Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-1-5]: src/sys/netinet6 pullup 1.13 -> 1.15 (approved by releng-1-5)



details:   https://anonhg.NetBSD.org/src/rev/7028c0ecf07e
branches:  netbsd-1-5
changeset: 488550:7028c0ecf07e
user:      itojun <itojun%NetBSD.org@localhost>
date:      Mon Jul 17 02:42:12 2000 +0000

description:
pullup 1.13 -> 1.15 (approved by releng-1-5)

1.14 -> 1.15
s/IPSEC_IPV6FWD/IPSEC/.  this should correct strange behavior on ipv6
forwarding (even if policy asks for tunnel mode encryption, packets
go out in clear).  sync with kame.

1.13 -> 1.14
date: 2000/07/06 12:51:41;  author: itojun;  state: Exp;  lines: +2 -3
remove unnecessary #include <netkey/key_debug.h>.  from kame.

diffstat:

 sys/netinet6/ip6_forward.c |  25 +++++++++++++------------
 1 files changed, 13 insertions(+), 12 deletions(-)

diffs (93 lines):

diff -r 2320c582de28 -r 7028c0ecf07e sys/netinet6/ip6_forward.c
--- a/sys/netinet6/ip6_forward.c        Mon Jul 17 02:38:40 2000 +0000
+++ b/sys/netinet6/ip6_forward.c        Mon Jul 17 02:42:12 2000 +0000
@@ -1,5 +1,5 @@
-/*     $NetBSD: ip6_forward.c,v 1.12.2.1 2000/07/01 00:15:22 itojun Exp $      */
-/*     $KAME: ip6_forward.c,v 1.38 2000/06/22 21:02:05 itojun Exp $    */
+/*     $NetBSD: ip6_forward.c,v 1.12.2.2 2000/07/17 02:42:12 itojun Exp $      */
+/*     $KAME: ip6_forward.c,v 1.43 2000/07/16 07:50:49 itojun Exp $    */
 
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@@ -30,6 +30,8 @@
  * SUCH DAMAGE.
  */
 
+#include "opt_ipsec.h"
+
 #include <sys/param.h>
 #include <sys/systm.h>
 #include <sys/malloc.h>
@@ -53,11 +55,10 @@
 #include <netinet/icmp6.h>
 #include <netinet6/nd6.h>
 
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
 #include <netinet6/ipsec.h>
 #include <netkey/key.h>
-#include <netkey/key_debug.h>
-#endif /* IPSEC_IPV6FWD */
+#endif /* IPSEC */
 
 #ifdef IPV6FIREWALL
 #include <netinet6/ip6_fw.h>
@@ -91,12 +92,12 @@
        int error, type = 0, code = 0;
        struct mbuf *mcopy = NULL;
        struct ifnet *origifp;  /* maybe unnecessary */
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
        struct secpolicy *sp = NULL;
 #endif
        long time_second = time.tv_sec;
 
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
        /*
         * Check AH/ESP integrity.
         */
@@ -109,7 +110,7 @@
                m_freem(m);
                return;
        }
-#endif /*IPSEC_IPV6FWD*/
+#endif /*IPSEC*/
 
        if ((m->m_flags & (M_BCAST|M_MCAST)) != 0 ||
            IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
@@ -148,7 +149,7 @@
         */
        mcopy = m_copy(m, 0, imin(m->m_pkthdr.len, ICMPV6_PLD_MAXLEN));
 
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
        /* get a security policy for this packet */
        sp = ipsec6_getpolicybyaddr(m, IPSEC_DIR_OUTBOUND, 0, &error);
        if (sp == NULL) {
@@ -273,7 +274,7 @@
        }
     }
     skip_ipsec:
-#endif /* IPSEC_IPV6FWD */
+#endif /* IPSEC */
 
        dst = &ip6_forward_rt.ro_dst;
        if (!srcrt) {
@@ -359,14 +360,14 @@
                in6_ifstat_inc(rt->rt_ifp, ifs6_in_toobig);
                if (mcopy) {
                        u_long mtu;
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
                        struct secpolicy *sp;
                        int ipsecerror;
                        size_t ipsechdrsiz;
 #endif
 
                        mtu = rt->rt_ifp->if_mtu;
-#ifdef IPSEC_IPV6FWD
+#ifdef IPSEC
                        /*
                         * When we do IPsec tunnel ingress, we need to play
                         * with if_mtu value (decrement IPsec header size



Home | Main Index | Thread Index | Old Index