 28 | ||||
-rw-r--r-- | sys/net/rtsock.c | 4 |
9 files changed, 163 insertions, 159 deletions
diff --git a/sys/net/if_bridge.c b/sys/net/if_bridge.c index d4a2816710c..b282efcf1d1 100644 --- a/sys/net/if_bridge.c +++ b/sys/net/if_bridge.c @@ -1,4 +1,4 @@ -/* $OpenBSD: if_bridge.c,v 1.109 2003/01/07 17:47:21 jason Exp $ */ +/* $OpenBSD: if_bridge.c,v 1.110 2003/02/16 21:30:13 deraadt Exp $ */ /* * Copyright (c) 1999, 2000 Jason L. Wright (jason@thought.net) @@ -1696,7 +1696,7 @@ fail: a -= b; a -= c; a ^= (c >> 3); \ b -= c; b -= a; b ^= (a << 10); \ c -= a; c -= b; c ^= (b >> 15); \ - } while(0) + } while (0) u_int32_t bridge_hash(sc, addr) @@ -2522,10 +2522,10 @@ bridge_fragment(sc, ifp, eh, m) m->m_pkthdr.len < (LLC_SNAPFRAMELEN + sizeof(struct ether_header))) goto dropit; - + m_copydata(m, sizeof(struct ether_header), LLC_SNAPFRAMELEN, (caddr_t)&llc); - + if (llc.llc_dsap != LLC_SNAP_LSAP || llc.llc_ssap != LLC_SNAP_LSAP || llc.llc_control != LLC_UI || @@ -2534,10 +2534,10 @@ bridge_fragment(sc, ifp, eh, m) llc.llc_snap.org_code[2] || llc.llc_snap.ether_type != htons(ETHERTYPE_IP)) goto dropit; - + hassnap = 1; } - + m_adj(m, sizeof(struct ether_header)); if (hassnap) m_adj(m, LLC_SNAPFRAMELEN); @@ -2590,12 +2590,12 @@ bridge_fragment(sc, ifp, eh, m) } else m_freem(m); } - + if (error == 0) ipstat.ips_fragmented++; - + return; -#endif /* INET */ +#endif /* INET */ dropit: if (m != NULL) m_freem(m); @@ -2629,7 +2629,7 @@ bridge_ifenqueue(sc, ifp, m) } #ifdef INET -void +void bridge_send_icmp_err(sc, ifp, eh, n, hassnap, llc, type, code) struct bridge_softc *sc; struct ifnet *ifp; diff --git a/sys/net/if_ethersubr.c b/sys/net/if_ethersubr.c index 70b5c4e2207..b1071eae590 100644 --- a/sys/net/if_ethersubr.c +++ b/sys/net/if_ethersubr.c @@ -1,4 +1,4 @@ -/* $OpenBSD: if_ethersubr.c,v 1.67 2003/01/07 09:00:33 kjc Exp $ */ +/* $OpenBSD: if_ethersubr.c,v 1.68 2003/02/16 21:30:13 deraadt Exp $ */ /* $NetBSD: if_ethersubr.c,v 1.19 1996/05/07 02:40:30 thorpej Exp $ */ /* @@ -835,7 +835,7 @@ decapsulate: case LLC_XID: case LLC_XID_P: - if(m->m_len < ETHER_ADDR_LEN) + if (m->m_len < ETHER_ADDR_LEN) goto dropanyway; l->llc_window = 0; l->llc_fid = 9; diff --git a/sys/net/pf.c b/sys/net/pf.c index af5e23f582e..61faaabff11 100644 --- a/sys/net/pf.c +++ b/sys/net/pf.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pf.c,v 1.320 2003/02/12 14:41:07 jason Exp $ */ +/* $OpenBSD: pf.c,v 1.321 2003/02/16 21:30:13 deraadt Exp $ */ /* * Copyright (c) 2001 Daniel Hartmeier @@ -352,7 +352,7 @@ pf_state_compare(struct pf_tree_node *a, struct pf_tree_node *b) void pf_addrcpy(struct pf_addr *dst, struct pf_addr *src, sa_family_t af) { - switch(af) { + switch (af) { #ifdef INET case AF_INET: dst->addr32[0] = src->addr32[0]; @@ -643,7 +643,7 @@ pf_dynaddr_copyout(struct pf_addr_wrap *aw) void pf_print_host(struct pf_addr *addr, u_int16_t