亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? simple-beet-and-interfamily-2.6.17.9-v1.patch

?? Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela
?? PATCH
?? 第 1 頁 / 共 4 頁
字號:
+		 *    section 3.1.2+		 */+		if (!x->props.mode)+			skb->ip_summed = CHECKSUM_UNNECESSARY;+	}++	iph->protocol = nexthdr[1];+	pskb_trim(skb, skb->len - alen - padlen - 2);+	memcpy(workbuf, skb->nh.raw, iph->ihl*4);+	skb->h.raw = skb_pull(skb, sizeof(struct ip_esp_hdr) + esp->conf.ivlen);+	skb->nh.raw += encap_len + sizeof(struct ip_esp_hdr) + esp->conf.ivlen;+	memcpy(skb->nh.raw, workbuf, iph->ihl*4);+	skb->nh.iph->tot_len = htons(skb->len);++	return 0;++out:+	return -EINVAL;+}++static u32 esp4_get_max_size(struct xfrm_state *x, int mtu)+{+	struct esp_data *esp = x->data;+	u32 blksize = ALIGN(crypto_tfm_alg_blocksize(esp->conf.tfm), 4);++	if (x->props.mode) {+		mtu = ALIGN(mtu + 2, blksize);+	} else {+		/* The worst case. */+		mtu = ALIGN(mtu + 2, 4) + blksize - 4;+	}+	if (esp->conf.padlen)+		mtu = ALIGN(mtu, esp->conf.padlen);++	return mtu + x->props.header_len + esp->auth.icv_trunc_len;+}++static void esp4_err(struct sk_buff *skb, u32 info)+{+	struct iphdr *iph = (struct iphdr*)skb->data;+	struct ip_esp_hdr *esph = (struct ip_esp_hdr*)(skb->data+(iph->ihl<<2));+	struct xfrm_state *x;++	if (skb->h.icmph->type != ICMP_DEST_UNREACH ||+	    skb->h.icmph->code != ICMP_FRAG_NEEDED)+		return;++	x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, esph->spi, IPPROTO_ESP, AF_INET);+	if (!x)+		return;+	NETDEBUG(KERN_DEBUG "pmtu discovery on SA ESP/%08x/%08x\n",+		 ntohl(esph->spi), ntohl(iph->daddr));+	xfrm_state_put(x);+}++static void esp_destroy(struct xfrm_state *x)+{+	struct esp_data *esp = x->data;++	if (!esp)+		return;++	crypto_free_tfm(esp->conf.tfm);+	esp->conf.tfm = NULL;+	kfree(esp->conf.ivec);+	esp->conf.ivec = NULL;+	crypto_free_tfm(esp->auth.tfm);+	esp->auth.tfm = NULL;+	kfree(esp->auth.work_icv);+	esp->auth.work_icv = NULL;+	kfree(esp);+}++static int esp_init_state(struct xfrm_state *x)+{+	struct esp_data *esp = NULL;++	/* null auth and encryption can have zero length keys */+	if (x->aalg) {+		if (x->aalg->alg_key_len > 512)+			goto error;+	}+	if (x->ealg == NULL)+		goto error;++	esp = kmalloc(sizeof(*esp), GFP_KERNEL);+	if (esp == NULL)+		return -ENOMEM;++	