Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
2447b42b
Commit
2447b42b
authored
Feb 12, 2003
by
Kunihiro Ishiguro
Committed by
David S. Miller
Feb 12, 2003
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[IPSEC]: Add ipv6 support infrastructure.
parent
26ddadee
Changes
7
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
625 additions
and
127 deletions
+625
-127
include/net/xfrm.h
include/net/xfrm.h
+20
-0
net/ipv4/xfrm_state.c
net/ipv4/xfrm_state.c
+142
-6
net/ipv6/Makefile
net/ipv6/Makefile
+2
-0
net/ipv6/ipv6_syms.c
net/ipv6/ipv6_syms.c
+3
-0
net/ipv6/xfrm_policy.c
net/ipv6/xfrm_policy.c
+43
-0
net/key/af_key.c
net/key/af_key.c
+410
-121
net/netsyms.c
net/netsyms.c
+5
-0
No files found.
include/net/xfrm.h
View file @
2447b42b
...
@@ -8,6 +8,7 @@
...
@@ -8,6 +8,7 @@
#include <linux/netdevice.h>
#include <linux/netdevice.h>
#include <linux/crypto.h>
#include <linux/crypto.h>
#include <linux/pfkeyv2.h>
#include <linux/pfkeyv2.h>
#include <linux/in6.h>
#include <net/dst.h>
#include <net/dst.h>
#include <net/route.h>
#include <net/route.h>
...
@@ -424,4 +425,23 @@ extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id);
...
@@ -424,4 +425,23 @@ extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id);
extern
struct
xfrm_algo_desc
*
xfrm_aalg_get_byname
(
char
*
name
);
extern
struct
xfrm_algo_desc
*
xfrm_aalg_get_byname
(
char
*
name
);
extern
struct
xfrm_algo_desc
*
xfrm_ealg_get_byname
(
char
*
name
);
extern
struct
xfrm_algo_desc
*
xfrm_ealg_get_byname
(
char
*
name
);
static
inline
int
xfrm6_selector_match
(
struct
xfrm_selector
*
sel
,
struct
flowi
*
fl
)
{
return
!
memcmp
(
fl
->
fl6_dst
,
sel
->
daddr
.
a6
,
sizeof
(
struct
in6_addr
))
&&
!
((
fl
->
uli_u
.
ports
.
dport
^
sel
->
dport
)
&
sel
->
dport_mask
)
&&
!
((
fl
->
uli_u
.
ports
.
sport
^
sel
->
sport
)
&
sel
->
sport_mask
)
&&
(
fl
->
proto
==
sel
->
proto
||
!
sel
->
proto
)
&&
(
fl
->
oif
==
sel
->
ifindex
||
!
sel
->
ifindex
)
&&
!
memcmp
(
fl
->
fl6_src
,
sel
->
saddr
.
a6
,
sizeof
(
struct
in6_addr
));
}
extern
int
xfrm6_register_type
(
struct
xfrm_type
*
type
);
extern
int
xfrm6_unregister_type
(
struct
xfrm_type
*
type
);
extern
struct
xfrm_type
*
xfrm6_get_type
(
u8
proto
);
extern
struct
xfrm_state
*
xfrm6_state_lookup
(
struct
in6_addr
*
daddr
,
u32
spi
,
u8
proto
);
struct
xfrm_state
*
xfrm6_find_acq
(
u8
mode
,
u16
reqid
,
u8
proto
,
struct
in6_addr
*
daddr
,
struct
in6_addr
*
saddr
,
int
create
);
void
xfrm6_alloc_spi
(
struct
xfrm_state
*
x
,
u32
minspi
,
u32
maxspi
);
#endif
/* _NET_XFRM_H */
#endif
/* _NET_XFRM_H */
net/ipv4/xfrm_state.c
View file @
2447b42b
#include <net/xfrm.h>
#include <net/xfrm.h>
#include <linux/pfkeyv2.h>
#include <linux/pfkeyv2.h>
#include <linux/ipsec.h>
#include <linux/ipsec.h>
#include <net/ipv6.h>
/* Each xfrm_state may be linked to two tables:
/* Each xfrm_state may be linked to two tables:
...
