Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
b55ee909
Commit
b55ee909
authored
Jun 19, 2004
by
Hideaki Yoshifuji
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[XFRM] fix dependency issues for CONFIG_IPV6=m.
parent
0d51db7b
Changes
11
Hide whitespace changes
Inline
Side-by-side
Showing
11 changed files
with
51 additions
and
64 deletions
+51
-64
include/net/xfrm.h
include/net/xfrm.h
+1
-1
net/ipv4/ah4.c
net/ipv4/ah4.c
+4
-1
net/ipv4/esp4.c
net/ipv4/esp4.c
+9
-4
net/ipv4/ipcomp.c
net/ipv4/ipcomp.c
+7
-3
net/ipv6/ah6.c
net/ipv6/ah6.c
+5
-1
net/ipv6/esp6.c
net/ipv6/esp6.c
+8
-5
net/ipv6/ipcomp6.c
net/ipv6/ipcomp6.c
+5
-1
net/xfrm/Makefile
net/xfrm/Makefile
+1
-1
net/xfrm/xfrm_export.c
net/xfrm/xfrm_export.c
+1
-1
net/xfrm/xfrm_output.c
net/xfrm/xfrm_output.c
+0
-46
net/xfrm/xfrm_state.c
net/xfrm/xfrm_state.c
+10
-0
No files found.
include/net/xfrm.h
View file @
b55ee909
...
@@ -816,7 +816,7 @@ extern void xfrm_state_flush(u8 proto);
...
@@ -816,7 +816,7 @@ extern void xfrm_state_flush(u8 proto);
extern
int
xfrm_replay_check
(
struct
xfrm_state
*
x
,
u32
seq
);
extern
int
xfrm_replay_check
(
struct
xfrm_state
*
x
,
u32
seq
);
extern
void
xfrm_replay_advance
(
struct
xfrm_state
*
x
,
u32
seq
);
extern
void
xfrm_replay_advance
(
struct
xfrm_state
*
x
,
u32
seq
);
extern
int
xfrm_check_selectors
(
struct
xfrm_state
**
x
,
int
n
,
struct
flowi
*
fl
);
extern
int
xfrm_check_selectors
(
struct
xfrm_state
**
x
,
int
n
,
struct
flowi
*
fl
);
extern
int
xfrm_
check_output
(
struct
xfrm_state
*
x
,
struct
sk_buff
*
skb
,
unsigned
short
family
);
extern
int
xfrm_
state_check
(
struct
xfrm_state
*
x
,
struct
sk_buff
*
skb
);
extern
int
xfrm4_rcv
(
struct
sk_buff
*
skb
);
extern
int
xfrm4_rcv
(
struct
sk_buff
*
skb
);
extern
int
xfrm4_tunnel_register
(
struct
xfrm_tunnel
*
handler
);
extern
int
xfrm4_tunnel_register
(
struct
xfrm_tunnel
*
handler
);
extern
int
xfrm4_tunnel_deregister
(
struct
xfrm_tunnel
*
handler
);
extern
int
xfrm4_tunnel_deregister
(
struct
xfrm_tunnel
*
handler
);
...
...
net/ipv4/ah4.c
View file @
b55ee909
...
@@ -74,12 +74,15 @@ static int ah_output(struct sk_buff **pskb)
...
@@ -74,12 +74,15 @@ static int ah_output(struct sk_buff **pskb)
}
}
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
iph
=
(
*
pskb
)
->
nh
.
iph
;
iph
=
(
*
pskb
)
->
nh
.
iph
;
if
(
x
->
props
.
mode
)
{
if
(
x
->
props
.
mode
)
{
err
=
xfrm4_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
top_iph
=
(
struct
iphdr
*
)
skb_push
(
*
pskb
,
x
->
props
.
header_len
);
top_iph
=
(
struct
iphdr
*
)
skb_push
(
*
pskb
,
x
->
props
.
header_len
);
top_iph
->
ihl
=
5
;
top_iph
->
ihl
=
5
;
top_iph
->
version
=
4
;
top_iph
->
version
=
4
;
...
...
net/ipv4/esp4.c
View file @
b55ee909
...
@@ -49,19 +49,24 @@ int esp_output(struct sk_buff **pskb)
...
@@ -49,19 +49,24 @@ int esp_output(struct sk_buff **pskb)
}
}
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
err
=
-
ENOMEM
;
/* Strip IP header in transport mode. Save it. */
if
(
x
->
props
.
mode
)
{
if
(
!
x
->
props
.
mode
)
{
err
=
xfrm4_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
}
else
{
/* Strip IP header in transport mode. Save it. */
iph
=
(
*
pskb
)
->
nh
.
iph
;
iph
=
(
*
pskb
)
->
nh
.
iph
;
memcpy
(
&
tmp_iph
,
iph
,
iph
->
ihl
*
4
);
memcpy
(
&
tmp_iph
,
iph
,
iph
->
ihl
*
4
);
__skb_pull
(
*
pskb
,
iph
->
ihl
*
4
);
__skb_pull
(
*
pskb
,
iph
->
ihl
*
4
);
}
}
/* Now skb is pure payload to encrypt */
/* Now skb is pure payload to encrypt */
err
=
-
ENOMEM
;
/* Round to block size */
/* Round to block size */
clen
=
(
*
pskb
)
->
len
;
clen
=
(
*
pskb
)
->
len
;
...
