From patchwork Wed Jan 8 08:53:12 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "fan.du" X-Patchwork-Id: 308096 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 933612C00B6 for ; Wed, 8 Jan 2014 19:55:44 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756741AbaAHIxc (ORCPT ); Wed, 8 Jan 2014 03:53:32 -0500 Received: from mail.windriver.com ([147.11.1.11]:42451 "EHLO mail.windriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755595AbaAHIxU (ORCPT ); Wed, 8 Jan 2014 03:53:20 -0500 Received: from ALA-HCA.corp.ad.wrs.com (ala-hca.corp.ad.wrs.com [147.11.189.40]) by mail.windriver.com (8.14.5/8.14.5) with ESMTP id s088rHvA009544 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 8 Jan 2014 00:53:17 -0800 (PST) Received: from iamroot-OptiPlex-780.corp.ad.wrs.com (128.224.162.236) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.2.347.0; Wed, 8 Jan 2014 00:53:17 -0800 From: Fan Du To: CC: , Subject: [PATCH net-next 3/3] xfrm: Don't prohibit AH from using ESN feature Date: Wed, 8 Jan 2014 16:53:12 +0800 Message-ID: <1389171192-28091-4-git-send-email-fan.du@windriver.com> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1389171192-28091-1-git-send-email-fan.du@windriver.com> References: <1389171192-28091-1-git-send-email-fan.du@windriver.com> MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Clear checking when user try to use ESN through netlink keymgr for AH. Signed-off-by: Fan Du --- net/xfrm/xfrm_user.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index 97681a3..f362a78 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c @@ -141,10 +141,6 @@ static inline int verify_replay(struct xfrm_usersa_info *p, if (!rt) return 0; - - if (p->id.proto != IPPROTO_ESP) - return -EINVAL; - if (p->replay_window != 0) return -EINVAL;