Module Name: src Committed By: maxv Date: Mon Feb 26 09:04:29 UTC 2018
Modified Files: src/sys/netinet: raw_ip.c sctp_input.c tcp_input.c udp_usrreq.c src/sys/netinet6: icmp6.c raw_ip6.c sctp6_usrreq.c udp6_usrreq.c src/sys/netipsec: ipsec.c ipsec.h ipsec6.h ipsec_input.c src/sys/rump/librump/rumpnet: net_stub.c Log Message: Dedup: merge ipsec4_in_reject and ipsec6_in_reject into ipsec_in_reject. While here fix misleading comment. ok ozaki-r@ To generate a diff of this commit: cvs rdiff -u -r1.168 -r1.169 src/sys/netinet/raw_ip.c cvs rdiff -u -r1.7 -r1.8 src/sys/netinet/sctp_input.c cvs rdiff -u -r1.379 -r1.380 src/sys/netinet/tcp_input.c cvs rdiff -u -r1.242 -r1.243 src/sys/netinet/udp_usrreq.c cvs rdiff -u -r1.220 -r1.221 src/sys/netinet6/icmp6.c cvs rdiff -u -r1.162 -r1.163 src/sys/netinet6/raw_ip6.c cvs rdiff -u -r1.14 -r1.15 src/sys/netinet6/sctp6_usrreq.c cvs rdiff -u -r1.134 -r1.135 src/sys/netinet6/udp6_usrreq.c cvs rdiff -u -r1.138 -r1.139 src/sys/netipsec/ipsec.c cvs rdiff -u -r1.68 -r1.69 src/sys/netipsec/ipsec.h cvs rdiff -u -r1.23 -r1.24 src/sys/netipsec/ipsec6.h cvs rdiff -u -r1.61 -r1.62 src/sys/netipsec/ipsec_input.c cvs rdiff -u -r1.28 -r1.29 src/sys/rump/librump/rumpnet/net_stub.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netinet/raw_ip.c diff -u src/sys/netinet/raw_ip.c:1.168 src/sys/netinet/raw_ip.c:1.169 --- src/sys/netinet/raw_ip.c:1.168 Wed Feb 14 16:45:24 2018 +++ src/sys/netinet/raw_ip.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: raw_ip.c,v 1.168 2018/02/14 16:45:24 christos Exp $ */ +/* $NetBSD: raw_ip.c,v 1.169 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -65,7 +65,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: raw_ip.c,v 1.168 2018/02/14 16:45:24 christos Exp $"); +__KERNEL_RCSID(0, "$NetBSD: raw_ip.c,v 1.169 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -204,7 +204,7 @@ rip_input(struct mbuf *m, ...) ; #if defined(IPSEC) /* check AH/ESP integrity. */ - else if (ipsec_used && ipsec4_in_reject(m, last)) { + else if (ipsec_used && ipsec_in_reject(m, last)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); /* do not inject data to pcb */ } @@ -218,7 +218,7 @@ rip_input(struct mbuf *m, ...) } #if defined(IPSEC) /* check AH/ESP integrity. */ - if (ipsec_used && last != NULL && ipsec4_in_reject(m, last)) { + if (ipsec_used && last != NULL && ipsec_in_reject(m, last)) { m_freem(m); IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); IP_STATDEC(IP_STAT_DELIVERED); Index: src/sys/netinet/sctp_input.c diff -u src/sys/netinet/sctp_input.c:1.7 src/sys/netinet/sctp_input.c:1.8 --- src/sys/netinet/sctp_input.c:1.7 Tue Jun 27 13:27:54 2017 +++ src/sys/netinet/sctp_input.c Mon Feb 26 09:04:29 2018 @@ -1,5 +1,5 @@ /* $KAME: sctp_input.c,v 1.28 2005/04/21 18:36:21 nishida Exp $ */ -/* $NetBSD: sctp_input.c,v 1.7 2017/06/27 13:27:54 rjs Exp $ */ +/* $NetBSD: sctp_input.c,v 1.8 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (C) 2002, 2003, 2004 Cisco Systems Inc, @@ -31,7 +31,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: sctp_input.c,v 1.7 2017/06/27 13:27:54 rjs Exp $"); +__KERNEL_RCSID(0, "$NetBSD: sctp_input.c,v 1.8 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_ipsec.h" @@ -4238,7 +4238,7 @@ sctp_input(struct mbuf *m, ...) * I very much doubt any of the IPSEC stuff will work but I have * no idea, so I will leave it in place. */ - if (ipsec_used && ipsec4_in_reject(m, (struct inpcb *)inp)) { + if (ipsec_used && ipsec_in_reject(m, (struct inpcb *)inp)) { #if 0 ipsecstat.in_polvio++; #endif Index: src/sys/netinet/tcp_input.c diff -u src/sys/netinet/tcp_input.c:1.379 src/sys/netinet/tcp_input.c:1.380 --- src/sys/netinet/tcp_input.c:1.379 Mon Feb 12 08:22:26 2018 +++ src/sys/netinet/tcp_input.