Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
f643f785
Commit
f643f785
authored
Mar 22, 2003
by
David S. Miller
Browse files
Options
Browse Files
Download
Plain Diff
Merge nuts.ninka.net:/home/davem/src/BK/network-2.5
into nuts.ninka.net:/home/davem/src/BK/net-2.5
parents
582a045d
b07bd9cb
Changes
13
Show whitespace changes
Inline
Side-by-side
Showing
13 changed files
with
53 additions
and
6 deletions
+53
-6
crypto/aes.c
crypto/aes.c
+1
-0
crypto/api.c
crypto/api.c
+1
-0
crypto/des.c
crypto/des.c
+1
-0
crypto/digest.c
crypto/digest.c
+1
-0
crypto/serpent.c
crypto/serpent.c
+1
-0
crypto/twofish.c
crypto/twofish.c
+1
-0
include/linux/in6.h
include/linux/in6.h
+3
-0
include/net/xfrm.h
include/net/xfrm.h
+1
-0
net/ipv4/xfrm_user.c
net/ipv4/xfrm_user.c
+18
-2
net/ipv6/ipv6_sockglue.c
net/ipv6/ipv6_sockglue.c
+5
-0
net/ipv6/tcp_ipv6.c
net/ipv6/tcp_ipv6.c
+2
-2
net/key/af_key.c
net/key/af_key.c
+17
-2
net/netsyms.c
net/netsyms.c
+1
-0
No files found.
crypto/aes.c
View file @
f643f785
...
...
@@ -55,6 +55,7 @@
#include <linux/module.h>
#include <linux/init.h>
#include <linux/types.h>
#include <linux/errno.h>
#include <linux/crypto.h>
#include <asm/byteorder.h>
...
...
crypto/api.c
View file @
f643f785
...
...
@@ -15,6 +15,7 @@
*/
#include <linux/init.h>
#include <linux/crypto.h>
#include <linux/errno.h>
#include <linux/rwsem.h>
#include <linux/slab.h>
#include "internal.h"
...
...
crypto/des.c
View file @
f643f785
...
...
@@ -23,6 +23,7 @@
#include <linux/init.h>
#include <linux/module.h>
#include <linux/mm.h>
#include <linux/errno.h>
#include <asm/scatterlist.h>
#include <linux/crypto.h>
...
...
crypto/digest.c
View file @
f643f785
...
...
@@ -13,6 +13,7 @@
*/
#include <linux/crypto.h>
#include <linux/mm.h>
#include <linux/errno.h>
#include <linux/highmem.h>
#include <asm/scatterlist.h>
#include "internal.h"
...
...
crypto/serpent.c
View file @
f643f785
...
...
@@ -13,6 +13,7 @@
#include <linux/init.h>
#include <linux/module.h>
#include <linux/errno.h>
#include <asm/byteorder.h>
#include <linux/crypto.h>
...
...
crypto/twofish.c
View file @
f643f785
...
...
@@ -40,6 +40,7 @@
#include <linux/module.h>
#include <linux/init.h>
#include <linux/types.h>
#include <linux/errno.h>
#include <linux/crypto.h>
...
...
include/linux/in6.h
View file @
f643f785
...
...
@@ -180,5 +180,8 @@ struct in6_flowlabel_req
#define IPV6_FLOWLABEL_MGR 32
#define IPV6_FLOWINFO_SEND 33
#define IPV6_IPSEC_POLICY 34
#define IPV6_XFRM_POLICY 35
#endif
include/net/xfrm.h
View file @
f643f785
...
...
@@ -10,6 +10,7 @@
#include <linux/pfkeyv2.h>
#include <linux/in6.h>
#include <net/sock.h>
#include <net/dst.h>
#include <net/route.h>
#include <net/ip6_fib.h>
...
...
net/ipv4/xfrm_user.c
View file @
f643f785
...
...