memset(esp, 0, sizeof(*esp));++	if (x->aalg) {+		struct xfrm_algo_desc *aalg_desc;++		esp->auth.key = x->aalg->alg_key;+		esp->auth.key_len = (x->aalg->alg_key_len+7)/8;+		esp->auth.tfm = crypto_alloc_tfm(x->aalg->alg_name, 0);+		if (esp->auth.tfm == NULL)+			goto error;+		esp->auth.icv = esp_hmac_digest;++		aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0);+		BUG_ON(!aalg_desc);++		if (aalg_desc->uinfo.auth.icv_fullbits/8 !=+		    crypto_tfm_alg_digestsize(esp->auth.tfm)) {+			NETDEBUG(KERN_INFO "ESP: %s digestsize %u != %hu\n",+				 x->aalg->alg_name,+				 crypto_tfm_alg_digestsize(esp->auth.tfm),+				 aalg_desc->uinfo.auth.icv_fullbits/8);+			goto error;+		}++		esp->auth.icv_full_len = aalg_desc->uinfo.auth.icv_fullbits/8;+		esp->auth.icv_trunc_len = aalg_desc->uinfo.auth.icv_truncbits/8;++		esp->auth.work_icv = kmalloc(esp->auth.icv_full_len, GFP_KERNEL);+		if (!esp->auth.work_icv)+			goto error;+	}+	esp->conf.key = x->ealg->alg_key;+	esp->conf.key_len = (x->ealg->alg_key_len+7)/8;+	if (x->props.ealgo == SADB_EALG_NULL)+		esp->conf.tfm = crypto_alloc_tfm(x->ealg->alg_name, CRYPTO_TFM_MODE_ECB);+	else+		esp->conf.tfm = crypto_alloc_tfm(x->ealg->alg_name, CRYPTO_TFM_MODE_CBC);+	if (esp->conf.tfm == NULL)+		goto error;+	esp->conf.ivlen = crypto_tfm_alg_ivsize(esp->conf.tfm);+	esp->conf.padlen = 0;+	if (esp->conf.ivlen) {+		esp->conf.ivec = kmalloc(esp->conf.ivlen, GFP_KERNEL);+		if (unlikely(esp->conf.ivec == NULL))+			goto error;+		get_random_bytes(esp->conf.ivec, esp->conf.ivlen);+	}+	if (crypto_cipher_setkey(esp->conf.tfm, esp->conf.key, esp->conf.key_len))+		goto error;+	x->props.header_len = sizeof(struct ip_esp_hdr) + esp->conf.ivlen;+	if (x->props.mode)+		x->props.header_len += sizeof(struct iphdr);+	if (x->encap) {+		struct xfrm_encap_tmpl *encap = x->encap;++		switch (encap->encap_type) {+		default:+			goto error;+		case UDP_ENCAP_ESPINUDP:+			x->props.header_len += sizeof(struct udphdr);+			break;+		case UDP_ENCAP_ESPINUDP_NON_IKE:+			x->props.header_len += sizeof(struct udphdr) + 2 * sizeof(u32);+			break;+		}+	}+	x->data = esp;+	x->props.trailer_len = esp4_get_max_size(x, 0) - x->props.header_len;+	return 0;++error:+	x->data = esp;+	esp_destroy(x);+	x->data = NULL;+	return -EINVAL;+}++static struct xfrm_type esp_type =+{+	.description	