@@ -219,7 +220,8 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
...
@@ -219,7 +220,8 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
spin_lock_bh
(
&
xfrm_state_lock
);
spin_lock_bh
(
&
xfrm_state_lock
);
list_for_each_entry
(
x
,
xfrm_state_bydst
+
h
,
bydst
)
{
list_for_each_entry
(
x
,
xfrm_state_bydst
+
h
,
bydst
)
{
if
(
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
if
(
x
->
props
.
family
==
AF_INET
&&
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
x
->
props
.
reqid
==
tmpl
->
reqid
&&
x
->
props
.
reqid
==
tmpl
->
reqid
&&
(
saddr
==
x
->
props
.
saddr
.
xfrm4_addr
||
!
saddr
||
!
x
->
props
.
saddr
.
xfrm4_addr
)
&&
(
saddr
==
x
->
props
.
saddr
.
xfrm4_addr
||
!
saddr
||
!
x
->
props
.
saddr
.
xfrm4_addr
)
&&
tmpl
->
mode
==
x
->
props
.
mode
&&
tmpl
->
mode
==
x
->
props
.
mode
&&
...
@@ -282,6 +284,7 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
...
@@ -282,6 +284,7 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
x
->
id
=
tmpl
->
id
;
x
->
id
=
tmpl
->
id
;
if
(
x
->
id
.
daddr
.
xfrm4_addr
==
0
)
if
(
x
->
id
.
daddr
.
xfrm4_addr
==
0
)
x
->
id
.
daddr
.
xfrm4_addr
=
daddr
;
x
->
id
.
daddr
.
xfrm4_addr
=
daddr
;
x
->
props
.
family
=
AF_INET
;
x
->
props
.
saddr
=
tmpl
->
saddr
;
x
->
props
.
saddr
=
tmpl
->
saddr
;
if
(
x
->
props
.
saddr
.
xfrm4_addr
==
0
)
if
(
x
->
props
.
saddr
.
xfrm4_addr
==
0
)
x
->
props
.
saddr
.
xfrm4_addr
=
saddr
;
x
->
props
.
saddr
.
xfrm4_addr
=
saddr
;
...
@@ -317,7 +320,12 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
...
@@ -317,7 +320,12 @@ xfrm_state_find(u32 daddr, u32 saddr, struct flowi *fl, struct xfrm_tmpl *tmpl,
void
xfrm_state_insert
(
struct
xfrm_state
*
x
)
void
xfrm_state_insert
(
struct
xfrm_state
*
x
)
{
{
unsigned
h
=
ntohl
(
x
->
id
.
daddr
.
xfrm4_addr
);
unsigned
h
=
0
;
if
(
x
->
props
.
family
==
AF_INET
)
h
=
ntohl
(
x
->
id
.
daddr
.
xfrm4_addr
);
else
if
(
x
->
props
.
family
==
AF_INET6
)
h
=
ntohl
(
x
->
id
.
daddr
.
a6
[
2
]
^
x
->
id
.
daddr
.
a6
[
3
]);
h
=
(
h
^
(
h
>>
16
))
%
XFRM_DST_HSIZE
;
h
=
(
h
^
(
h
>>
16
))
%
XFRM_DST_HSIZE
;
...
@@ -325,7 +333,10 @@ void xfrm_state_insert(struct xfrm_state *x)
...
@@ -325,7 +333,10 @@ void xfrm_state_insert(struct xfrm_state *x)
list_add
(
&
x
->
bydst
,
xfrm_state_bydst
+
h
);
list_add
(
&
x
->
bydst
,
xfrm_state_bydst
+
h
);
atomic_inc
(
&
x
->
refcnt
);
atomic_inc
(
&
x
->
refcnt
);
h
=
ntohl
(
x
->
id
.
daddr
.
xfrm4_addr
^
x
->
id
.
spi
^
x
->
id
.
proto
);
if
(
x
->
props
.
family
==
AF_INET
)
h
=
ntohl
(
x
->
id
.
daddr
.
xfrm4_addr
^
x
->
id
.