p, sa_family_t af) { - switch(af) { + switch (af) { #ifdef INET case AF_INET: { u_int32_t a = ntohl(addr->addr32[0]); @@ -1408,7 +1408,7 @@ pf_addr_inc(struct pf_addr *addr, u_int8_t af) a -= b; a -= c; a ^= (c >> 3); \ b -= c; b -= a; b ^= (a << 10); \ c -= a; c -= b; c ^= (b >> 15); \ - } while(0) + } while (0) /* * hash function based on bridge_hash in if_bridge.c @@ -1719,7 +1719,7 @@ pf_get_translation(int direction, struct ifnet *ifp, u_int8_t proto, break; case PF_NAT: if (pf_get_sport(af, proto, &r->rpool, saddr, daddr, - dport, naddr, nport, r->rpool.proxy_port[0], + dport, naddr, nport, r->rpool.proxy_port[0], r->rpool.proxy_port[1])) { DPFPRINTF(PF_DEBUG_MISC, ("pf: NAT proxy port allocation " diff --git a/sys/net/pfkey.c b/sys/net/pfkey.c index 628c0028b67..7a0a6d70fa1 100644 --- a/sys/net/pfkey.c +++ b/sys/net/pfkey.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pfkey.c,v 1.13 2003/02/16 19:54:20 jason Exp $ */ +/* $OpenBSD: pfkey.c,v 1.14 2003/02/16 21:30:13 deraadt Exp $ */ /* * @(#)COPYRIGHT 1.1 (NRL) 17 January 1995 @@ -254,7 +254,7 @@ pfkey_usrreq(struct socket *socket, int req, struct mbuf *mbuf, !pfkey_versions[socket->so_proto->pr_protocol]) return (EPROTONOSUPPORT); - switch(req) { + switch (req) { case PRU_ATTACH: return (pfkey_attach(socket, nam)); @@ -303,7 +303,7 @@ static struct protosw pfkey_protosw_template = { int pfkey_buildprotosw(void) -{ +{ struct protosw *protosw, *p; int i, j; diff --git a/sys/net/pfkeyv2.c b/sys/net/pfkeyv2.c index b8bc47c8d0f..8b6d0676fa6 100644 --- a/sys/net/pfkeyv2.c +++ b/sys/net/pfkeyv2.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pfkeyv2.c,v 1.86 2003/02/16 19:54:20 jason Exp $ */ +/* $OpenBSD: pfkeyv2.c,v 1.87 2003/02/16 21:30:13 deraadt Exp $ */ /* * @(#)COPYRIGHT 1.1 (NRL) 17 January 1995 @@ -227,103 +227,103 @@ pfkeyv2_sendmessage(void **headers, int mode, struct socket *socket, j, &packet)) != 0) goto ret; - switch(mode) { - case PFKEYV2_SENDMESSAGE_UNICAST: - /* - * Send message to the specified socket, plus all - * promiscuous listeners. - */ - pfkey_sendup(socket, packet, 0); - - /* - * Promiscuous messages contain the original message - * encapsulated in another sadb_msg header. - */ - bzero(buffer, sizeof(struct sadb_msg)); - smsg = (struct sadb_msg *) buffer; - smsg->sadb_msg_version = PF_KEY_V2; - smsg->sadb_msg_type = SADB_X_PROMISC; - smsg->sadb_msg_len = (sizeof(struct sadb_msg) + j) / - sizeof(uint64_t); - smsg->sadb_msg_seq = 0; - - /* Copy to mbuf chain */ - if ((rval = pfdatatopacket(buffer, sizeof(struct sadb_msg) + j, - &packet)) != 0) - goto ret; - - /* - * Search for promiscuous listeners, skipping the - * original destination. - */ - for (s = pfkeyv2_sockets; s; s = s->next) - if ((s->flags & PFKEYV2_SOCKETFLAGS_PROMISC) && - (s->socket != socket)) - pfkey_sendup(s->socket, packet, 1); - - /* Done, let's