------------------------------------------------------------ revno: 5219 committer: Diego Biurrun <diego@xxxxxxxxxx> branch nick: hipl timestamp: Tue 2010-11-30 11:35:59 +0100 message: vertical alignment cosmetics taken from the hipfw performance branch. modified: firewall/user_ipsec_sadb.c hipd/input.c -- lp:hipl https://code.launchpad.net/~hipl-core/hipl/trunk Your team HIPL core team is subscribed to branch lp:hipl. To unsubscribe from this branch go to https://code.launchpad.net/~hipl-core/hipl/trunk/+edit-subscription
=== modified file 'firewall/user_ipsec_sadb.c' --- firewall/user_ipsec_sadb.c 2010-10-19 03:01:28 +0000 +++ firewall/user_ipsec_sadb.c 2010-11-30 10:35:59 +0000 @@ -733,29 +733,29 @@ /** * adds or updates SA entry * - * @param direction direction of the SA - * @param spi IPsec SPI number - * @param mode ESP mode - * @param src_addr source address of outer IP header - * @param dst_addr destination address of outer IP header - * @param inner_src_addr inner source addresses for tunnel and BEET SAs - * @param inner_dst_addr inner destination addresses for tunnel and BEET SAs - * @param encap_mode encapsulation mode - * @param local_port src port for UDP encaps. ESP + * @param direction direction of the SA + * @param spi IPsec SPI number + * @param mode ESP mode + * @param src_addr source address of outer IP header + * @param dst_addr destination address of outer IP header + * @param inner_src_addr inner source addresses for tunnel and BEET SAs + * @param inner_dst_addr inner destination addresses for tunnel and BEET SAs + * @param encap_mode encapsulation mode + * @param local_port src port for UDP encaps. ESP * @param peer_port dst port for UDP encaps. ESP - * @param ealg crypto transform in use - * @param auth_key raw authentication key - * @param enc_key raw encryption key - * @param lifetime seconds until expiration + * @param ealg crypto transform in use + * @param auth_key raw authentication key + * @param enc_key raw encryption key + * @param lifetime seconds until expiration * @param esp_prot_transform mode used for securing ipsec traffic - * @param hash_item_length length of the hash item - * @param esp_num_anchors number of anchors for parallel mode - * @param esp_prot_anchors hash item anchors - * @param update notification if this is an update - * @param local_port local port - * @param peer_port peer port - * @param retransmission retransmission - * @return 0 on success, else -1 + * @param hash_item_length length of the hash item + * @param esp_num_anchors number of anchors for parallel mode + * @param esp_prot_anchors hash item anchors + * @param update notification if this is an update + * @param local_port local port + * @param peer_port peer port + * @param retransmission retransmission + * @return 0 on success, else -1 */ int hip_sadb_add(int direction, uint32_t spi, uint32_t mode, const struct in6_addr *src_addr, === modified file 'hipd/input.c' --- hipd/input.c 2010-11-30 09:48:11 +0000 +++ hipd/input.c 2010-11-30 10:35:59 +0000 @@ -1664,18 +1664,18 @@ /* Store peer's public key and HIT to HA */ HIP_IFE(hip_init_peer(ctx->hadb_entry, host_id_in_enc), -EINVAL); /* Validate signature */ - #ifdef CONFIG_HIP_PERFORMANCE +#ifdef CONFIG_HIP_PERFORMANCE HIP_DEBUG("Start PERF_VERIFY(2)\n"); hip_perf_start_benchmark(perf_set, PERF_VERIFY); - #endif +#endif HIP_IFEL(ctx->hadb_entry->verify(ctx->hadb_entry->peer_pub_key, ctx->input_msg), -EINVAL, "Verification of I2 signature failed\n"); - #ifdef CONFIG_HIP_PERFORMANCE +#ifdef CONFIG_HIP_PERFORMANCE HIP_DEBUG("Stop PERF_VERIFY(2)\n"); hip_perf_stop_benchmark(perf_set, PERF_VERIFY); - #endif +#endif if ((r1cntr = hip_get_param(ctx->input_msg, HIP_PARAM_R1_COUNTER))) { ctx->hadb_entry->birthday = r1cntr->generation;