@@ -1086,10 +1086,26 @@ struct xfrm_policy *xfrm_compile_policy(u16 family, int opt,
struct
xfrm_policy
*
xp
;
int
nr
;
switch
(
family
)
{
case
AF_INET
:
if
(
opt
!=
IP_XFRM_POLICY
)
{
*
dir
=
-
EOPNOTSUPP
;
return
NULL
;
}
break
;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case
AF_INET6
:
if
(
opt
!=
IPV6_XFRM_POLICY
)
{
*
dir
=
-
EOPNOTSUPP
;
return
NULL
;
}
break
;
#endif
default:
*
dir
=
-
EINVAL
;
return
NULL
;
}
*
dir
=
-
EINVAL
;
if
(
len
<
sizeof
(
*
p
)
||
...
...
net/ipv6/ipv6_sockglue.c
View file @
f643f785
...
...
@@ -47,6 +47,7 @@
#include <net/inet_common.h>
#include <net/tcp.h>
#include <net/udp.h>
#include <net/xfrm.h>
#include <asm/uaccess.h>
...
...
@@ -404,6 +405,10 @@ int ipv6_setsockopt(struct sock *sk, int level, int optname, char *optval,
case
IPV6_FLOWLABEL_MGR
:
retv
=
ipv6_flowlabel_opt
(
sk
,
optval
,
optlen
);
break
;
case
IPV6_IPSEC_POLICY
:
case
IPV6_XFRM_POLICY
:
retv
=
xfrm_user_policy
(
sk
,
optname
,
optval
,
optlen
);
break
;
#ifdef CONFIG_NETFILTER
default:
...
...
net/ipv6/tcp_ipv6.c
View file @
f643f785
...
...
@@ -967,7 +967,7 @@ static void tcp_v6_send_check(struct sock *sk, struct tcphdr *th, int len,
struct
ipv6_pinfo
*
np
=
inet6_sk
(
sk
);
if
(
skb
->
ip_summed
==
CHECKSUM_HW
)
{
th
->
check
=
csum_ipv6_magic
(
&
np
->
saddr
,
&
np
->
daddr
,
len
,
IPPROTO_TCP
,
0
);
th
->
check
=
~
csum_ipv6_magic
(
&
np
->
saddr
,
&
np
->
daddr
,
len
,
IPPROTO_TCP
,
0
);
skb
->
csum
=
offsetof
(
struct
tcphdr
,
check
);
}
else
{
th
->
check
=
csum_ipv6_magic
(
&
np
->
saddr
,
&
np
->
daddr
,
len
,
IPPROTO_TCP
,
...
...
@@ -1642,7 +1642,7 @@ static int tcp_v6_rcv(struct sk_buff *skb)
goto
discard_and_relse
;
if
(
!
xfrm6_policy_check
(
sk
,
XFRM_POLICY_IN
,
skb
))
goto
discard_
it
;
goto
discard_
and_relse
;
skb
->
dev
=
NULL
;
...
...
net/key/af_key.c
View file @
f643f785
...
...
@@ -2416,10 +2416,25 @@ static struct xfrm_policy *pfkey_compile_policy(u16 family, int opt,
struct
xfrm_policy
*
xp
;
struct
sadb_x_policy
*
pol
=
(
struct
sadb_x_policy
*
)
data
;
switch
(
family
)
{
case
AF_INET
:
if
(
opt
!=
IP_IPSEC_POLICY
)
{
*
dir
=
-
EOPNOTSUPP
;
return
NULL
;
}
break
;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case
AF_INET6
:
if
(
opt
!=
IPV6_IPSEC_POLICY
)
{
*
dir
=
-
EOPNOTSUPP
;
return
NULL
;
}
break
;
#endif
default:
*
dir
=
-
EINVAL
;
return
NULL
;
}
*
dir
=
-
EINVAL
;
...
...
net/netsyms.c
View file @
f643f785
...
...
@@ -292,6 +292,7 @@ extern int (*dlci_ioctl_hook)(unsigned int, void *);
EXPORT_SYMBOL
(
dlci_ioctl_hook
);
#endif
EXPORT_SYMBOL
(
xfrm_user_policy
);
EXPORT_SYMBOL
(
km_waitq
);
EXPORT_SYMBOL
(
xfrm_cfg_sem
);
EXPORT_SYMBOL
(
xfrm_policy_alloc
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment