version 1.90.2.1.2.2, 2007/09/23 21:36:35 |
version 1.98, 2007/03/07 22:20:04 |
|
|
ip6_desync_factor = arc4random() % MAX_TEMP_DESYNC_FACTOR; |
ip6_desync_factor = arc4random() % MAX_TEMP_DESYNC_FACTOR; |
|
|
ip6_init2((void *)0); |
ip6_init2((void *)0); |
|
#ifdef GATEWAY |
|
ip6flow_init(); |
|
#endif |
|
|
#ifdef PFIL_HOOKS |
#ifdef PFIL_HOOKS |
/* Register our Packet Filter hook. */ |
/* Register our Packet Filter hook. */ |
|
|
extern struct route_in6 ip6_forward_rt; |
extern struct route_in6 ip6_forward_rt; |
|
|
void |
void |
ip6_input(m) |
ip6_input(struct mbuf *m) |
struct mbuf *m; |
|
{ |
{ |
struct ip6_hdr *ip6; |
struct ip6_hdr *ip6; |
int off = sizeof(struct ip6_hdr), nest; |
int off = sizeof(struct ip6_hdr), nest; |
|
|
else |
else |
ip6stat.ip6s_mext1++; |
ip6stat.ip6s_mext1++; |
} else { |
} else { |
#define M2MMAX (sizeof(ip6stat.ip6s_m2m)/sizeof(ip6stat.ip6s_m2m[0])) |
#define M2MMAX __arraycount(ip6stat.ip6s_m2m) |
if (m->m_next) { |
if (m->m_next) { |
if (m->m_flags & M_LOOP) { |
if (m->m_flags & M_LOOP) { |
ip6stat.ip6s_m2m[lo0ifp->if_index]++; /* XXX */ |
ip6stat.ip6s_m2m[lo0ifp->if_index]++; /* XXX */ |
|
|
* it. Otherwise, if it is aligned, make sure the entire base |
* it. Otherwise, if it is aligned, make sure the entire base |
* IPv6 header is in the first mbuf of the chain. |
* IPv6 header is in the first mbuf of the chain. |
*/ |
*/ |
if (IP6_HDR_ALIGNED_P(mtod(m, caddr_t)) == 0) { |
if (IP6_HDR_ALIGNED_P(mtod(m, void *)) == 0) { |
struct ifnet *inifp = m->m_pkthdr.rcvif; |
struct ifnet *inifp = m->m_pkthdr.rcvif; |
if ((m = m_copyup(m, sizeof(struct ip6_hdr), |
if ((m = m_copyup(m, sizeof(struct ip6_hdr), |
(max_linkhdr + 3) & ~3)) == NULL) { |
(max_linkhdr + 3) & ~3)) == NULL) { |
|
|
goto bad; |
goto bad; |
} |
} |
|
|
|
#if defined(IPSEC) |
|
/* IPv6 fast forwarding is not compatible with IPsec. */ |
|
m->m_flags &= ~M_CANFASTFWD; |
|
#else |
|
/* |
|
* Assume that we can create a fast-forward IP flow entry |
|
* based on this packet. |
|
*/ |
|
m->m_flags |= M_CANFASTFWD; |
|
#endif |
|
|
#ifdef PFIL_HOOKS |
#ifdef PFIL_HOOKS |
/* |
/* |
* Run through list of hooks for input packets. If there are any |
* Run through list of hooks for input packets. If there are any |
|
|
/* |
/* |
* Unicast check |
* Unicast check |
*/ |
*/ |
if (ip6_forward_rt.ro_rt != NULL && |
if (!IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
&((const struct sockaddr_in6 *)rtcache_getdst((const struct route *)&ip6_forward_rt))->sin6_addr)) |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
rtcache_free((struct route *)&ip6_forward_rt); |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
else |
|
rtcache_check((struct route *)&ip6_forward_rt); |
|
if (ip6_forward_rt.ro_rt != NULL) { |
|
/* XXX Revalidated route is accounted wrongly. */ |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
else { |
} else { |
struct sockaddr_in6 *dst6; |
struct sockaddr_in6 *dst6; |
|
|
if (ip6_forward_rt.ro_rt) { |
ip6stat.ip6s_forward_cachemiss++; |
/* route is down or destination is different */ |
|
ip6stat.ip6s_forward_cachemiss++; |