...
net/ipv4/ipcomp.c
View file @
b55ee909
...
@@ -164,12 +164,16 @@ static int ipcomp_output(struct sk_buff **pskb)
...
@@ -164,12 +164,16 @@ static int ipcomp_output(struct sk_buff **pskb)
}
}
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
/* Don't bother compressing */
if
(
x
->
props
.
mode
)
{
if
(
!
x
->
props
.
mode
)
{
err
=
xfrm4_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
}
else
{
/* Don't bother compressing */
iph
=
(
*
pskb
)
->
nh
.
iph
;
iph
=
(
*
pskb
)
->
nh
.
iph
;
hdr_len
=
iph
->
ihl
*
4
;
hdr_len
=
iph
->
ihl
*
4
;
}
}
...
...
net/ipv6/ah6.c
View file @
b55ee909
...
@@ -163,11 +163,15 @@ int ah6_output(struct sk_buff **pskb)
...
@@ -163,11 +163,15 @@ int ah6_output(struct sk_buff **pskb)
}
}
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET6
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
if
(
x
->
props
.
mode
)
{
if
(
x
->
props
.
mode
)
{
err
=
xfrm6_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
iph
=
(
*
pskb
)
->
nh
.
ipv6h
;
iph
=
(
*
pskb
)
->
nh
.
ipv6h
;
(
*
pskb
)
->
nh
.
ipv6h
=
(
struct
ipv6hdr
*
)
skb_push
(
*
pskb
,
x
->
props
.
header_len
);
(
*
pskb
)
->
nh
.
ipv6h
=
(
struct
ipv6hdr
*
)
skb_push
(
*
pskb
,
x
->
props
.
header_len
);
(
*
pskb
)
->
nh
.
ipv6h
->
version
=
6
;
(
*
pskb
)
->
nh
.
ipv6h
->
version
=
6
;
...
...
net/ipv6/esp6.c
View file @
b55ee909
...
@@ -65,14 +65,16 @@ int esp6_output(struct sk_buff **pskb)
...
@@ -65,14 +65,16 @@ int esp6_output(struct sk_buff **pskb)
}
}
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET6
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
err
=
-
ENOMEM
;
/* Strip IP header in transport mode. Save it. */
if
(
!
x
->
props
.
mode
)
{
if
(
x
->
props
.
mode
)
{
err
=
xfrm6_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
}
else
{
/* Strip IP header in transport mode. Save it. */
hdr_len
=
ip6_find_1stfragopt
(
*
pskb
,
&
prevhdr
);
hdr_len
=
ip6_find_1stfragopt
(
*
pskb
,
&
prevhdr
);
nexthdr
=
*
prevhdr
;
nexthdr
=
*
prevhdr
;
*
prevhdr
=
IPPROTO_ESP
;
*
prevhdr
=
IPPROTO_ESP
;
...
@@ -86,6 +88,7 @@ int esp6_output(struct sk_buff **pskb)
...
@@ -86,6 +88,7 @@ int esp6_output(struct sk_buff **pskb)
}
}
/* Now skb is pure payload to encrypt */
/* Now skb is pure payload to encrypt */
err
=
-
ENOMEM
;
/* Round to block size */
/* Round to block size */
clen
=
(
*
pskb
)
->
len
;
clen
=
(
*
pskb
)
->
len
;
...
...
net/ipv6/ipcomp6.c
View file @
b55ee909
...
@@ -140,11 +140,15 @@ static int ipcomp6_output(struct sk_buff **pskb)
...
@@ -140,11 +140,15 @@ static int ipcomp6_output(struct sk_buff **pskb)
spin_lock_bh
(
&
x
->
lock
);
spin_lock_bh
(
&
x
->
lock
);
err
=
xfrm_
check_output
(
x
,
*
pskb
,
AF_INET6
);
err
=
xfrm_
state_check
(
x
,
*
pskb
);
if
(
err
)
if
(
err
)
goto
error
;
goto
error
;
if
(
x
->
props
.
mode
)
{
if
(
x
->
props
.
mode
)
{
err
=
xfrm6_tunnel_check_size
(
*
pskb
);
if
(
err
)
goto
error
;
hdr_len
=
sizeof
(
struct
ipv6hdr
);
hdr_len
=
sizeof
(
struct
ipv6hdr
);
nexthdr
=
IPPROTO_IPV6
;
nexthdr
=
IPPROTO_IPV6
;
iph
=
(
*
pskb
)
->
nh
.
ipv6h
;
iph
=
(
*
pskb
)
->
nh
.
ipv6h
;
...
...
net/xfrm/Makefile
View file @
b55ee909
...
@@ -2,7 +2,7 @@
...
