diff options
-rw-r--r-- | sbin/isakmpd/conf.c | 4 | ||||
-rw-r--r-- | sbin/isakmpd/exchange.c | 6 | ||||
-rw-r--r-- | sbin/isakmpd/ike_phase_1.c | 30 | ||||
-rw-r--r-- | sbin/isakmpd/ike_quick_mode.c | 18 | ||||
-rw-r--r-- | sbin/isakmpd/ipsec.c | 12 | ||||
-rw-r--r-- | sbin/isakmpd/isakmp_cfg.c | 6 | ||||
-rw-r--r-- | sbin/isakmpd/message.c | 6 | ||||
-rw-r--r-- | sbin/isakmpd/pf_key_v2.c | 20 | ||||
-rw-r--r-- | sbin/isakmpd/transport.c | 10 | ||||
-rw-r--r-- | sbin/isakmpd/udp.c | 4 |
10 files changed, 58 insertions, 58 deletions
diff --git a/sbin/isakmpd/conf.c b/sbin/isakmpd/conf.c index e1a72f54052..fe3b51eea01 100644 --- a/sbin/isakmpd/conf.c +++ b/sbin/isakmpd/conf.c @@ -1,4 +1,4 @@ -/* $OpenBSD: conf.c,v 1.67 2004/05/14 08:42:56 hshoexer Exp $ */ +/* $OpenBSD: conf.c,v 1.68 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: conf.c,v 1.48 2000/12/04 02:04:29 angelos Exp $ */ /* @@ -1026,7 +1026,7 @@ struct dumper { }; static void -conf_report_dump(struct dumper * node) +conf_report_dump(struct dumper *node) { /* Recursive, cleanup when we're done. */ diff --git a/sbin/isakmpd/exchange.c b/sbin/isakmpd/exchange.c index ff7b00806e0..c28c855448a 100644 --- a/sbin/isakmpd/exchange.c +++ b/sbin/isakmpd/exchange.c @@ -1,4 +1,4 @@ -/* $OpenBSD: exchange.c,v 1.94 2004/05/06 10:40:34 ho Exp $ */ +/* $OpenBSD: exchange.c,v 1.95 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: exchange.c,v 1.143 2000/12/04 00:02:25 angelos Exp $ */ /* @@ -201,7 +201,7 @@ exchange_script(struct exchange *exchange) * 0 if it succeeds and the script is not finished and 1 if it's ready. */ static int -exchange_validate(struct message * msg) +exchange_validate(struct message *msg) { struct exchange *exchange = msg->exchange; int16_t *pc = exchange->exch_pc; @@ -1603,7 +1603,7 @@ exchange_free_aca_list(struct exchange *exchange) /* Obtain certificates from acceptable certification authority. */ int -exchange_add_certs(struct message * msg) +exchange_add_certs(struct message *msg) { struct exchange *exchange = msg->exchange; struct certreq_aca *aca; diff --git a/sbin/isakmpd/ike_phase_1.c b/sbin/isakmpd/ike_phase_1.c index 4670a410c28..26073877aba 100644 --- a/sbin/isakmpd/ike_phase_1.c +++ b/sbin/isakmpd/ike_phase_1.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ike_phase_1.c,v 1.47 2004/06/06 13:05:40 ho Exp $ */ +/* $OpenBSD: ike_phase_1.c,v 1.48 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: ike_phase_1.c,v 1.31 2000/12/11 23:47:56 niklas Exp $ */ /* @@ -383,7 +383,7 @@ bail_out: /* Figure out what transform the responder chose. */ int -ike_phase_1_initiator_recv_SA(struct message * msg) +ike_phase_1_initiator_recv_SA(struct message *msg) { struct exchange *exchange = msg->exchange; struct sa *sa = TAILQ_FIRST(&exchange->sa_list); @@ -427,7 +427,7 @@ ike_phase_1_initiator_recv_SA(struct message * msg) /* Send our public DH value and a nonce to the responder. */ int -ike_phase_1_initiator_send_KE_NONCE(struct message * msg) +ike_phase_1_initiator_send_KE_NONCE(struct message *msg) { struct ipsec_exch *ie = msg->exchange->data; @@ -439,7 +439,7 @@ ike_phase_1_initiator_send_KE_NONCE(struct message * msg) /* Accept responder's public DH value and nonce. */ int -ike_phase_1_initiator_recv_KE_NONCE(struct message * msg) +ike_phase_1_initiator_recv_KE_NONCE(struct message *msg) { if (ike_phase_1_recv_KE_NONCE(msg)) return -1; @@ -452,7 +452,7 @@ ike_phase_1_initiator_recv_KE_NONCE(struct