|
RTFREE(ip6_forward_rt.ro_rt); |
|
ip6_forward_rt.ro_rt = 0; |
|
} |
|
|
|
bzero(&ip6_forward_rt.ro_dst, sizeof(struct sockaddr_in6)); |
dst6 = &ip6_forward_rt.ro_dst; |
dst6 = (struct sockaddr_in6 *)&ip6_forward_rt.ro_dst; |
memset(dst6, 0, sizeof(*dst6)); |
dst6->sin6_len = sizeof(struct sockaddr_in6); |
dst6->sin6_len = sizeof(struct sockaddr_in6); |
dst6->sin6_family = AF_INET6; |
dst6->sin6_family = AF_INET6; |
dst6->sin6_addr = ip6->ip6_dst; |
dst6->sin6_addr = ip6->ip6_dst; |
|
|
rtalloc((struct route *)&ip6_forward_rt); |
rtcache_init((struct route *)&ip6_forward_rt); |
} |
} |
|
|
#define rt6_key(r) ((struct sockaddr_in6 *)((r)->rt_nodes->rn_key)) |
#define rt6_key(r) ((struct sockaddr_in6 *)((r)->rt_nodes->rn_key)) |
|
|
* But we think it's even useful in some situations, e.g. when using |
* But we think it's even useful in some situations, e.g. when using |
* a special daemon which wants to intercept the packet. |
* a special daemon which wants to intercept the packet. |
*/ |
*/ |
if (ip6_forward_rt.ro_rt && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & |
(ip6_forward_rt.ro_rt->rt_flags & |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
|
|
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp && |
if (ip6_forward_rt.ro_rt != NULL && |
|
ip6_forward_rt.ro_rt->rt_ifp != NULL && |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
/* XXX do we need more sanity checks? */ |
/* XXX do we need more sanity checks? */ |
ours = 1; |
ours = 1; |
|
|
* working right. |
* working right. |
*/ |
*/ |
struct ifaddr *ifa; |
struct ifaddr *ifa; |
for (ifa = m->m_pkthdr.rcvif->if_addrlist.tqh_first; |
TAILQ_FOREACH(ifa, &m->m_pkthdr.rcvif->if_addrlist, ifa_list) { |
ifa; |
|
ifa = ifa->ifa_list.tqe_next) { |
|
if (ifa->ifa_addr == NULL) |
if (ifa->ifa_addr == NULL) |
continue; /* just for safety */ |
continue; /* just for safety */ |
if (ifa->ifa_addr->sa_family != AF_INET6) |
if (ifa->ifa_addr->sa_family != AF_INET6) |
|
|
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
(caddr_t)&ip6->ip6_plen - (caddr_t)ip6); |
(char *)&ip6->ip6_plen - (char *)ip6); |
return; |
return; |
} |
} |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
|
|
/* XXX error stat??? */ |
/* XXX error stat??? */ |
error = EINVAL; |
error = EINVAL; |
DPRINTF(("ip6_input: no SP, packet discarded\n"));/*XXX*/ |
DPRINTF(("ip6_input: no SP, packet discarded\n"));/*XXX*/ |
|
goto bad; |
} |
} |
splx(s); |
splx(s); |
if (error) |
if (error) |
Line 939 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 950 ip6_process_hopopts(m, opthead, hbhlen, |
|
return (-1); |
return (-1); |
} |
} |
optlen = IP6OPT_RTALERT_LEN; |
optlen = IP6OPT_RTALERT_LEN; |
bcopy((caddr_t)(opt + 2), (caddr_t)&rtalert_val, 2); |
bcopy((void *)(opt + 2), (void *)&rtalert_val, 2); |
*rtalertp = ntohs(rtalert_val); |
*rtalertp = ntohs(rtalert_val); |
break; |
break; |
case IP6OPT_JUMBO: |
case IP6OPT_JUMBO: |
Line 1098 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1109 ip6_savecontrol(in6p, mp, ip6, m) |
|
struct timeval tv; |
struct timeval tv; |
|
|