be a bit paranoid */ - m_zero(packet); - m_freem(packet); - break; - - case PFKEYV2_SENDMESSAGE_REGISTERED: - /* - * Send the message to all registered sockets that match - * the specified satype (e.g., all IPSEC-ESP negotiators) - */ - for (s = pfkeyv2_sockets; s; s = s->next) - if (s->flags & PFKEYV2_SOCKETFLAGS_REGISTERED) { - if (!satype) /* Just send to everyone registered */ - pfkey_sendup(s->socket, packet, 1); - else { - /* Check for specified satype */ - if ((1 << satype) & s->registration) - pfkey_sendup(s->socket, packet, 1); - } - } - - /* Free last/original copy of the packet */ - m_freem(packet); - - /* Encapsulate the original message "inside" an sadb_msg header */ - bzero(buffer, sizeof(struct sadb_msg)); - smsg = (struct sadb_msg *) buffer; - smsg->sadb_msg_version = PF_KEY_V2; - smsg->sadb_msg_type = SADB_X_PROMISC; - smsg->sadb_msg_len = (sizeof(struct sadb_msg) + j) / - sizeof(uint64_t); - smsg->sadb_msg_seq = 0; - - /* Convert to mbuf chain */ - if ((rval = pfdatatopacket(buffer, sizeof(struct sadb_msg) + j, - &packet)) != 0) - goto ret; - - /* Send to all registered promiscuous listeners */ - for (s = pfkeyv2_sockets; s; s = s->next) - if ((s->flags & PFKEYV2_SOCKETFLAGS_PROMISC) && - !(s->flags & PFKEYV2_SOCKETFLAGS_REGISTERED)) - pfkey_sendup(s->socket, packet, 1); - - m_freem(packet); - break; - - case PFKEYV2_SENDMESSAGE_BROADCAST: - /* Send message to all sockets */ - for (s = pfkeyv2_sockets; s; s = s->next) - pfkey_sendup(s->socket, packet, 1); - - m_freem(packet); - break; - } + switch (mode) { + case PFKEYV2_SENDMESSAGE_UNICAST: + /* + * Send message to the specified socket, plus all + * promiscuous listeners. + */ + pfkey_sendup(socket, packet, 0); + + /* + * Promiscuous messages contain the original message + * encapsulated in another sadb_msg header. + */ + bzero(buffer, sizeof(struct sadb_msg)); + smsg = (struct sadb_msg *) buffer; + smsg->sadb_msg_version = PF_KEY_V2; + smsg->sadb_msg_type = SADB_X_PROMISC; + smsg->sadb_msg_len = (sizeof(struct sadb_msg) + j) / + sizeof(uint64_t); + smsg->sadb_msg_seq = 0; + + /* Copy to mbuf chain */ + if ((rval = pfdatatopacket(buffer, sizeof(struct sadb_msg) + j, + &packet)) != 0) + goto ret; + + /* + * Search for promiscuous listeners, skipping the + * original destination. + */ + for (s = pfkeyv2_sockets; s; s = s->next) + if ((s->flags & PFKEYV2_SOCKETFLAGS_PROMISC) && + (s->socket != socket)) + pfkey_sendup(s->socket, packet, 1); + + /* Done, let's be a bit paranoid */ + m_zero(packet); + m_freem(packet); + break; + + case PFKEYV2_SENDMESSAGE_REGISTERED: + /* + * Send the message to all registered sockets that match + * the specified satype (e.g., all IPSEC-ESP negotiators) + */ + for (s = pfkeyv2_sockets; s; s = s->next) + if (s->flags & PFKEYV2_SOCKETFLAGS_REGISTERED) { + if (!satype) /* Just send to everyone registered */ + pfkey_sendup(s->socket, packet, 1); + else { + /* Check for specified satype */ + if ((1 << satype) & s->registration) + pfkey_sendup(s->socket, packet, 1); + } + } + + /* Free last/original copy of the packet */ + m_freem(packet); + + /* Encapsulate the original message "inside" an sadb_msg header */ + bzero(buffer, sizeof(struct sadb_msg)); + smsg = (struct sadb_msg *) buffer; + smsg->sadb_msg_version = PF_KEY_V2; + smsg->sadb_msg_type = SADB_X_PROMISC; + smsg->sadb_msg_len = (sizeof(struct sadb_msg) + j) / + sizeof(uint64_t); + smsg->sadb_msg_seq = 0; + + /* Convert to mbuf chain */ + if ((rval = pfdatatopacket(buffer, sizeof(struct sadb_msg) + j, + &packet)) != 0) + goto ret; + + /* Send to all registered promiscuous listeners */ + for (s = pfkeyv2_sockets; s; s = s->next) + if ((s->flags & PFKEYV2_SOCKETFLAGS_PROMISC) && + !(s->flags & PFKEYV2_SOCKETFLAGS_REGISTERED)) + pfkey_sendup(s->socket, packet, 1); + + m_freem(packet); + break; + + case PFKEYV2_SENDMESSAGE_BROADCAST: + /* Send message to all sockets */ + for (s = pfkeyv2_sockets; s; s = s->next) + pfkey_sendup(s->socket, packet, 1); + + m_freem(packet); + break; + } ret: - if (buffer != NULL) { - bzero(buffer, j + sizeof(struct sadb_msg)); - free(buffer, M_PFKEY); - } + if (buffer != NULL) { + bzero(buffer, j + sizeof(struct sadb_msg)); + free(buffer, M_PFKEY); + } - return (rval); + return (rval); } /* @@ -833,7 +833,7 @@ pfkeyv2_send(struct socket *socket, void *message, int len) goto ret; smsg = (struct sadb_msg *) headers[0]; - switch(smsg->sadb_msg_type) { + switch (smsg->sadb_msg_type) { case SADB_GETSPI: /* Reserve an SPI */ bzero(&sa, sizeof(struct tdb)); @@ -878,17 +878,17 @@ pfkeyv2_send(struct socket *socket, void *message, int len) /* Either all or none of the flow must be included */ if ((headers[SADB_X_EXT_SRC_FLOW] || - headers[SADB_X_EXT_PROTOCOL] || - headers[SADB_X_EXT_FLOW_TYPE] || - headers[SADB_X_EXT_DST_FLOW] || - headers[SADB_X_EXT_SRC_MASK] || - headers[SADB_X_EXT_DST_MASK]) && - !(headers[SADB_X_EXT_SRC_FLOW] && - headers[SADB_X_EXT_PROTOCOL] && - headers[SADB_X_EXT_FLOW_TYPE] && - headers[SADB_X_EXT_DST_FLOW] && - headers[SADB_X_EXT_SRC_MASK] && - headers[SADB_X_EXT_DST_MASK])) { + headers[SADB_X_EXT_PROTOCOL] || + headers[SADB_X_EXT_FLOW_TYPE] || + headers[SADB_X_EXT_DST_FLOW] || + headers[SADB_X_EXT_SRC_MASK] || + headers[SADB_X_EXT_DST_MASK]) && + !(headers[SADB_X_EXT_SRC_FLOW] && + headers[SADB_X_EXT_PROTOCOL] && + headers[SADB_X_EXT_FLOW_TYPE] && + headers[SADB_X_EXT_DST_FLOW] && + headers[SADB_X_EXT_SRC_MASK] && + headers[SADB_X_EXT_DST_MASK])) { rval = EINVAL; goto ret; } @@ -1018,17 +1018,17 @@ pfkeyv2_send(struct socket *socket, void *message, int len) /* Either all or none of the flow must be included */ if ((headers[SADB_X_EXT_SRC_FLOW] || - headers[SADB_X_EXT_PROTOCOL] || - headers[SADB_X_EXT_FLOW_TYPE] || - headers[SADB_X_EXT_DST_FLOW] || - headers[SADB_X_EXT_SRC_MASK] || - headers[SADB_X_EXT_DST_MASK]) && + headers[SADB_X_EXT_PROTOCOL] || + headers[SADB_X_EXT_FLOW_TYPE] || + headers[SADB_X_EXT_DST_FLOW] || + headers[SADB_X_EXT_SRC_MASK] || + headers[SADB_X_EXT_DST_MASK]) && !