= "ESP4",+	.owner		= THIS_MODULE,+	.proto	     	= IPPROTO_ESP,+	.init_state	= esp_init_state,+	.destructor	= esp_destroy,+	.get_max_size	= esp4_get_max_size,+	.input		= esp_input,+	.output		= esp_output+};++static struct net_protocol esp4_protocol = {+	.handler	=	xfrm4_rcv,+	.err_handler	=	esp4_err,+	.no_policy	=	1,+};++static int __init esp4_init(void)+{+	if (xfrm_register_type(&esp_type, AF_INET) < 0) {+		printk(KERN_INFO "ip esp init: can't add xfrm type\n");+		return -EAGAIN;+	}+	if (inet_add_protocol(&esp4_protocol, IPPROTO_ESP) < 0) {+		printk(KERN_INFO "ip esp init: can't add protocol\n");+		xfrm_unregister_type(&esp_type, AF_INET);+		return -EAGAIN;+	}+	return 0;+}++static void __exit esp4_fini(void)+{+	if (inet_del_protocol(&esp4_protocol, IPPROTO_ESP) < 0)+		printk(KERN_INFO "ip esp close: can't remove protocol\n");+	if (xfrm_unregister_type(&esp_type, AF_INET) < 0)+		printk(KERN_INFO "ip esp close: can't remove xfrm type\n");+}++module_init(esp4_init);+module_exit(esp4_fini);+MODULE_LICENSE("GPL");diff -urN linux-2.6.17.9/net/ipv4/ipcomp.c linux-2.6.17.9.hipl/net/ipv4/ipcomp.c--- linux-2.6.17.9/net/ipv4/ipcomp.c	2006-08-18 19:26:24.000000000 +0300+++ linux-2.6.17.9.hipl/net/ipv4/ipcomp.c	2006-12-18 15:01:03.000000000 +0200@@ -194,7 +194,7 @@ 	return 0;  out_ok:-	if (x->props.mode)+	if (x->props.mode == XFRM_MODE_TUNNEL) 		ip_send_check(iph); 	return 0; }@@ -234,7 +234,7 @@ 	t->id.daddr.a4 = x->id.daddr.a4; 	memcpy(&t->sel, &x->sel, sizeof(t->sel)); 	t->props.family = AF_INET;-	t->props.mode = 1;+	t->props.mode = x->props.mode; 	t->props.saddr.a4 = x->props.saddr.a4; 	t->props.flags = x->props.flags; @@ -434,8 +434,10 @@  	memset(ipcd, 0, sizeof(*ipcd)); 	x->props.header_len = 0;-	if (x->props.mode)+	if (x->props.mode == XFRM_MODE_TUNNEL) 		x->props.header_len += sizeof(struct iphdr);+	else if (x->props.mode == XFRM_MODE_BEET)+		x->props.header_len += IPV4_BEET_PHMAXLEN;  	mutex_lock(&ipcomp_resource_mutex); 	if (!ipcomp_alloc_scratches())@@ -446,7 +448,7 @@ 		goto error; 	mutex_unlock(&ipcomp_resource_mutex); -	if (x->props.mode) {+	if (x->props.mode == XFRM_MODE_TUNNEL) { 		err = ipcomp_tunnel_attach(x); 		if (err) 			goto error_tunnel;diff -urN linux-2.6.17.9/net/ipv4/xfrm4_input.c linux-2.6.17.9.hipl/net/ipv4/xfrm4_input.c--- linux-2.6.17.9/net/ipv4/xfrm4_input.c	2006-08-18 19:26:24.000000000 +0300+++ linux-2.6.17.9.hipl/net/ipv4/xfrm4_input.c	2006-12-18 15:01:04.000000000 +0200@@ -115,16 +115,29 @@  		iph = skb->nh.iph; -		if (x->props.mode) {-			if (iph->protocol != IPPROTO_IPIP)-				goto drop;-			if (!pskb_may_pull(skb, sizeof(struct iphdr)))-				goto drop;-			if (skb_cloned(skb) &&-			    pskb_expand_head(skb, 0, 0, GFP_ATOMIC))-				goto drop;-			if (x->props.flags & XFRM_STATE_DECAP_DSCP)-				ipv4_copy_dscp(iph, skb->h.ipiph);+		if (x->props.mode == XFRM_MODE_TUNNEL) {+			if (x->sel.family == AF_INET) {+				if (iph->protocol != IPPROTO_IPIP)+					goto drop;+				if (!pskb_may_pull(skb, sizeof(struct iphdr)))+					goto drop;+				if (skb_cloned(skb) &&+				    pskb_expand_head(skb, 0, 0, GFP_ATOMIC))+					goto drop;+				if (x->props.flags & XFRM_STATE_DECAP_DSCP)+					ipv4_copy_dscp(iph, skb->h.ipiph);+			} else if (x->sel.family == AF_INET6) {+				/* Inner = 6, Outer = 4 */+				if (skb->nh.iph->protocol != IPPROTO_IPV6)+					goto drop;++				if (skb_cloned(skb) &&+				    pskb_expand_head(skb, 0, 0, GFP_ATOMIC))+					goto drop;+				skb->protocol = htons(ETH_P_IPV6);+			} else+				BUG_ON(1);+ 			if (!(x->props.flags & XFRM_STATE_NOECN)) 				ipip_ecn_decapsulate(skb); 			skb->mac.raw = memmove(skb->data - skb->mac_len,@@ -133,6 +146,84 @@ 			memset(&(IPCB(skb)->opt), 0, sizeof(struct ip_options)); 			decaps = 1; 			break;+		} else if (x->props.mode == XFRM_MODE_BEET) {+			int phlen = 0;+			int optlen = 0;+			__u8 ph_nexthdr = 0;+			int size = (x->sel.family == AF_INET) ? sizeof(struct iphdr) : sizeof(struct ipv6hdr);+			int proto = skb->nh.iph->protocol;+			int hops = skb->nh.iph->ttl;+			int delta = sizeof(struct ipv6hdr) - sizeof(struct iphdr);+			if (x->sel.family == AF_INET6) {+				/* Here, the inner family is 6, therefore I have to+				 * substitute the IPhdr by enlarging it */+				if (skb_tailroom(skb) <  delta){+					if (pskb_expand_head(skb, 0, delta, GFP_ATOMIC))+						return -EINVAL;		//Just returning from here.+				}+				skb->nh.raw -= delta;+			} else if (x->sel.family == AF_INET) {+				// We need to extract the PH+				struct ip_beet_phdr *ph = (struct ip_beet_phdr*)(skb->nh.iph + 1);++				if (proto == IPPROTO_BEETPH) {+					if (!pskb_may_pull(skb, sizeof(*ph)))+						goto drop;+					phlen = ph->hdrlen * 8;+					optlen = phlen - ph->padlen - sizeof(*ph);++					if (optlen < 0 || optlen & 3 || optlen > 250)+						goto drop;+					if (!pskb_may_pull(skb, phlen))+						goto drop;++					ph_nexthdr = ph->nexthdr;+				}+			} else+				BUG_ON(1);+++			if (skb_cloned(skb) &&+			    pskb_expand_head(skb, 0, 0, GFP_ATOMIC))+				goto drop;++			skb_push(skb, size);+			memmove(skb->data, skb->nh.raw, size);+			skb->nh.raw = skb->data;++			if (x->sel.family == AF_INET) {+				struct iphdr *iph = skb->nh.iph;++				if (unlikely(phlen)) {+					skb_pull(skb, phlen - optlen);+					memmove(skb->data, skb->nh.raw, sizeof(*iph));+					skb->nh.raw = skb->data;+					iph = skb->nh.iph;+				}++				iph->ihl = (sizeof(*iph) + optlen) / 4;+				iph->tot_len = htons(skb->len);+				iph->daddr = x->sel.daddr.a4;+				iph->saddr = x->sel.saddr.a4;+				if (ph_nexthdr)+					iph->protocol = ph_nexthdr;+				else+					iph->protocol = proto;+				ip_send_check(iph);+			} else if (x->sel.family == AF_INET6) {+				struct ipv6hdr *ip6h = skb->nh.ipv6h;+				memset(ip6h->flow_lbl, 0, sizeof(ip6h->flow_lbl));+				ip6h->version = 6;+				ip6h->priority = 0;+				ip6h->nexthdr = proto;+				ip6h->hop_limit = hops;+				ip6h->payload_len = htons(skb->len - size);+				ipv6_addr_copy(&ip6h->daddr, (struct in6_addr *)&x->sel.daddr.a6);+				ipv6_addr_copy(&ip6h->saddr, (struct in6_addr *)&x->sel.saddr.a6);+				skb->protocol = htons(ETH_P_IPV6);+			}+			decaps = 1;+			break; 		}  		if ((err = xfrm_parse_spi(skb, skb->nh.iph->protocol, &spi, &seq)) < 0)diff -urN linux-2.6.17.9/net/ipv4/xfrm4_output.c linux-2.6.17.9.hipl/net/ipv4/xfrm4_output.c--- linux-2.6.17.9/net/ipv4/xfrm4_output.c	2006-08-18 19:26:24.000000000 +0300+++ linux-2.6.17.9.hipl/net/ipv4/xfrm4_output.c	2006-12-18 15:01:04.000000000 +0200@@ -32,45 +32,131 @@  */ static void xfrm4_encap(struct sk_buff *skb) {-	struct dst_entry *dst = skb->dst;-	struct xfrm_state *x = dst->xfrm;-	struct iphdr *iph, *top_iph;-	int flags;--	iph = skb->nh.iph;-	skb->h.ipiph = iph;--	skb->nh.raw = skb_push(skb, x->props.header_len);-	top_iph = skb->nh.iph;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久麻豆一区二区| 亚洲综合区在线| 亚洲色图第一区| 美女免费视频一区| 91免费小视频| 国产午夜精品久久久久久免费视| 亚洲一区二区视频在线| 7777女厕盗摄久久久| 中文字幕视频一区二区三区久| 蜜臀av一区二区在线免费观看| 91丝袜呻吟高潮美腿白嫩在线观看| 精品久久国产97色综合| 午夜久久福利影院| 一本高清dvd不卡在线观看| 久久精品一区二区| 麻豆91小视频| 91精品国产91热久久久做人人| 1024亚洲合集| 波多野结衣中文字幕一区二区三区| 日韩欧美一级二级三级| 视频在线观看91| 欧日韩精品视频| 亚洲人一二三区| 99精品黄色片免费大全| 日本一区二区视频在线观看| 捆绑变态av一区二区三区| 欧美日本一区二区在线观看| 亚洲伦在线观看| av在线不卡电影| 中文字幕亚洲成人| 99re成人在线| 1区2区3区欧美| 91麻豆免费视频| 亚洲欧美日韩国产综合| av成人老司机| 亚洲色图欧美在线| 91久久免费观看| 亚洲精品欧美二区三区中文字幕| 91网站最新网址| 悠悠色在线精品| 91国产视频在线观看| 亚洲欧美激情小说另类| 在线一区二区三区四区| 亚洲地区一二三色| 91精品麻豆日日躁夜夜躁| 天天色天天操综合| 欧美mv日韩mv| 国产精品18久久久久久久久| 国产精品久久综合| 色婷婷综合激情| 亚洲第一主播视频| 欧美电视剧在线观看完整版| 国产精品自拍三区| 最新热久久免费视频| 欧美日韩视频第一区| 麻豆极品一区二区三区| 国产午夜精品一区二区三区嫩草 | 欧美精品一区二区三区蜜臀| 国产在线精品国自产拍免费| 久久精品免费在线观看| 99re在线精品| 美腿丝袜在线亚洲一区| 久久久久99精品国产片| 色天天综合色天天久久| 日本三级亚洲精品| 日本一区二区免费在线观看视频| 一本色道a无线码一区v| 欧美性大战久久久久久久| 视频一区二区三区入口| 久久久国产午夜精品| 色哟哟欧美精品| 久久97超碰国产精品超碰| 亚洲欧洲无码一区二区三区| 欧美精品日日鲁夜夜添| 国产精品69久久久久水密桃| 亚洲一二三区不卡| 欧美激情综合五月色丁香小说| 在线观看日产精品| 国产精品一二三区| 亚洲一级在线观看| 国产欧美一区视频| 欧美精品aⅴ在线视频| 成人高清视频免费观看| 日本欧美在线看| 亚洲图片激情小说| 久久一区二区三区国产精品| 日本丶国产丶欧美色综合| 国产福利91精品| 蜜桃av一区二区在线观看| 亚洲欧美日韩综合aⅴ视频| 久久综合999| 56国语精品自产拍在线观看| 99re这里都是精品| 国产成a人亚洲| 麻豆国产精品官网| 亚洲电影中文字幕在线观看| 国产精品久久久久久亚洲毛片| 欧美一区二区高清| 欧美日韩午夜在线视频| 色天天综合久久久久综合片| 成人妖精视频yjsp地址| 国产一区二区不卡老阿姨| 免费看欧美美女黄的网站| 亚洲午夜一区二区| 国产一区二区成人久久免费影院 | 国产精品五月天| 久久免费国产精品| 精品国产乱码久久久久久浪潮| 欧美日韩国产综合草草| 欧美午夜精品一区二区三区| 91浏览器在线视频| 91麻豆成人久久精品二区三区| 成人av电影在线网| 成人黄色av电影| 波多野结衣精品在线| eeuss鲁片一区二区三区在线看| 国产传媒一区在线| 懂色av一区二区夜夜嗨| 国产成人亚洲精品青草天美| 国产精品综合av一区二区国产馆| 久久国产免费看| 国产一区二区三区最好精华液| 久久超级碰视频| 国产精品一区二区在线播放 | 99国产麻豆精品| 91偷拍与自偷拍精品| 在线观看欧美黄色| 欧美精品久久久久久久久老牛影院| 欧美另类z0zxhd电影| 欧美一区二区三区男人的天堂| 欧美成人video| 国产亚洲精久久久久久| 国产精品久久久久久久浪潮网站| 中文字幕一区二区5566日韩| 亚洲欧美日韩在线播放| 亚洲成av人综合在线观看| 青青草国产精品97视觉盛宴| 精品中文字幕一区二区小辣椒| 国内精品免费在线观看| 白白色亚洲国产精品| 在线观看精品一区| 欧美一区二区三区在| 久久久www成人免费无遮挡大片 | 91丝袜美腿高跟国产极品老师| 色狠狠一区二区三区香蕉| 欧美性xxxxxxxx| 精品第一国产综合精品aⅴ| 国产精品三级av| 丝袜美腿亚洲一区二区图片| 国产综合色视频| 在线一区二区三区做爰视频网站| 欧美一区二区三区视频| 国产精品视频在线看| 亚洲123区在线观看| 国产成人av一区二区| 91国产免费观看| 久久久久久久久久久久电影| 亚洲毛片av在线| 色天天综合久久久久综合片| 欧美一区二区三区性视频| 中文在线免费一区三区高中清不卡| 夜夜嗨av一区二区三区中文字幕| 久久精品二区亚洲w码| 成人av在线资源网| 日韩欧美中文字幕一区| 综合在线观看色| 精品亚洲国内自在自线福利| 色中色一区二区| 久久婷婷久久一区二区三区| 亚洲一区二区三区国产| 夫妻av一区二区| 日韩午夜精品视频| 一区二区成人在线观看| 国产一区二区精品久久91| 欧美日韩高清一区| 亚洲欧美日韩国产手机在线| 极品美女销魂一区二区三区免费| 91蜜桃视频在线| 国产日本欧美一区二区| 美国一区二区三区在线播放| 91黄色在线观看| 中文字幕高清一区| 国内精品视频一区二区三区八戒| 欧美午夜一区二区三区| 国产精品国产a| 国产风韵犹存在线视精品| 欧美一卡在线观看| 亚洲.国产.中文慕字在线| 不卡的看片网站| 国产精品色眯眯| 国产乱国产乱300精品| 日韩色在线观看| 日av在线不卡| 欧美美女一区二区三区| 艳妇臀荡乳欲伦亚洲一区| 91麻豆精品秘密| 亚洲精品乱码久久久久久久久| 91在线云播放| 亚洲六月丁香色婷婷综合久久| 粉嫩一区二区三区性色av|