microtime(&tv); |
microtime(&tv); |
*mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv), |
*mp = sbcreatecontrol((void *) &tv, sizeof(tv), |
SCM_TIMESTAMP, SOL_SOCKET); |
SCM_TIMESTAMP, SOL_SOCKET); |
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
Line 1117 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1128 ip6_savecontrol(in6p, mp, ip6, m) |
|
in6_clearscope(&pi6.ipi6_addr); /* XXX */ |
in6_clearscope(&pi6.ipi6_addr); /* XXX */ |
pi6.ipi6_ifindex = m->m_pkthdr.rcvif ? |
pi6.ipi6_ifindex = m->m_pkthdr.rcvif ? |
m->m_pkthdr.rcvif->if_index : 0; |
m->m_pkthdr.rcvif->if_index : 0; |
*mp = sbcreatecontrol((caddr_t) &pi6, |
*mp = sbcreatecontrol((void *) &pi6, |
sizeof(struct in6_pktinfo), |
sizeof(struct in6_pktinfo), |
IS2292(IPV6_2292PKTINFO, IPV6_PKTINFO), IPPROTO_IPV6); |
IS2292(IPV6_2292PKTINFO, IPV6_PKTINFO), IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
Line 1127 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1138 ip6_savecontrol(in6p, mp, ip6, m) |
|
if (in6p->in6p_flags & IN6P_HOPLIMIT) { |
if (in6p->in6p_flags & IN6P_HOPLIMIT) { |
int hlim = ip6->ip6_hlim & 0xff; |
int hlim = ip6->ip6_hlim & 0xff; |
|
|
*mp = sbcreatecontrol((caddr_t) &hlim, sizeof(int), |
*mp = sbcreatecontrol((void *) &hlim, sizeof(int), |
IS2292(IPV6_2292HOPLIMIT, IPV6_HOPLIMIT), IPPROTO_IPV6); |
IS2292(IPV6_2292HOPLIMIT, IPV6_HOPLIMIT), IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
Line 1141 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1152 ip6_savecontrol(in6p, mp, ip6, m) |
|
flowinfo >>= 20; |
flowinfo >>= 20; |
|
|
tclass = flowinfo & 0xff; |
tclass = flowinfo & 0xff; |
*mp = sbcreatecontrol((caddr_t)&tclass, sizeof(tclass), |
*mp = sbcreatecontrol((void *)&tclass, sizeof(tclass), |
IPV6_TCLASS, IPPROTO_IPV6); |
IPV6_TCLASS, IPPROTO_IPV6); |
|
|
if (*mp) |
if (*mp) |
Line 1189 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1200 ip6_savecontrol(in6p, mp, ip6, m) |
|
* be removed before returning in the RFC 2292. |
* be removed before returning in the RFC 2292. |
* Note: this constraint is removed in RFC3542. |
* Note: this constraint is removed in RFC3542. |
*/ |
*/ |
*mp = sbcreatecontrol((caddr_t)hbh, hbhlen, |
*mp = sbcreatecontrol((void *)hbh, hbhlen, |
IS2292(IPV6_2292HOPOPTS, IPV6_HOPOPTS), |
IS2292(IPV6_2292HOPOPTS, IPV6_HOPOPTS), |
IPPROTO_IPV6); |
IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
Line 1251 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1262 ip6_savecontrol(in6p, mp, ip6, m) |
|
if (!in6p->in6p_flags & IN6P_DSTOPTS) |
if (!in6p->in6p_flags & IN6P_DSTOPTS) |
break; |
break; |
|
|
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
*mp = sbcreatecontrol((void *)ip6e, elen, |
IS2292(IPV6_2292DSTOPTS, IPV6_DSTOPTS), |
IS2292(IPV6_2292DSTOPTS, IPV6_DSTOPTS), |
IPPROTO_IPV6); |
IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
Line 1262 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1273 ip6_savecontrol(in6p, mp, ip6, m) |
|
if (!in6p->in6p_flags & IN6P_RTHDR) |
if (!in6p->in6p_flags & IN6P_RTHDR) |
break; |
break; |
|
|
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