@@ -2,7 +2,7 @@
# Makefile for the XFRM subsystem.
# Makefile for the XFRM subsystem.
#
#
obj-$(CONFIG_XFRM)
:=
xfrm_policy.o xfrm_state.o xfrm_input.o xfrm_algo.o
xfrm_output.o
\
obj-$(CONFIG_XFRM)
:=
xfrm_policy.o xfrm_state.o xfrm_input.o xfrm_algo.o
\
xfrm_export.o
xfrm_export.o
obj-$(CONFIG_XFRM_USER)
+=
xfrm_user.o
obj-$(CONFIG_XFRM_USER)
+=
xfrm_user.o
net/xfrm/xfrm_export.c
View file @
b55ee909
...
@@ -18,6 +18,7 @@ EXPORT_SYMBOL(xfrm_state_add);
...
@@ -18,6 +18,7 @@ EXPORT_SYMBOL(xfrm_state_add);
EXPORT_SYMBOL
(
xfrm_state_update
);
EXPORT_SYMBOL
(
xfrm_state_update
);
EXPORT_SYMBOL
(
xfrm_state_check_expire
);
EXPORT_SYMBOL
(
xfrm_state_check_expire
);
EXPORT_SYMBOL
(
xfrm_state_check_space
);
EXPORT_SYMBOL
(
xfrm_state_check_space
);
EXPORT_SYMBOL
(
xfrm_state_check
);
EXPORT_SYMBOL
(
xfrm_state_lookup
);
EXPORT_SYMBOL
(
xfrm_state_lookup
);
EXPORT_SYMBOL
(
xfrm_state_register_afinfo
);
EXPORT_SYMBOL
(
xfrm_state_register_afinfo
);
EXPORT_SYMBOL
(
xfrm_state_unregister_afinfo
);
EXPORT_SYMBOL
(
xfrm_state_unregister_afinfo
);
...
@@ -27,7 +28,6 @@ EXPORT_SYMBOL(xfrm_state_delete_tunnel);
...
@@ -27,7 +28,6 @@ EXPORT_SYMBOL(xfrm_state_delete_tunnel);
EXPORT_SYMBOL
(
xfrm_replay_check
);
EXPORT_SYMBOL
(
xfrm_replay_check
);
EXPORT_SYMBOL
(
xfrm_replay_advance
);
EXPORT_SYMBOL
(
xfrm_replay_advance
);
EXPORT_SYMBOL
(
xfrm_check_selectors
);
EXPORT_SYMBOL
(
xfrm_check_selectors
);
EXPORT_SYMBOL
(
xfrm_check_output
);
EXPORT_SYMBOL
(
__secpath_destroy
);
EXPORT_SYMBOL
(
__secpath_destroy
);
EXPORT_SYMBOL
(
secpath_dup
);
EXPORT_SYMBOL
(
secpath_dup
);
EXPORT_SYMBOL
(
xfrm_get_acqseq
);
EXPORT_SYMBOL
(
xfrm_get_acqseq
);
...
...
net/xfrm/xfrm_output.c
deleted
100644 → 0
View file @
0d51db7b
/*
* generic xfrm output routines
*
* Copyright (c) 2003 James Morris <jmorris@intercode.com.au>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*/
#include <linux/config.h>
#include <linux/kernel.h>
#include <linux/skbuff.h>
#include <net/xfrm.h>
int
xfrm_check_output
(
struct
xfrm_state
*
x
,
struct
sk_buff
*
skb
,
unsigned
short
family
)
{
int
err
;
err
=
xfrm_state_check_expire
(
x
);
if
(
err
)
goto
out
;
if
(
x
->
props
.
mode
)
{
switch
(
family
)
{
case
AF_INET
:
err
=
xfrm4_tunnel_check_size
(
skb
);
break
;
case
AF_INET6
:
err
=
xfrm6_tunnel_check_size
(
skb
);
break
;
default:
err
=
-
EINVAL
;
}
if
(
err
)
goto
out
;
}
err
=
xfrm_state_check_space
(
x
,
skb
);
out:
return
err
;
}
net/xfrm/xfrm_state.c
View file @
b55ee909
...
@@ -531,6 +531,16 @@ int xfrm_state_check_space(struct xfrm_state *x, struct sk_buff *skb)
...
@@ -531,6 +531,16 @@ int xfrm_state_check_space(struct xfrm_state *x, struct sk_buff *skb)
return
0
;
return
0
;
}
}
int
xfrm_state_check
(
struct
xfrm_state
*
x
,
struct
sk_buff
*
skb
)
{
int
err
=
xfrm_state_check_expire
(
x
);
if
(
err
<
0
)
goto
err
;
err
=
xfrm_state_check_space
(
x
,
skb
);
err:
return
err
;
}
struct
xfrm_state
*
struct
xfrm_state
*
xfrm_state_lookup
(
xfrm_address_t
*
daddr
,
u32
spi
,
u8
proto
,
xfrm_state_lookup
(
xfrm_address_t
*
daddr
,
u32
spi
,
u8
proto
,
unsigned
short
family
)
unsigned
short
family
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment