version 1.54, 2001/01/24 09:04:15 |
version 1.56, 2001/07/03 08:06:19 |
Line 175 rip_input(m, va_alist) |
|
Line 175 rip_input(m, va_alist) |
|
continue; |
continue; |
if (last) { |
if (last) { |
struct mbuf *n; |
struct mbuf *n; |
|
|
|
#ifdef IPSEC |
|
/* check AH/ESP integrity. */ |
|
if (ipsec4_in_reject_so(m, last->inp_socket)) { |
|
ipsecstat.in_polvio++; |
|
/* do not inject data to pcb */ |
|
} else |
|
#endif /*IPSEC*/ |
if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { |
if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) { |
if (last->inp_flags & INP_CONTROLOPTS || |
if (last->inp_flags & INP_CONTROLOPTS || |
last->inp_socket->so_options & SO_TIMESTAMP) |
last->inp_socket->so_options & SO_TIMESTAMP) |
Line 192 rip_input(m, va_alist) |
|
Line 200 rip_input(m, va_alist) |
|
} |
} |
last = inp; |
last = inp; |
} |
} |
|
#ifdef IPSEC |
|
/* check AH/ESP integrity. */ |
|
if (last && ipsec4_in_reject_so(m, last->inp_socket)) { |
|
m_freem(m); |
|
ipsecstat.in_polvio++; |
|
ipstat.ips_delivered--; |
|
/* do not inject data to pcb */ |
|
} else |
|
#endif /*IPSEC*/ |
if (last) { |
if (last) { |
if (last->inp_flags & INP_CONTROLOPTS || |
if (last->inp_flags & INP_CONTROLOPTS || |
last->inp_socket->so_options & SO_TIMESTAMP) |
last->inp_socket->so_options & SO_TIMESTAMP) |
Line 433 rip_usrreq(so, req, m, nam, control, p) |
|
Line 450 rip_usrreq(so, req, m, nam, control, p) |
|
(struct ifnet *)control, p)); |
(struct ifnet *)control, p)); |
|
|
if (req == PRU_PURGEIF) { |
if (req == PRU_PURGEIF) { |
|
in_pcbpurgeif0(&rawcbtable, (struct ifnet *)control); |
in_purgeif((struct ifnet *)control); |
in_purgeif((struct ifnet *)control); |
in_pcbpurgeif(&rawcbtable, (struct ifnet *)control); |
in_pcbpurgeif(&rawcbtable, (struct ifnet *)control); |
return (0); |
return (0); |