message * msg) * handle. */ int -ike_phase_1_responder_recv_SA(struct message * msg) +ike_phase_1_responder_recv_SA(struct message *msg) { struct exchange *exchange = msg->exchange; struct sa *sa = TAILQ_FIRST(&exchange->sa_list); @@ -508,7 +508,7 @@ ike_phase_1_responder_recv_SA(struct message * msg) /* Reply with the transform we chose. */ int -ike_phase_1_responder_send_SA(struct message * msg) +ike_phase_1_responder_send_SA(struct message *msg) { /* Add the SA payload with the transform that was chosen. */ return message_add_sa_payload(msg); @@ -516,7 +516,7 @@ ike_phase_1_responder_send_SA(struct message * msg) /* Send our public DH value and a nonce to the peer. */ int -ike_phase_1_send_KE_NONCE(struct message * msg, size_t nonce_sz) +ike_phase_1_send_KE_NONCE(struct message *msg, size_t nonce_sz) { /* Public DH key. */ if (ipsec_gen_g_x(msg)) { @@ -538,7 +538,7 @@ ike_phase_1_send_KE_NONCE(struct message * msg, size_t nonce_sz) /* Receive our peer's public DH value and nonce. */ int -ike_phase_1_recv_KE_NONCE(struct message * msg) +ike_phase_1_recv_KE_NONCE(struct message *msg) { /* Copy out the initiator's DH public value. */ if (ipsec_save_g_x(msg)) { @@ -564,7 +564,7 @@ ike_phase_1_recv_KE_NONCE(struct message * msg) * thus speeding up exchanges. */ int -ike_phase_1_post_exchange_KE_NONCE(struct message * msg) +ike_phase_1_post_exchange_KE_NONCE(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -739,7 +739,7 @@ ike_phase_1_post_exchange_KE_NONCE(struct message * msg) } int -ike_phase_1_responder_send_ID_AUTH(struct message * msg) +ike_phase_1_responder_send_ID_AUTH(struct message *msg) { if (ike_phase_1_send_ID(msg)) return -1; @@ -748,7 +748,7 @@ ike_phase_1_responder_send_ID_AUTH(struct message * msg) } int -ike_phase_1_send_ID(struct message * msg) +ike_phase_1_send_ID(struct message *msg) { struct exchange *exchange = msg->exchange; u_int8_t *buf; @@ -842,7 +842,7 @@ ike_phase_1_send_ID(struct message * msg) } int -ike_phase_1_send_AUTH(struct message * msg) +ike_phase_1_send_AUTH(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -865,7 +865,7 @@ ike_phase_1_send_AUTH(struct message * msg) /* Receive ID and HASH and check that the exchange has been consistent. */ int -ike_phase_1_recv_ID_AUTH(struct message * msg) +ike_phase_1_recv_ID_AUTH(struct message *msg) { if (ike_phase_1_recv_ID(msg)) return -1; @@ -875,7 +875,7 @@ ike_phase_1_recv_ID_AUTH(struct message * msg) /* Receive ID. */ int -ike_phase_1_recv_ID(struct message * msg) +ike_phase_1_recv_ID(struct message *msg) { struct exchange *exchange = msg->exchange; struct payload *payload; @@ -986,7 +986,7 @@ ike_phase_1_recv_ID(struct message * msg) /* Receive HASH and check that the exchange has been consistent. */ int -ike_phase_1_recv_AUTH(struct message * msg) +ike_phase_1_recv_AUTH(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; diff --git a/sbin/isakmpd/ike_quick_mode.c b/sbin/isakmpd/ike_quick_mode.c index 768ebef3f86..52264f5e648 100644 --- a/sbin/isakmpd/ike_quick_mode.c +++ b/sbin/isakmpd/ike_quick_mode.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ike_quick_mode.c,v 1.78 2004/04/28 20:20:31 hshoexer Exp $ */ +/* $OpenBSD: ike_quick_mode.c,v 1.79 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: ike_quick_mode.c,v 1.139 2001/01/26 10:43:17 niklas Exp $ */ /* @@ -387,7 +387,7 @@ policydone: * XXX Split this huge function up and look for common code with main mode. */ static int -initiator_send_HASH_SA_NONCE(struct message * msg) +initiator_send_HASH_SA_NONCE(struct message *msg) { struct exchange *exchange = msg->exchange; struct doi *doi = exchange->doi; @@ -961,7 +961,7 @@ bail_out: /* Figure out what transform the responder chose. */ static int -initiator_recv_HASH_SA_NONCE(struct message * msg) +initiator_recv_HASH_SA_NONCE(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -1192,7 +1192,7 @@ initiator_recv_HASH_SA_NONCE(struct message * msg) } static int -initiator_send_HASH(struct message * msg) +initiator_send_HASH(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -1249,7 +1249,7 @@ initiator_send_HASH(struct message * msg) } static void -post_quick_mode(struct message * msg) +post_quick_mode(struct message *msg) { struct sa *isakmp_sa = msg->isakmp_sa; struct ipsec_sa *isa = isakmp_sa->data; @@ -1364,7 +1364,7 @@ post_quick_mode(struct message * msg) * XXX Describe in more detail. */ static int -responder_recv_HASH_SA_NONCE(struct message * msg) +responder_recv_HASH_SA_NONCE(struct message *msg) { struct payload *hashp, *kep, *idp; struct sa *sa; @@ -1659,7 +1659,7 @@ cleanup: /* Reply with the transform we chose. */ static int -responder_send_HASH_SA_NONCE(struct message * msg) +responder_send_HASH_SA_NONCE(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -1778,7 +1778,7 @@ responder_send_HASH_SA_NONCE(struct message * msg) } static void -gen_g_xy(struct message * msg) +gen_g_xy(struct message *msg) { struct exchange *exchange = msg->exchange; struct ipsec_exch *ie = exchange->data; @@ -1798,7 +1798,7 @@ gen_g_xy(struct message * msg) } static int -responder_recv_HASH(struct message * msg) +responder_recv_HASH(struct message *msg) { struct exchange *exchange = msg->exchange; struct sa *isakmp_sa = msg->isakmp_sa; diff --git a/sbin/isakmpd/ipsec.c b/sbin/isakmpd/ipsec.c index 9956787cea0..1b6f6f2d448 100644 --- a/sbin/isakmpd/ipsec.c +++ b/sbin/isakmpd/ipsec.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ipsec.c,v 1.91 2004/05/23 18:17:56 hshoexer Exp $ */ +/* $OpenBSD: ipsec.c,v 1.92 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: ipsec.c,v 1.143 2000/12/11 23:57:42 niklas Exp $ */ /* @@ -91,8 +91,8 @@ struct contact { int contact_cnt = 0, contact_limit = 0; static int addr_cmp(const void *, const void *); -static int ipsec_add_contact(struct message * msg); -static int ipsec_contacted(struct message * msg); +static int ipsec_add_contact(struct message *); +static int ipsec_contacted(struct message *); #ifdef USE_DEBUG static int ipsec_debug_attribute(u_int16_t, u_int8_t *, u_int16_t, void *); #endif @@ -230,7 +230,7 @@ ipsec_sa_check(struct sa *sa, void *v_arg) /* Find an SA with a "name" of DST, SPI & PROTO. */ struct sa * -ipsec_sa_lookup(struct sockaddr * dst, u_int32_t spi, u_int8_t proto) +ipsec_sa_lookup(struct sockaddr *dst, u_int32_t spi, u_int8_t proto) { struct dst_spi_proto_arg arg; @@ -246,7 +246,7 @@ ipsec_sa_lookup(struct sockaddr * dst, u_int32_t spi, u_int8_t proto) * XXX At some point other selectors will matter here too. */ static int -ipsec_sa_check_flow(struct sa * sa, void *v_arg) +ipsec_sa_check_flow(struct sa *sa, void *v_arg) { struct sa *sa2 = v_arg; struct ipsec_sa *isa = sa->data, *isa2 = sa2->data; @@ -689,7 +689,7 @@ ipsec_init(void) /* Given a message MSG, return a suitable IV (or rather keystate). */ static struct keystate * -ipsec_get_keystate(struct message * msg) +ipsec_get_keystate(struct message *msg) { struct keystate *ks; struct hash *hash; diff --git a/sbin/isakmpd/isakmp_cfg.c b/sbin/isakmpd/isakmp_cfg.c index df6b8f15b10..1ad29b93ee0 100644 --- a/sbin/isakmpd/isakmp_cfg.c +++ b/sbin/isakmpd/isakmp_cfg.c @@ -1,4 +1,4 @@ -/* $OpenBSD: isakmp_cfg.c,v 1.29 2004/05/23 18:17:56 hshoexer Exp $ */ +/* $OpenBSD: isakmp_cfg.c,v 1.30 2004/06/09 14:02:44 ho Exp $ */ /* * Copyright (c) 2001 Niklas Hallqvist. All rights reserved. @@ -75,7 +75,7 @@ static int cfg_responder_send_ATTR(struct message *); u_int8_t *cfg_add_hash(struct message *); int cfg_finalize_hash(struct message *, u_int8_t *, u_int8_t *, u_int16_t); -int cfg_verify_hash(struct message * msg); +int cfg_verify_hash(struct message *); /* Server: SET/ACK Client; REQ/REPLY */ int (*isakmp_cfg_initiator[]) (struct message *) = { @@ -607,7 +607,7 @@ cfg_add_hash(struct message *msg) } int -cfg_finalize_hash(struct message * msg, u_int8_t * hashp, u_int8_t * data, +cfg_finalize_hash(struct message *msg, u_int8_t *hashp, u_int8_t *data, u_int16_t length) { struct ipsec_sa *isa = msg->isakmp_sa->data; diff --git a/sbin/isakmpd/message.c b/sbin/isakmpd/message.c index f59f64bb5ad..380473f8ab4 100644 --- a/sbin/isakmpd/message.c +++ b/sbin/isakmpd/message.c @@ -1,4 +1,4 @@ -/* $OpenBSD: message.c,v 1.74 2004/06/09 12:59:36 hshoexer Exp $ */ +/* $OpenBSD: message.c,v 1.75 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: message.c,v 1.156 2000/10/10 12:36:39 provos Exp $ */ /* @@ -463,7 +463,7 @@ message_validate_cert(struct message *msg, struct payload *p) /* Validate the certificate request payload P in message MSG. */ static int -message_validate_cert_req(struct message * msg, struct payload * p) +message_validate_cert_req(struct message *msg, struct payload *p) { struct cert_handler *cert; size_t len = GET_ISAKMP_GEN_LENGTH(p->p) - ISAKMP_CERTREQ_AUTHORITY_OFF; @@ -1526,7 +1526,7 @@ struct info_args { */ void message_send_notification(struct message *msg, struct sa *isakmp_sa, - u_int16_t notify, struct proto * proto, int incoming) + u_int16_t notify, struct proto *proto, int incoming) { struct info_args args; struct sa *doi_sa = proto ? proto->sa : isakmp_sa; diff --git a/sbin/isakmpd/pf_key_v2.c b/sbin/isakmpd/pf_key_v2.c index cc243b8d05a..64ebdef954c 100644 --- a/sbin/isakmpd/pf_key_v2.c +++ b/sbin/isakmpd/pf_key_v2.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pf_key_v2.c,v 1.140 2004/04/15 18:39:26 deraadt Exp $ */ +/* $OpenBSD: pf_key_v2.c,v 1.141 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: pf_key_v2.c,v 1.79 2000/12/12 00:33:19 niklas Exp $ */ /* @@ -2260,7 +2260,7 @@ pf_key_v2_convert_id(u_int8_t * id, int idlen, size_t * reslen, int *idtype) /* Enable a flow given an SA. */ int -pf_key_v2_enable_sa(struct sa * sa, struct sa * isakmp_sa) +pf_key_v2_enable_sa(struct sa *sa, struct sa *isakmp_sa) { struct ipsec_sa *isa = sa->data; struct sockaddr *dst, *src; @@ -2462,7 +2462,7 @@ passed: /* Disable a flow given a SA. */ static int -pf_key_v2_disable_sa(struct sa * sa, int incoming) +pf_key_v2_disable_sa(struct sa *sa, int incoming) { struct ipsec_sa *isa = sa->data; struct sockaddr *dst, *src; @@ -2527,7 +2527,7 @@ pf_key_v2_disable_sa(struct sa * sa, int incoming) * of the IKE security association SA. Also delete potential flows tied to it. */ int -pf_key_v2_delete_spi(struct sa * sa, struct proto * proto, int incoming) +pf_key_v2_delete_spi(struct sa *sa, struct proto *proto, int incoming) { struct sadb_msg msg; struct sadb_sa ssa; @@ -2690,7 +2690,7 @@ cleanup: } static void -pf_key_v2_stayalive(struct exchange * exchange, void *vconn, int fail) +pf_key_v2_stayalive(struct exchange *exchange, void *vconn, int fail) { char *conn = vconn; struct sa *sa; @@ -2725,7 +2725,7 @@ pf_key_v2_connection_check(char *conn) /* Handle a PF_KEY lifetime expiration message PMSG. */ static void -pf_key_v2_expire(struct pf_key_v2_msg * pmsg) +pf_key_v2_expire(struct pf_key_v2_msg *pmsg) { struct sadb_msg *msg; struct sadb_sa *ssa; @@ -2832,7 +2832,7 @@ pf_key_v2_expire(struct pf_key_v2_msg * pmsg) /* Handle a PF_KEY SA ACQUIRE message PMSG. */ static void -pf_key_v2_acquire(struct pf_key_v2_msg * pmsg) +pf_key_v2_acquire(struct pf_key_v2_msg *pmsg) { #if defined (SADB_X_ASKPOLICY) struct sadb_msg *msg, askpolicy_msg; @@ -3830,7 +3830,7 @@ fail: } static void -pf_key_v2_notify(struct pf_key_v2_msg * msg) +pf_key_v2_notify(struct pf_key_v2_msg *msg) { switch (((struct sadb_msg *) TAILQ_FIRST(msg)->seg)->sadb_msg_type) { case SADB_EXPIRE: @@ -3880,8 +3880,8 @@ pf_key_v2_handler(int fd) * XXX Assumes OpenBSD GRPSPIS extension. Should probably be moved to sysdep.c */ int -pf_key_v2_group_spis(struct sa * sa, struct proto * proto1, - struct proto * proto2, int incoming) +pf_key_v2_group_spis(struct sa *sa, struct proto *proto1, + struct proto *proto2, int incoming) { #if defined (SADB_X_GRPSPIS) struct sadb_msg msg; diff --git a/sbin/isakmpd/transport.c b/sbin/isakmpd/transport.c index ca92f5cda48..a224435adf3 100644 --- a/sbin/isakmpd/transport.c +++ b/sbin/isakmpd/transport.c @@ -1,4 +1,4 @@ -/* $OpenBSD: transport.c,v 1.24 2004/04/15 18:39:26 deraadt Exp $ */ +/* $OpenBSD: transport.c,v 1.25 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: transport.c,v 1.43 2000/10/10 12:36:39 provos Exp $ */ /* @@ -71,7 +71,7 @@ transport_init(void) /* Register another transport T. */ void -transport_add(struct transport * t) +transport_add(struct transport *t) { LOG_DBG((LOG_TRANSPORT, 70, "transport_add: adding %p", t)); TAILQ_INIT(&t->sendq); @@ -83,7 +83,7 @@ transport_add(struct transport * t) /* Add a referer to transport T. */ void -transport_reference(struct transport * t) +transport_reference(struct transport *t) { t->refcnt++; LOG_DBG((LOG_TRANSPORT, 95, @@ -95,7 +95,7 @@ transport_reference(struct transport * t) * Remove a referer from transport T, removing all of T when no referers left. */ void -transport_release(struct transport * t) +transport_release(struct transport *t) { LOG_DBG((LOG_TRANSPORT, 95, "transport_release: transport %p had %d references", t, @@ -147,7 +147,7 @@ transport_prio_sendqs_empty(void) /* Register another transport method T. */ void -transport_method_add(struct transport_vtbl * t) +transport_method_add(struct transport_vtbl *t) { LIST_INSERT_HEAD(&transport_method_list, t, link); } diff --git a/sbin/isakmpd/udp.c b/sbin/isakmpd/udp.c index e72b64d464f..78a0d49e9b1 100644 --- a/sbin/isakmpd/udp.c +++ b/sbin/isakmpd/udp.c @@ -1,4 +1,4 @@ -/* $OpenBSD: udp.c,v 1.71 2004/05/23 18:17:56 hshoexer Exp $ */ +/* $OpenBSD: udp.c,v 1.72 2004/06/09 14:02:44 ho Exp $ */ /* $EOM: udp.c,v 1.57 2001/01/26 10:09:57 niklas Exp $ */ /* @@ -712,7 +712,7 @@ udp_fd_isset(struct transport *t, fd_set *fds) * module. */ static void -udp_handle_message(struct transport * t) +udp_handle_message(struct transport *t) { struct udp_transport *u = (struct udp_transport *) t; u_int8_t buf[UDP_SIZE]; |