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: tcp_input.c,v 1.379 2018/02/12 08:22:26 maxv Exp $ */ +/* $NetBSD: tcp_input.c,v 1.380 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -148,7 +148,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: tcp_input.c,v 1.379 2018/02/12 08:22:26 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: tcp_input.c,v 1.380 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -1460,14 +1460,14 @@ findpcb: if (ipsec_used) { if (inp && (inp->inp_socket->so_options & SO_ACCEPTCONN) == 0 - && ipsec4_in_reject(m, inp)) { + && ipsec_in_reject(m, inp)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); goto drop; } #ifdef INET6 else if (in6p && (in6p->in6p_socket->so_options & SO_ACCEPTCONN) == 0 - && ipsec6_in_reject(m, in6p)) { + && ipsec_in_reject(m, in6p)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); goto drop; } @@ -1505,7 +1505,7 @@ findpcb: #if defined(IPSEC) if (ipsec_used && in6p && (in6p->in6p_socket->so_options & SO_ACCEPTCONN) == 0 && - ipsec6_in_reject(m, in6p)) { + ipsec_in_reject(m, in6p)) { IPSEC6_STATINC(IPSEC_STAT_IN_POLVIO); goto drop; } @@ -1785,7 +1785,7 @@ nosave:; */ KASSERT(inp == NULL || sotoinpcb(so) == inp); - if (!ipsec4_in_reject(m, inp)) + if (!ipsec_in_reject(m, inp)) break; IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); tp = NULL; @@ -1794,7 +1794,7 @@ nosave:; #ifdef INET6 case AF_INET6: KASSERT(sotoin6pcb(so) == in6p); - if (!ipsec6_in_reject(m, in6p)) + if (!ipsec_in_reject(m, in6p)) break; IPSEC6_STATINC(IPSEC_STAT_IN_POLVIO); tp = NULL; Index: src/sys/netinet/udp_usrreq.c diff -u src/sys/netinet/udp_usrreq.c:1.242 src/sys/netinet/udp_usrreq.c:1.243 --- src/sys/netinet/udp_usrreq.c:1.242 Wed Feb 14 05:24:44 2018 +++ src/sys/netinet/udp_usrreq.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: udp_usrreq.c,v 1.242 2018/02/14 05:24:44 maxv Exp $ */ +/* $NetBSD: udp_usrreq.c,v 1.243 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -66,7 +66,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.242 2018/02/14 05:24:44 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.243 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -479,7 +479,7 @@ udp4_sendup(struct mbuf *m, int off /* o #if defined(IPSEC) /* check AH/ESP integrity. */ - if (ipsec_used && ipsec4_in_reject(m, inp)) { + if (ipsec_used && ipsec_in_reject(m, inp)) { IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); if ((n = m_copypacket(m, M_DONTWAIT)) != NULL) icmp_error(n, ICMP_UNREACH, ICMP_UNREACH_ADMIN_PROHIBIT, Index: src/sys/netinet6/icmp6.c diff -u src/sys/netinet6/icmp6.c:1.220 src/sys/netinet6/icmp6.c:1.221 --- src/sys/netinet6/icmp6.c:1.220 Mon Feb 12 12:52:12 2018 +++ src/sys/netinet6/icmp6.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: icmp6.c,v 1.220 2018/02/12 12:52:12 maxv Exp $ */ +/* $NetBSD: icmp6.c,v 1.221 2018/02/26 09:04:29 maxv Exp $ */ /* $KAME: icmp6.c,v 1.217 2001/06/20 15:03:29 jinmei Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: icmp6.c,v 1.220 2018/02/12 12:52:12 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: icmp6.c,v 1.221 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -2008,7 +2008,7 @@ icmp6_rip6_input(struct mbuf **mp, int o * Check AH/ESP integrity */ if (!ipsec_used || - (ipsec_used && !ipsec6_in_reject(m, last))) + (ipsec_used && !ipsec_in_reject(m, last))) #endif if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { if (last->in6p_flags & IN6P_CONTROLOPTS) @@ -2030,7 +2030,7 @@ icmp6_rip6_input(struct mbuf **mp, int o } #ifdef IPSEC - if (ipsec_used && last && ipsec6_in_reject(m, last)) { + if (ipsec_used && last && ipsec_in_reject(m, last)) { m_freem(m); IP6_STATDEC(IP6_STAT_DELIVERED); /* do not inject data into pcb */ Index: src/sys/netinet6/raw_ip6.c diff -u src/sys/netinet6/raw_ip6.c:1.162 src/sys/netinet6/raw_ip6.c:1.163 --- src/sys/netinet6/raw_ip6.c:1.162 Thu Feb 8 19:58:05 2018 +++ src/sys/netinet6/raw_ip6.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: raw_ip6.c,v 1.162 2018/02/08 19:58:05 maxv Exp $ */ +/* $NetBSD: raw_ip6.c,v 1.163 2018/02/26 09:04:29 maxv Exp $ */ /* $KAME: raw_ip6.c,v 1.82 2001/07/23 18:57:56 jinmei Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v 1.162 2018/02/08 19:58:05 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v 1.163 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_ipsec.h" @@ -198,7 +198,7 @@ rip6_input(struct mbuf **mp, int *offp, * Check AH/ESP integrity */ if (!ipsec_used || - (ipsec_used && !ipsec6_in_reject(m, last))) + (ipsec_used && !ipsec_in_reject(m, last))) #endif if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { if (last->in6p_flags & IN6P_CONTROLOPTS) @@ -221,7 +221,7 @@ rip6_input(struct mbuf **mp, int *offp, } #ifdef IPSEC - if (ipsec_used && last && ipsec6_in_reject(m, last)) { + if (ipsec_used && last && ipsec_in_reject(m, last)) { m_freem(m); IP6_STATDEC(IP6_STAT_DELIVERED); /* do not inject data into pcb */ Index: src/sys/netinet6/sctp6_usrreq.c diff -u src/sys/netinet6/sctp6_usrreq.c:1.14 src/sys/netinet6/sctp6_usrreq.c:1.15 --- src/sys/netinet6/sctp6_usrreq.c:1.14 Tue Oct 17 19:23:42 2017 +++ src/sys/netinet6/sctp6_usrreq.c Mon Feb 26 09:04:29 2018 @@ -1,5 +1,5 @@ /* $KAME: sctp6_usrreq.c,v 1.38 2005/08/24 08:08:56 suz Exp $ */ -/* $NetBSD: sctp6_usrreq.c,v 1.14 2017/10/17 19:23:42 rjs Exp $ */ +/* $NetBSD: sctp6_usrreq.c,v 1.15 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (c) 2001, 2002, 2003, 2004 Cisco Systems, Inc. @@ -33,7 +33,7 @@ * SUCH DAMAGE. */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: sctp6_usrreq.c,v 1.14 2017/10/17 19:23:42 rjs Exp $"); +__KERNEL_RCSID(0, "$NetBSD: sctp6_usrreq.c,v 1.15 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -235,7 +235,7 @@ sctp_skip_csum: /* * Check AH/ESP integrity. */ - if (ipsec_used && ipsec6_in_reject(m, (struct in6pcb *)in6p_ip)) { + if (ipsec_used && ipsec_in_reject(m, (struct in6pcb *)in6p_ip)) { /* XXX */ #if 0 /* FIX ME: need to find right stat */ Index: src/sys/netinet6/udp6_usrreq.c diff -u src/sys/netinet6/udp6_usrreq.c:1.134 src/sys/netinet6/udp6_usrreq.c:1.135 --- src/sys/netinet6/udp6_usrreq.c:1.134 Thu Feb 8 19:58:05 2018 +++ src/sys/netinet6/udp6_usrreq.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: udp6_usrreq.c,v 1.134 2018/02/08 19:58:05 maxv Exp $ */ +/* $NetBSD: udp6_usrreq.c,v 1.135 2018/02/26 09:04:29 maxv Exp $ */ /* $KAME: udp6_usrreq.c,v 1.86 2001/05/27 17:33:00 itojun Exp $ */ /* $KAME: udp6_output.c,v 1.43 2001/10/15 09:19:52 itojun Exp $ */ @@ -63,7 +63,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.134 2018/02/08 19:58:05 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.135 2018/02/26 09:04:29 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -353,7 +353,7 @@ udp6_sendup(struct mbuf *m, int off /* o #if defined(IPSEC) /* check AH/ESP integrity. */ - if (ipsec_used && ipsec6_in_reject(m, in6p)) { + if (ipsec_used && ipsec_in_reject(m, in6p)) { IPSEC6_STATINC(IPSEC_STAT_IN_POLVIO); if ((n = m_copypacket(m, M_DONTWAIT)) != NULL) icmp6_error(n, ICMP6_DST_UNREACH, Index: src/sys/netipsec/ipsec.c diff -u src/sys/netipsec/ipsec.c:1.138 src/sys/netipsec/ipsec.c:1.139 --- src/sys/netipsec/ipsec.c:1.138 Mon Feb 26 08:50:25 2018 +++ src/sys/netipsec/ipsec.