(headers[SADB_X_EXT_SRC_FLOW] && - headers[SADB_X_EXT_PROTOCOL] && - headers[SADB_X_EXT_FLOW_TYPE] && - headers[SADB_X_EXT_DST_FLOW] && - headers[SADB_X_EXT_SRC_MASK] && - headers[SADB_X_EXT_DST_MASK])) { + headers[SADB_X_EXT_PROTOCOL] && + headers[SADB_X_EXT_FLOW_TYPE] && + headers[SADB_X_EXT_DST_FLOW] && + headers[SADB_X_EXT_SRC_MASK] && + headers[SADB_X_EXT_DST_MASK])) { rval = EINVAL; goto ret; } @@ -1265,7 +1265,7 @@ pfkeyv2_send(struct socket *socket, void *message, int len) case SADB_FLUSH: rval = 0; - switch(smsg->sadb_msg_satype) { + switch (smsg->sadb_msg_satype) { case SADB_SATYPE_UNSPEC: s = spltdb(); diff --git a/sys/net/pfkeyv2.h b/sys/net/pfkeyv2.h index 7deaefa3915..2f307331318 100644 --- a/sys/net/pfkeyv2.h +++ b/sys/net/pfkeyv2.h @@ -1,4 +1,4 @@ -/* $OpenBSD: pfkeyv2.h,v 1.45 2003/02/16 19:54:20 jason Exp $ */ +/* $OpenBSD: pfkeyv2.h,v 1.46 2003/02/16 21:30:13 deraadt Exp $ */ /* * @(#)COPYRIGHT 1.1 (NRL) January 1998 * @@ -206,10 +206,10 @@ struct sadb_x_cred { }; #ifdef _KERNEL -#define SADB_X_GETSPROTO(x) ( (x) == SADB_SATYPE_AH ? IPPROTO_AH :\ - (x) == SADB_SATYPE_ESP ? IPPROTO_ESP :\ - (x) == SADB_X_SATYPE_IPCOMP ? IPPROTO_IPCOMP:\ - IPPROTO_IPIP ) +#define SADB_X_GETSPROTO(x) \ + ( (x) == SADB_SATYPE_AH ? IPPROTO_AH :\ + (x) == SADB_SATYPE_ESP ? IPPROTO_ESP :\ + (x) == SADB_X_SATYPE_IPCOMP ? IPPROTO_IPCOMP: IPPROTO_IPIP ) #endif #define SADB_EXT_RESERVED 0 diff --git a/sys/net/pfkeyv2_convert.c b/sys/net/pfkeyv2_convert.c index fefb11a37b1..8c4e286f364 100644 --- a/sys/net/pfkeyv2_convert.c +++ b/sys/net/pfkeyv2_convert.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pfkeyv2_convert.c,v 1.13 2003/02/15 22:57:59 jason Exp $ */ +/* $OpenBSD: pfkeyv2_convert.c,v 1.14 2003/02/16 21:30:13 deraadt Exp $ */ /* * The author of this code is Angelos D. Keromytis (angelos@keromytis.org) * @@ -495,7 +495,7 @@ import_address(struct sockaddr *sa, struct sadb_address *sadb_address) if (ssa->sa_len) salen = ssa->sa_len; else - switch(ssa->sa_family) { + switch (ssa->sa_family) { #ifdef INET case AF_INET: salen = sizeof(struct sockaddr_in); diff --git a/sys/net/pfkeyv2_parsemessage.c b/sys/net/pfkeyv2_parsemessage.c index c1cc516bc30..2659832b0d8 100644 --- a/sys/net/pfkeyv2_parsemessage.c +++ b/sys/net/pfkeyv2_parsemessage.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pfkeyv2_parsemessage.c,v 1.35 2003/02/16 19:54:20 jason Exp $ */ +/* $OpenBSD: pfkeyv2_parsemessage.c,v 1.36 2003/02/16 21:30:13 deraadt Exp $ */ /* * @(#)COPYRIGHT 1.1 (NRL) 17 January 1995 @@ -491,7 +491,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) return (EINVAL); } - switch(sa->sa_family) { + switch (sa->sa_family) { case AF_INET: if (sizeof(struct sadb_address) + PADUP(sizeof(struct sockaddr_in)) != i) { @@ -518,7 +518,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) case SADB_X_EXT_SRC_FLOW: case SADB_X_EXT_DST_FLOW: break; - + default: if (((struct sockaddr_in *)sa)->sin_port) { DPRINTF(("pfkeyv2_parsemessage" @@ -583,7 +583,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) case SADB_X_EXT_SRC_FLOW: case SADB_X_EXT_DST_FLOW: break; - + default: if (((struct sockaddr_in6 *)sa)->sin6_port) { DPRINTF(("pfkeyv2_parsemessage" @@ -656,7 +656,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) if (sadb_cred->sadb_x_cred_type > SADB_X_AUTHTYPE_MAX) { DPRINTF(("pfkeyv2_parsemessage: unknown auth " "type %d in AUTH extension header %d\n", - sadb_cred->sadb_x_cred_type, + sadb_cred->sadb_x_cred_type, sadb_ext->sadb_ext_type)); return (EINVAL); } @@ -806,8 +806,9 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) int j; for (j = 0; - j < (i - sizeof(struct sadb_prop))/sizeof(struct sadb_comb); - j++) { + j < (i - sizeof(struct sadb_prop))/ + sizeof(struct sadb_comb); + j++) { if (sadb_comb->sadb_comb_auth > SADB_AALG_MAX) { DPRINTF(("pfkeyv2_parsemessage" @@ -866,11 +867,14 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) sizeof(struct sadb_supported)); int max_alg; - max_alg = sadb_ext->sadb_ext_type == SADB_EXT_SUPPORTED_AUTH ? + max_alg = sadb_ext->sadb_ext_type == + SADB_EXT_SUPPORTED_AUTH ? SADB_AALG_MAX : SADB_EXT_SUPPORTED_ENCRYPT ? - SADB_EALG_MAX : SADB_X_CALG_MAX; + SADB_EALG_MAX : SADB_X_CALG_MAX; - for (j = 0; j < sadb_supported->sadb_supported_len - 1; j++) { + for (j = 0; + j < sadb_supported->sadb_supported_len - 1; + j++) { if (sadb_alg->sadb_alg_id > max_alg) { DPRINTF(("pfkeyv2_parsemessage" ": unknown algorithm %d " @@ -921,7 +925,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) sadb_ext->sadb_ext_type)); return (EINVAL); } - + headers[sadb_ext->sadb_ext_type] = p; p += i; left -= i; @@ -944,7 +948,7 @@ pfkeyv2_parsemessage(void *p, int len, void **headers) } } - switch(((struct sadb_msg *)headers[0])->sadb_msg_type) { + switch (((struct sadb_msg *)headers[0])->sadb_msg_type) { case SADB_UPDATE: if (((struct sadb_sa *)headers[SADB_EXT_SA])->sadb_sa_state != SADB_SASTATE_MATURE) { diff --git a/sys/net/rtsock.c b/sys/net/rtsock.c index 03c5192ef65..10b9cc5fbf2 100644 --- a/sys/net/rtsock.c +++ b/sys/net/rtsock.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rtsock.c,v 1.25 2002/12/31 02:30:10 itojun Exp $ */ +/* $OpenBSD: rtsock.c,v 1.26 2003/02/16 21:30:13 deraadt Exp $ */ /* $NetBSD: rtsock.c,v 1.18 1996/03/29 00:32:10 cgd Exp $ */ /* @@ -277,7 +277,7 @@ route_output(struct mbuf *m, ...) rt = (struct rtentry *)rn; rt->rt_refcnt++; - switch(rtm->rtm_type) { + switch (rtm->rtm_type) { case RTM_GET: report: |