spi
^
x
->
id
.
proto
);
else
h
=
ntohl
(
x
->
id
.
daddr
.
a6
[
2
]
^
x
->
id
.
daddr
.
a6
[
3
]
^
x
->
id
.
spi
^
x
->
id
.
proto
);
h
=
(
h
^
(
h
>>
10
)
^
(
h
>>
20
))
%
XFRM_DST_HSIZE
;
h
=
(
h
^
(
h
>>
10
)
^
(
h
>>
20
))
%
XFRM_DST_HSIZE
;
list_add
(
&
x
->
byspi
,
xfrm_state_byspi
+
h
);
list_add
(
&
x
->
byspi
,
xfrm_state_byspi
+
h
);
atomic_inc
(
&
x
->
refcnt
);
atomic_inc
(
&
x
->
refcnt
);
...
@@ -382,7 +393,8 @@ xfrm_state_lookup(u32 daddr, u32 spi, u8 proto)
...
@@ -382,7 +393,8 @@ xfrm_state_lookup(u32 daddr, u32 spi, u8 proto)
spin_lock_bh
(
&
xfrm_state_lock
);
spin_lock_bh
(
&
xfrm_state_lock
);
list_for_each_entry
(
x
,
xfrm_state_byspi
+
h
,
byspi
)
{
list_for_each_entry
(
x
,
xfrm_state_byspi
+
h
,
byspi
)
{
if
(
spi
==
x
->
id
.
spi
&&
if
(
x
->
props
.
family
==
AF_INET
&&
spi
==
x
->
id
.
spi
&&
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
proto
==
x
->
id
.
proto
)
{
proto
==
x
->
id
.
proto
)
{
atomic_inc
(
&
x
->
refcnt
);
atomic_inc
(
&
x
->
refcnt
);
...
@@ -405,7 +417,8 @@ xfrm_find_acq(u8 mode, u16 reqid, u8 proto, u32 daddr, u32 saddr, int create)
...
@@ -405,7 +417,8 @@ xfrm_find_acq(u8 mode, u16 reqid, u8 proto, u32 daddr, u32 saddr, int create)
spin_lock_bh
(
&
xfrm_state_lock
);
spin_lock_bh
(
&
xfrm_state_lock
);
list_for_each_entry
(
x
,
xfrm_state_bydst
+
h
,
bydst
)
{
list_for_each_entry
(
x
,
xfrm_state_bydst
+
h
,
bydst
)
{
if
(
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
if
(
x
->
props
.
family
==
AF_INET
&&
daddr
==
x
->
id
.
daddr
.
xfrm4_addr
&&
mode
==
x
->
props
.
mode
&&
mode
==
x
->
props
.
mode
&&
proto
==
x
->
id
.
proto
&&
proto
==
x
->
id
.
proto
&&
saddr
==
x
->
props
.
saddr
.
xfrm4_addr
&&
saddr
==
x
->
props
.
saddr
.
xfrm4_addr
&&
...
@@ -432,6 +445,7 @@ xfrm_find_acq(u8 mode, u16 reqid, u8 proto, u32 daddr, u32 saddr, int create)
...
@@ -432,6 +445,7 @@ xfrm_find_acq(u8 mode, u16 reqid, u8 proto, u32 daddr, u32 saddr, int create)
x0
->
km
.
state
=
XFRM_STATE_ACQ
;
x0
->
km
.
state
=
XFRM_STATE_ACQ
;
x0
->
id
.
daddr
.
xfrm4_addr
=
daddr
;
x0
->
id
.
daddr
.
xfrm4_addr
=
daddr
;
x0
->
id
.
proto
=
proto
;
x0
->
id
.
proto
=
proto
;
x0
->
props
.
family
=
AF_INET
;
x0
->
props
.
mode
=
mode
;
x0
->
props
.
mode
=
mode
;
x0
->
props
.
reqid
=
reqid
;
x0
->
props
.
reqid
=
reqid
;
x0
->
lft
.
hard_add_expires_seconds
=
ACQ_EXPIRES
;
x0
->
lft
.
hard_add_expires_seconds
=
ACQ_EXPIRES
;
...