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.c,v 1.138 2018/02/26 08:50:25 maxv Exp $ */ +/* $NetBSD: ipsec.c,v 1.139 2018/02/26 09:04:29 maxv Exp $ */ /* $FreeBSD: src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */ /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.138 2018/02/26 08:50:25 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.139 2018/02/26 09:04:29 maxv Exp $"); /* * IPsec controller part. @@ -1701,12 +1701,13 @@ ipsec_sp_reject(const struct secpolicy * } /* - * Check AH/ESP integrity. - * This function is called from tcp_input(), udp_input(), - * and {ah,esp}4_input for tunnel mode + * Check security policy requirements. + * + * This function is called from tcp{6}_input(), udp{6}_input(), + * and {ah,esp}_input for tunnel mode */ int -ipsec4_in_reject(struct mbuf *m, struct inpcb *inp) +ipsec_in_reject(struct mbuf *m, void *inp) { struct inpcb_hdr *inph = (struct inpcb_hdr *)inp; struct secpolicy *sp; @@ -1733,41 +1734,6 @@ ipsec4_in_reject(struct mbuf *m, struct return result; } -#ifdef INET6 -/* - * Check AH/ESP integrity. - * This function is called from tcp6_input(), udp6_input(), - * and {ah,esp}6_input for tunnel mode - */ -int -ipsec6_in_reject(struct mbuf *m, struct in6pcb *in6p) -{ - struct inpcb_hdr *inph = (struct inpcb_hdr *)in6p; - struct secpolicy *sp; - int error; - int result; - - KASSERT(m != NULL); - - if (inph == NULL) - sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_INBOUND, - IP_FORWARDING, &error); - else - sp = ipsec_getpolicybysock(m, IPSEC_DIR_INBOUND, - inph, &error); - - if (sp != NULL) { - result = ipsec_sp_reject(sp, m); - if (result) - IPSEC_STATINC(IPSEC_STAT_IN_POLVIO); - KEY_SP_UNREF(&sp); - } else { - result = 0; - } - return result; -} -#endif - /* * Compute the byte size to be occupied by the IPsec header. If it is * tunneled, it includes the size of outer IP header. Index: src/sys/netipsec/ipsec.h diff -u src/sys/netipsec/ipsec.h:1.68 src/sys/netipsec/ipsec.h:1.69 --- src/sys/netipsec/ipsec.h:1.68 Mon Feb 26 08:50:25 2018 +++ src/sys/netipsec/ipsec.h Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.h,v 1.68 2018/02/26 08:50:25 maxv Exp $ */ +/* $NetBSD: ipsec.h,v 1.69 2018/02/26 09:04:29 maxv Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.h,v 1.2.4.2 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $ */ @@ -294,7 +294,7 @@ u_int ipsec_get_reqlevel(const struct ip int ipsec4_set_policy(struct inpcb *, int, const void *, size_t, kauth_cred_t); int ipsec4_get_policy(struct inpcb *, const void *, size_t, struct mbuf **); int ipsec4_delete_pcbpolicy(struct inpcb *); -int ipsec4_in_reject(struct mbuf *, struct inpcb *); +int ipsec_in_reject(struct mbuf *, void *); struct secasvar *ipsec_lookup_sa(const struct ipsecrequest *, const struct mbuf *); Index: src/sys/netipsec/ipsec6.h diff -u src/sys/netipsec/ipsec6.h:1.23 src/sys/netipsec/ipsec6.h:1.24 --- src/sys/netipsec/ipsec6.h:1.23 Mon Feb 26 08:42:16 2018 +++ src/sys/netipsec/ipsec6.h Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec6.h,v 1.23 2018/02/26 08:42:16 maxv Exp $ */ +/* $NetBSD: ipsec6.h,v 1.24 2018/02/26 09:04:29 maxv Exp $ */ /* $FreeBSD: src/sys/netipsec/ipsec6.h,v 1.1.4.1 2003/01/24 05:11:35 sam Exp $ */ /* $KAME: ipsec.h,v 1.44 2001/03/23 08:08:47 itojun Exp $ */ @@ -58,11 +58,9 @@ int ipsec6_set_policy(struct in6pcb *, i int ipsec6_get_policy(struct in6pcb *, const void *, size_t, struct mbuf **); struct secpolicy *ipsec6_check_policy(struct mbuf *, struct in6pcb *, int, int*,int*); -int ipsec6_in_reject(struct mbuf *, struct in6pcb *); struct tcp6cb; -size_t ipsec6_hdrsiz(struct mbuf *, u_int, struct in6pcb *); size_t ipsec6_hdrsiz_tcp(struct tcpcb*); /* NetBSD protosw ctlin entrypoint */ Index: src/sys/netipsec/ipsec_input.c diff -u src/sys/netipsec/ipsec_input.c:1.61 src/sys/netipsec/ipsec_input.c:1.62 --- src/sys/netipsec/ipsec_input.c:1.61 Mon Feb 26 06:58:56 2018 +++ src/sys/netipsec/ipsec_input.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_input.c,v 1.61 2018/02/26 06:58:56 maxv Exp $ */ +/* $NetBSD: ipsec_input.c,v 1.62 2018/02/26 09:04:29 maxv Exp $ */ /* $FreeBSD: src/sys/netipsec/ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $ */ /* $OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.61 2018/02/26 06:58:56 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.62 2018/02/26 09:04:29 maxv Exp $"); /* * IPsec input processing. @@ -459,7 +459,7 @@ cantpull: key_sa_recordxfer(sav, m); /* record data transfer */ if ((inetsw[ip_protox[prot]].pr_flags & PR_LASTHDR) != 0 && - ipsec4_in_reject(m, NULL)) { + ipsec_in_reject(m, NULL)) { error = EINVAL; goto bad; } @@ -685,7 +685,7 @@ ipsec6_common_input_cb(struct mbuf *m, s * code - like udp/tcp/raw ip. */ if ((inet6sw[ip6_protox[nxt]].pr_flags & PR_LASTHDR) != 0 && - ipsec6_in_reject(m, NULL)) { + ipsec_in_reject(m, NULL)) { error = EINVAL; goto bad; } Index: src/sys/rump/librump/rumpnet/net_stub.c diff -u src/sys/rump/librump/rumpnet/net_stub.c:1.28 src/sys/rump/librump/rumpnet/net_stub.c:1.29 --- src/sys/rump/librump/rumpnet/net_stub.c:1.28 Mon Feb 26 08:50:25 2018 +++ src/sys/rump/librump/rumpnet/net_stub.c Mon Feb 26 09:04:29 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: net_stub.c,v 1.28 2018/02/26 08:50:25 maxv Exp $ */ +/* $NetBSD: net_stub.c,v 1.29 2018/02/26 09:04:29 maxv Exp $ */ /* * Copyright (c) 2008 Antti Kantee. All Rights Reserved. @@ -26,7 +26,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: net_stub.c,v 1.28 2018/02/26 08:50:25 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: net_stub.c,v 1.29 2018/02/26 09:04:29 maxv Exp $"); #include <sys/mutex.h> #include <sys/param.h> @@ -92,17 +92,16 @@ __weak_alias(ipsec4_common_input,rumpnet __weak_alias(ipsec4_delete_pcbpolicy,rumpnet_stub); __weak_alias(ipsec4_forward,rumpnet_stub); __weak_alias(ipsec4_input,rumpnet_stub); -__weak_alias(ipsec4_in_reject,rumpnet_stub); __weak_alias(ipsec4_set_policy,rumpnet_stub); __weak_alias(ipsec6_common_input,rumpnet_stub); __weak_alias(ipsec6_input,rumpnet_stub); __weak_alias(ipsec6_check_policy,rumpnet_stub); __weak_alias(ipsec6_delete_pcbpolicy,rumpnet_stub); __weak_alias(ipsec6_get_policy,rumpnet_stub); -__weak_alias(ipsec6_in_reject,rumpnet_stub); __weak_alias(ipsec6_process_packet,rumpnet_stub); __weak_alias(ipsec6_set_policy,rumpnet_stub); __weak_alias(ipsec_hdrsiz,rumpnet_stub); +__weak_alias(ipsec_in_reject,rumpnet_stub); __weak_alias(ipsec_init_policy,rumpnet_stub); __weak_alias(ipsec_pcbconn,rumpnet_stub); __weak_alias(ipsec_pcbdisconn,rumpnet_stub);