*mp = sbcreatecontrol((void *)ip6e, elen, |
IS2292(IPV6_2292RTHDR, IPV6_RTHDR), |
IS2292(IPV6_2292RTHDR, IPV6_RTHDR), |
IPPROTO_IPV6); |
IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
Line 1300 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1311 ip6_savecontrol(in6p, mp, ip6, m) |
|
|
|
|
|
void |
void |
ip6_notify_pmtu(struct in6pcb *in6p, struct sockaddr_in6 *dst, uint32_t *mtu) |
ip6_notify_pmtu(struct in6pcb *in6p, const struct sockaddr_in6 *dst, |
|
uint32_t *mtu) |
{ |
{ |
struct socket *so; |
struct socket *so; |
struct mbuf *m_mtu; |
struct mbuf *m_mtu; |
Line 1322 ip6_notify_pmtu(struct in6pcb *in6p, str |
|
Line 1334 ip6_notify_pmtu(struct in6pcb *in6p, str |
|
if (sa6_recoverscope(&mtuctl.ip6m_addr)) |
if (sa6_recoverscope(&mtuctl.ip6m_addr)) |
return; |
return; |
|
|
if ((m_mtu = sbcreatecontrol((caddr_t)&mtuctl, sizeof(mtuctl), |
if ((m_mtu = sbcreatecontrol((void *)&mtuctl, sizeof(mtuctl), |
IPV6_PATHMTU, IPPROTO_IPV6)) == NULL) |
IPV6_PATHMTU, IPPROTO_IPV6)) == NULL) |
return; |
return; |
|
|
if (sbappendaddr(&so->so_rcv, (struct sockaddr *)dst, NULL, m_mtu) |
if (sbappendaddr(&so->so_rcv, (const struct sockaddr *)dst, NULL, m_mtu) |
== 0) { |
== 0) { |
m_freem(m_mtu); |
m_freem(m_mtu); |
/* XXX: should count statistics */ |
/* XXX: should count statistics */ |
Line 1362 ip6_pullexthdr(m, off, nxt) |
|
Line 1374 ip6_pullexthdr(m, off, nxt) |
|
} |
} |
#endif |
#endif |
|
|
m_copydata(m, off, sizeof(ip6e), (caddr_t)&ip6e); |
m_copydata(m, off, sizeof(ip6e), (void *)&ip6e); |
if (nxt == IPPROTO_AH) |
if (nxt == IPPROTO_AH) |
elen = (ip6e.ip6e_len + 2) << 2; |
elen = (ip6e.ip6e_len + 2) << 2; |
else |
else |
Line 1385 ip6_pullexthdr(m, off, nxt) |
|
Line 1397 ip6_pullexthdr(m, off, nxt) |
|
return NULL; |
return NULL; |
} |
} |
|
|
m_copydata(m, off, elen, mtod(n, caddr_t)); |
m_copydata(m, off, elen, mtod(n, void *)); |
n->m_len = elen; |
n->m_len = elen; |
return n; |
return n; |
} |
} |
Line 1418 ip6_get_prevhdr(m, off) |
|
Line 1430 ip6_get_prevhdr(m, off) |
|
nxt = ip6->ip6_nxt; |
nxt = ip6->ip6_nxt; |
len = sizeof(struct ip6_hdr); |
len = sizeof(struct ip6_hdr); |
while (len < off) { |
while (len < off) { |
ip6e = (struct ip6_ext *)(mtod(m, caddr_t) + len); |
ip6e = (struct ip6_ext *)(mtod(m, char *) + len); |
|
|
switch (nxt) { |
switch (nxt) { |
case IPPROTO_FRAGMENT: |
case IPPROTO_FRAGMENT: |
Line 1467 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1479 ip6_nexthdr(m, off, proto, nxtp) |
|
return -1; |
return -1; |
if (m->m_pkthdr.len < off + sizeof(ip6)) |
if (m->m_pkthdr.len < off + sizeof(ip6)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(ip6), (caddr_t)&ip6); |
m_copydata(m, off, sizeof(ip6), (void *)&ip6); |
if (nxtp) |
if (nxtp) |
*nxtp = ip6.ip6_nxt; |
*nxtp = ip6.ip6_nxt; |
off += sizeof(ip6); |
off += sizeof(ip6); |
Line 1480 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1492 ip6_nexthdr(m, off, proto, nxtp) |
|
*/ |
*/ |
if (m->m_pkthdr.len < off + sizeof(fh)) |
if (m->m_pkthdr.len < off + sizeof(fh)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(fh), (caddr_t)&fh); |
m_copydata(m, off, sizeof(fh), (void *)&fh); |
if ((fh.ip6f_offlg & IP6F_OFF_MASK) != 0) |
if ((fh.ip6f_offlg & IP6F_OFF_MASK) != 0) |
return -1; |
return -1; |
if (nxtp) |
if (nxtp) |
Line 1491 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1503 ip6_nexthdr(m, off, proto, nxtp) |
|
case IPPROTO_AH: |
case IPPROTO_AH: |
if (m->m_pkthdr.len < off + sizeof(ip6e)) |
if (m->m_pkthdr.len < off + sizeof(ip6e)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(ip6e), (caddr_t)&ip6e); |
m_copydata(m, off, sizeof(ip6e), (void *)&ip6e); |
if (nxtp) |
if (nxtp) |
*nxtp = ip6e.ip6e_nxt; |
*nxtp = ip6e.ip6e_nxt; |
off += (ip6e.ip6e_len + 2) << 2; |
off += (ip6e.ip6e_len + 2) << 2; |
Line 1504 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1516 ip6_nexthdr(m, off, proto, nxtp) |
|
case IPPROTO_DSTOPTS: |
case IPPROTO_DSTOPTS: |
if (m->m_pkthdr.len < off + sizeof(ip6e)) |
if (m->m_pkthdr.len < off + sizeof(ip6e)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(ip6e), (caddr_t)&ip6e); |
m_copydata(m, off, sizeof(ip6e), (void *)&ip6e); |
if (nxtp) |
if (nxtp) |
*nxtp = ip6e.ip6e_nxt; |
*nxtp = ip6e.ip6e_nxt; |
off += (ip6e.ip6e_len + 1) << 3; |
off += (ip6e.ip6e_len + 1) << 3; |
|
|
m_tag_delete(m, mtag); |
m_tag_delete(m, mtag); |
} |
} |
|
|
|
#ifdef GATEWAY |
|
/* |
|
* sysctl helper routine for net.inet.ip6.maxflows. Since |
|
* we could reduce this value, call ip6flow_reap(); |
|
*/ |
static int |
static int |
sysctl_net_inet6_ip6_rht0(SYSCTLFN_ARGS) |
sysctl_net_inet_ip6_maxflows(SYSCTLFN_ARGS) |
{ |
{ |
int error, tmp; |
int s; |
struct sysctlnode node; |
|
|
s = sysctl_lookup(SYSCTLFN_CALL(rnode)); |
node = *rnode; |
if (s) |
tmp = ip6_rht0; |
return (s); |
node.sysctl_data = &tmp; |
|
error = sysctl_lookup(SYSCTLFN_CALL(&node)); |
s = splsoftnet(); |
if (error || newp == NULL) |
ip6flow_reap(0); |
return error; |
splx(s); |
|
|
switch (tmp) { |
return (0); |
case -1: /* disable processing */ |
|
case 0: /* disable for host, enable for router */ |
|
case 1: /* enable for all */ |
|
break; |
|
default: |
|
return EINVAL; |
|
} |
|
ip6_rht0 = tmp; |
|
return 0; |
|
} |
} |
|
#endif /* GATEWAY */ |
|
|
/* |
/* |
* System control for IP6 |
* System control for IP6 |
Line 1901 SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, |
|
Line 1910 SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, |
|
NULL, 0, &ip6_mcast_pmtu, 0, |
NULL, 0, &ip6_mcast_pmtu, 0, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
CTL_CREATE, CTL_EOL); |
CTL_CREATE, CTL_EOL); |
|
#ifdef GATEWAY |
sysctl_createv(clog, 0, NULL, NULL, |
sysctl_createv(clog, 0, NULL, NULL, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
CTLTYPE_INT, "rht0", |
CTLTYPE_INT, "maxflows", |
SYSCTL_DESCR("Processing of routing header type 0 (IPv6)"), |
SYSCTL_DESCR("Number of flows for fast forwarding (IPv6)"), |
sysctl_net_inet6_ip6_rht0, 0, &ip6_rht0, 0, |
sysctl_net_inet_ip6_maxflows, 0, &ip6_maxflows, 0, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
CTL_CREATE, CTL_EOL); |
CTL_CREATE, CTL_EOL); |
|
#endif |
} |
} |