@@ -591,8 +605,14 @@ int xfrm_check_selectors(struct xfrm_state **x, int n, struct flowi *fl)
...
@@ -591,8 +605,14 @@ int xfrm_check_selectors(struct xfrm_state **x, int n, struct flowi *fl)
int
i
;
int
i
;
for
(
i
=
0
;
i
<
n
;
i
++
)
{
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
!
xfrm4_selector_match
(
&
x
[
i
]
->
sel
,
fl
))
if
(
x
[
i
]
->
props
.
family
==
AF_INET
&&
!
xfrm4_selector_match
(
&
x
[
i
]
->
sel
,
fl
))
return
-
EINVAL
;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
if
(
x
[
i
]
->
props
.
family
==
AF_INET6
&&
!
xfrm6_selector_match
(
&
x
[
i
]
->
sel
,
fl
))
return
-
EINVAL
;
return
-
EINVAL
;
#endif
}
}
return
0
;
return
0
;
}
}
...
@@ -701,3 +721,119 @@ void __init xfrm_state_init(void)
...
@@ -701,3 +721,119 @@ void __init xfrm_state_init(void)
INIT_LIST_HEAD
(
&
xfrm_state_byspi
[
i
]);
INIT_LIST_HEAD
(
&
xfrm_state_byspi
[
i
]);
}
}
}
}
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
struct
xfrm_state
*
xfrm6_state_lookup
(
struct
in6_addr
*
daddr
,
u32
spi
,
u8
proto
)
{
unsigned
h
=
ntohl
(
daddr
->
s6_addr32
[
2
]
^
daddr
->
s6_addr32
[
3
]
^
spi
^
proto
);
struct
xfrm_state
*
x
;
h
=
(
h
^
(
h
>>
10
)
^
(
h
>>
20
))
%
XFRM_DST_HSIZE
;
spin_lock_bh
(
&
xfrm_state_lock
);
list_for_each_entry
(
x
,
xfrm_state_byspi
+
h
,
byspi
)
{
if
(
x
->
props
.
family
==
AF_INET6
&&
spi
==
x
->
id
.
spi
&&
!
ipv6_addr_cmp
(
daddr
,
(
struct
in6_addr
*
)
x
->
id
.
daddr
.
a6
)
&&
proto
==
x
->
id
.
proto
)
{
atomic_inc
(
&
x
->
refcnt
);
spin_unlock_bh
(
&
xfrm_state_lock
);
return
x
;
}
}
spin_unlock_bh
(
&
xfrm_state_lock
);
return
NULL
;
}
struct
xfrm_state
*
xfrm6_find_acq
(
u8
mode
,
u16
reqid
,
u8
proto
,
struct
in6_addr
*
daddr
,
struct
in6_addr
*
saddr
,
int
create
)
{
struct
xfrm_state
*
x
,
*
x0
;
unsigned
h
=
ntohl
(
daddr
->
s6_addr32
[
2
]
^
daddr
->
s6_addr32
[
3
]);
h
=
(
h
^
(
h
>>
16
))
%
XFRM_DST_HSIZE
;
x0
=
NULL
;
spin_lock_bh
(
&
xfrm_state_lock
);
list_for_each_entry
(
x
,
xfrm_state_bydst
+
h
,
bydst
)
{
if
(
x
->
props
.
family
==
AF_INET6
&&
!
memcmp
(
daddr
,
x
->
id
.
daddr
.
a6
,
sizeof
(
struct
in6_addr
))
&&
mode
==
x
->
props
.
mode
&&
proto
==
x
->
id
.
proto
&&
!
memcmp
(
saddr
,
x
->
props
.
saddr
.
a6
,
sizeof
(
struct
in6_addr
))
&&
reqid
==
x
->
props
.
reqid
&&
x
->
km
.
state
==
XFRM_STATE_ACQ
)
{
if
(
!
x0
)
x0
=
x
;
if
(
x
->
id
.
spi
)
continue
;
x0
=
x
;
break
;
}
}
if
(
x0
)
{
atomic_inc
(
&
x0
->
refcnt
);
}
else
if
(
create
&&
(
x0
=
xfrm_state_alloc
())
!=
NULL
)
{
memcpy
(
x0
->
sel
.
daddr
.
a6
,
daddr
,
sizeof
(
struct
in6_addr
));
memcpy
(
x0
->
sel
.
saddr
.
a6
,
saddr
,
sizeof
(
struct
in6_addr
));
x0
->
sel
.
prefixlen_d
=
128
;
x0
->
sel
.
prefixlen_s
=
128
;
memcpy
(
x0
->
props
.
saddr
.
a6
,
saddr
,
sizeof
(
struct
in6_addr
));
x0
->
km
.
state
=
XFRM_STATE_ACQ
;
memcpy
(
x0
->
id
.
daddr
.
a6
,
daddr
,
sizeof
(
struct
in6_addr
));
x0
->
id
.
proto
=
proto
;
x0
->
props
.
family
=
AF_INET6
;
x0
->
props
.
mode
=
mode
;
x0
->
props
.
reqid
=
reqid
;
x0
->
lft
.
hard_add_expires_seconds
=
ACQ_EXPIRES
;
atomic_inc
(
&
x0
->
refcnt
);
mod_timer
(
&
x0
->
timer
,
jiffies
+
ACQ_EXPIRES
*
HZ
);
atomic_inc
(
&
x0
->
refcnt
);
list_add_tail
(
&
x0
->
bydst
,
xfrm_state_bydst
+
h
);
wake_up
(
&
km_waitq
);
}
spin_unlock_bh
(
&
xfrm_state_lock
);
return
x0
;
}
void
xfrm6_alloc_spi
(
struct
xfrm_state
*
x
,
u32
minspi
,
u32
maxspi
)
{
u32
h
;
struct
xfrm_state
*
x0
;
if
(
x
->
id
.
spi
)
return
;
if
(
minspi
==
maxspi
)
{
x0
=
xfrm6_state_lookup
((
struct
in6_addr
*
)
x
->
id
.
daddr
.
a6
,
minspi
,
x
->
id
.
proto
);
if
(
x0
)
{
xfrm_state_put
(
x0
);
return
;
}
x
->
id
.
spi
=
minspi
;
}
else
{
u32
spi
=
0
;
minspi
=
ntohl
(
minspi
);
maxspi
=
ntohl
(
maxspi
);
for
(
h
=
0
;
h
<
maxspi
-
minspi
+
1
;
h
++
)
{
spi
=
minspi
+
net_random
()
%
(
maxspi
-
minspi
+
1
);
x0
=
xfrm6_state_lookup
((
struct
in6_addr
*
)
x
->
id
.
daddr
.
a6
,
htonl
(
spi
),
x
->
id
.
proto
);
if
(
x0
==
NULL
)
break
;
xfrm_state_put
(
x0
);
}
x
->
id
.
spi
=
htonl
(
spi
);
}
if
(
x
->
id
.
spi
)
{
spin_lock_bh
(
&
xfrm_state_lock
);
h
=
ntohl
(
x
->
id
.
daddr
.
a6
[
2
]
^
x
->
id
.
daddr
.
a6
[
3
]
^
x
->
id
.
spi
^
x
->
id
.
proto
);
h
=
(
h
^
(
h
>>
10
)
^
(
h
>>
20
))
%
XFRM_DST_HSIZE
;
list_add
(
&
x
->
byspi
,
xfrm_state_byspi
+
h
);
atomic_inc
(
&
x
->
refcnt
);
spin_unlock_bh
(
&
xfrm_state_lock
);
wake_up
(
&
km_waitq
);
}
}
#endif
/* CONFIG_IPV6 || CONFIG_IPV6_MODULE */
net/ipv6/Makefile
View file @
2447b42b
...
@@ -11,3 +11,5 @@ ipv6-objs := af_inet6.o ip6_output.o ip6_input.o addrconf.o sit.o \
...
@@ -11,3 +11,5 @@ ipv6-objs := af_inet6.o ip6_output.o ip6_input.o addrconf.o sit.o \
ip6_flowlabel.o ipv6_syms.o
ip6_flowlabel.o ipv6_syms.o
obj-$(CONFIG_NETFILTER)
+=
netfilter/
obj-$(CONFIG_NETFILTER)
+=
netfilter/
obj-y
+=
xfrm_policy.o
net/ipv6/ipv6_syms.c
View file @
2447b42b
...
@@ -25,3 +25,6 @@ EXPORT_SYMBOL(inet6_getname);
...
@@ -25,3 +25,6 @@ EXPORT_SYMBOL(inet6_getname);
EXPORT_SYMBOL
(
inet6_ioctl
);
EXPORT_SYMBOL
(
inet6_ioctl
);
EXPORT_SYMBOL
(
ipv6_get_saddr
);
EXPORT_SYMBOL
(
ipv6_get_saddr
);
EXPORT_SYMBOL
(
ipv6_chk_addr
);
EXPORT_SYMBOL
(
ipv6_chk_addr
);
EXPORT_SYMBOL
(
xfrm6_register_type
);
EXPORT_SYMBOL
(
xfrm6_unregister_type
);
EXPORT_SYMBOL
(
xfrm6_get_type
);
net/ipv6/xfrm_policy.c
0 → 100644
View file @
2447b42b
#include <net/xfrm.h>
#include <net/ip.h>
static
struct
xfrm_type
*
xfrm6_type_map
[
256
];
static
rwlock_t
xfrm6_type_lock
=
RW_LOCK_UNLOCKED
;
int
xfrm6_register_type
(
struct
xfrm_type
*
type
)
{
int
err
=
0
;
write_lock
(
&
xfrm6_type_lock
);
if
(
xfrm6_type_map
[
type
->
proto
]
==
NULL
)
xfrm6_type_map
[
type
->
proto
]
=
type
;
else
err
=
-
EEXIST
;
write_unlock
(
&
xfrm6_type_lock
);
return
err
;
}
int
xfrm6_unregister_type
(
struct
xfrm_type
*
type
)
{
int
err
=
0
;
write_lock
(
&
xfrm6_type_lock
);
if
(
xfrm6_type_map
[
type
->
proto
]
!=
type
)
err
=
-
ENOENT
;
else
xfrm6_type_map
[
type
->
proto
]
=
NULL
;
write_unlock
(
&
xfrm6_type_lock
);
return
err
;
}
struct
xfrm_type
*
xfrm6_get_type
(
u8
proto
)
{
struct
xfrm_type
*
type
;
read_lock
(
&
xfrm6_type_lock
);
type
=
xfrm6_type_map
[
proto
];
if
(
type
&&
!
try_module_get
(
type
->
owner
))
type
=
NULL
;
read_unlock
(
&
xfrm6_type_lock
);
return
type
;
}
net/key/af_key.c
View file @
2447b42b
This diff is collapsed.
Click to expand it.
net/netsyms.c
View file @
2447b42b
...
@@ -324,6 +324,11 @@ EXPORT_SYMBOL(xfrm_policy_walk);
...
@@ -324,6 +324,11 @@ EXPORT_SYMBOL(xfrm_policy_walk);
EXPORT_SYMBOL
(
xfrm_policy_flush
);
EXPORT_SYMBOL
(
xfrm_policy_flush
);
EXPORT_SYMBOL
(
xfrm_policy_byid
);
EXPORT_SYMBOL
(
xfrm_policy_byid
);
EXPORT_SYMBOL
(
xfrm_policy_list
);
EXPORT_SYMBOL
(
xfrm_policy_list
);
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
EXPORT_SYMBOL
(
xfrm6_state_lookup
);
EXPORT_SYMBOL
(
xfrm6_find_acq
);
EXPORT_SYMBOL
(
xfrm6_alloc_spi
);
#endif
EXPORT_SYMBOL_GPL
(
xfrm_probe_algs
);
EXPORT_SYMBOL_GPL
(
xfrm_probe_algs
);
EXPORT_SYMBOL_GPL
(
xfrm_count_auth_supported
);
EXPORT_SYMBOL_GPL
(
xfrm_count_auth_supported
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment