diff options
Diffstat (limited to 'net')
-rw-r--r-- | net/key/af_key.c | 39 | ||||
-rw-r--r-- | net/xfrm/xfrm_algo.c | 65 |
2 files changed, 90 insertions, 14 deletions
diff --git a/net/key/af_key.c b/net/key/af_key.c index 6a6e68479b97..cb75f9b3105e 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c | |||
@@ -815,18 +815,21 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, | |||
815 | sa->sadb_sa_auth = 0; | 815 | sa->sadb_sa_auth = 0; |
816 | if (x->aalg) { | 816 | if (x->aalg) { |
817 | struct xfrm_algo_desc *a = xfrm_aalg_get_byname(x->aalg->alg_name, 0); | 817 | struct xfrm_algo_desc *a = xfrm_aalg_get_byname(x->aalg->alg_name, 0); |
818 | sa->sadb_sa_auth = a ? a->desc.sadb_alg_id : 0; | 818 | sa->sadb_sa_auth = (a && a->pfkey_supported) ? |
819 | a->desc.sadb_alg_id : 0; | ||
819 | } | 820 | } |
820 | sa->sadb_sa_encrypt = 0; | 821 | sa->sadb_sa_encrypt = 0; |
821 | BUG_ON(x->ealg && x->calg); | 822 | BUG_ON(x->ealg && x->calg); |
822 | if (x->ealg) { | 823 | if (x->ealg) { |
823 | struct xfrm_algo_desc *a = xfrm_ealg_get_byname(x->ealg->alg_name, 0); | 824 | struct xfrm_algo_desc *a = xfrm_ealg_get_byname(x->ealg->alg_name, 0); |
824 | sa->sadb_sa_encrypt = a ? a->desc.sadb_alg_id : 0; | 825 | sa->sadb_sa_encrypt = (a && a->pfkey_supported) ? |
826 | a->desc.sadb_alg_id : 0; | ||
825 | } | 827 | } |
826 | /* KAME compatible: sadb_sa_encrypt is overloaded with calg id */ | 828 | /* KAME compatible: sadb_sa_encrypt is overloaded with calg id */ |
827 | if (x->calg) { | 829 | if (x->calg) { |
828 | struct xfrm_algo_desc *a = xfrm_calg_get_byname(x->calg->alg_name, 0); | 830 | struct xfrm_algo_desc *a = xfrm_calg_get_byname(x->calg->alg_name, 0); |
829 | sa->sadb_sa_encrypt = a ? a->desc.sadb_alg_id : 0; | 831 | sa->sadb_sa_encrypt = (a && a->pfkey_supported) ? |
832 | a->desc.sadb_alg_id : 0; | ||
830 | } | 833 | } |
831 | 834 | ||
832 | sa->sadb_sa_flags = 0; | 835 | sa->sadb_sa_flags = 0; |
@@ -1137,7 +1140,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, | |||
1137 | if (sa->sadb_sa_auth) { | 1140 | if (sa->sadb_sa_auth) { |
1138 | int keysize = 0; | 1141 | int keysize = 0; |
1139 | struct xfrm_algo_desc *a = xfrm_aalg_get_byid(sa->sadb_sa_auth); | 1142 | struct xfrm_algo_desc *a = xfrm_aalg_get_byid(sa->sadb_sa_auth); |
1140 | if (!a) { | 1143 | if (!a || !a->pfkey_supported) { |
1141 | err = -ENOSYS; | 1144 | err = -ENOSYS; |
1142 | goto out; | 1145 | goto out; |
1143 | } | 1146 | } |
@@ -1159,7 +1162,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, | |||
1159 | if (sa->sadb_sa_encrypt) { | 1162 | if (sa->sadb_sa_encrypt) { |
1160 | if (hdr->sadb_msg_satype == SADB_X_SATYPE_IPCOMP) { | 1163 | if (hdr->sadb_msg_satype == SADB_X_SATYPE_IPCOMP) { |
1161 | struct xfrm_algo_desc *a = xfrm_calg_get_byid(sa->sadb_sa_encrypt); | 1164 | struct xfrm_algo_desc *a = xfrm_calg_get_byid(sa->sadb_sa_encrypt); |
1162 | if (!a) { | 1165 | if (!a || !a->pfkey_supported) { |
1163 | err = -ENOSYS; | 1166 | err = -ENOSYS; |
1164 | goto out; | 1167 | goto out; |
1165 | } | 1168 | } |
@@ -1171,7 +1174,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, | |||
1171 | } else { | 1174 | } else { |
1172 | int keysize = 0; | 1175 | int keysize = 0; |
1173 | struct xfrm_algo_desc *a = xfrm_ealg_get_byid(sa->sadb_sa_encrypt); | 1176 | struct xfrm_algo_desc *a = xfrm_ealg_get_byid(sa->sadb_sa_encrypt); |
1174 | if (!a) { | 1177 | if (!a || !a->pfkey_supported) { |
1175 | err = -ENOSYS; | 1178 | err = -ENOSYS; |
1176 | goto out; | 1179 | goto out; |
1177 | } | 1180 | } |
@@ -1577,13 +1580,13 @@ static struct sk_buff *compose_sadb_supported(const struct sadb_msg *orig, | |||
1577 | struct sadb_msg *hdr; | 1580 | struct sadb_msg *hdr; |
1578 | int len, auth_len, enc_len, i; | 1581 | int len, auth_len, enc_len, i; |
1579 | 1582 | ||
1580 | auth_len = xfrm_count_auth_supported(); | 1583 | auth_len = xfrm_count_pfkey_auth_supported(); |
1581 | if (auth_len) { | 1584 | if (auth_len) { |
1582 | auth_len *= sizeof(struct sadb_alg); | 1585 | auth_len *= sizeof(struct sadb_alg); |
1583 | auth_len += sizeof(struct sadb_supported); | 1586 | auth_len += sizeof(struct sadb_supported); |
1584 | } | 1587 | } |
1585 | 1588 | ||
1586 | enc_len = xfrm_count_enc_supported(); | 1589 | enc_len = xfrm_count_pfkey_enc_supported(); |
1587 | if (enc_len) { | 1590 | if (enc_len) { |
1588 | enc_len *= sizeof(struct sadb_alg); | 1591 | enc_len *= sizeof(struct sadb_alg); |
1589 | enc_len += sizeof(struct sadb_supported); | 1592 | enc_len += sizeof(struct sadb_supported); |
@@ -1614,6 +1617,8 @@ static struct sk_buff *compose_sadb_supported(const struct sadb_msg *orig, | |||
1614 | struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(i); | 1617 | struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(i); |
1615 | if (!aalg) | 1618 | if (!aalg) |
1616 | break; | 1619 | break; |
1620 | if (!aalg->pfkey_supported) | ||
1621 | continue; | ||
1617 | if (aalg->available) | 1622 | if (aalg->available) |
1618 | *ap++ = aalg->desc; | 1623 | *ap++ = aalg->desc; |
1619 | } | 1624 | } |
@@ -1633,6 +1638,8 @@ static struct sk_buff *compose_sadb_supported(const struct sadb_msg *orig, | |||
1633 | struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); | 1638 | struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); |
1634 | if (!ealg) | 1639 | if (!ealg) |
1635 | break; | 1640 | break; |
1641 | if (!ealg->pfkey_supported) | ||
1642 | continue; | ||
1636 | if (ealg->available) | 1643 | if (ealg->available) |
1637 | *ap++ = ealg->desc; | 1644 | *ap++ = ealg->desc; |
1638 | } | 1645 | } |
@@ -2824,6 +2831,8 @@ static int count_ah_combs(const struct xfrm_tmpl *t) | |||
2824 | const struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(i); | 2831 | const struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(i); |
2825 | if (!aalg) | 2832 | if (!aalg) |
2826 | break; | 2833 | break; |
2834 | if (!aalg->pfkey_supported) | ||
2835 | continue; | ||
2827 | if (aalg_tmpl_set(t, aalg) && aalg->available) | 2836 | if (aalg_tmpl_set(t, aalg) && aalg->available) |
2828 | sz += sizeof(struct sadb_comb); | 2837 | sz += sizeof(struct sadb_comb); |
2829 | } | 2838 | } |
@@ -2839,6 +2848,9 @@ static int count_esp_combs(const struct xfrm_tmpl *t) | |||
2839 | if (!ealg) | 2848 | if (!ealg) |
2840 | break; | 2849 | break; |
2841 | 2850 | ||
2851 | if (!ealg->pfkey_supported) | ||
2852 | continue; | ||
2853 | |||
2842 | if (!(ealg_tmpl_set(t, ealg) && ealg->available)) | 2854 | if (!(ealg_tmpl_set(t, ealg) && ealg->available)) |
2843 | continue; | 2855 | continue; |
2844 | 2856 | ||
@@ -2847,6 +2859,9 @@ static int count_esp_combs(const struct xfrm_tmpl *t) | |||
2847 | if (!aalg) | 2859 | if (!aalg) |
2848 | break; | 2860 | break; |
2849 | 2861 | ||
2862 | if (!aalg->pfkey_supported) | ||
2863 | continue; | ||
2864 | |||
2850 | if (aalg_tmpl_set(t, aalg) && aalg->available) | 2865 | if (aalg_tmpl_set(t, aalg) && aalg->available) |
2851 | sz += sizeof(struct sadb_comb); | 2866 | sz += sizeof(struct sadb_comb); |
2852 | } | 2867 | } |
@@ -2870,6 +2885,9 @@ static void dump_ah_combs(struct sk_buff *skb, const struct xfrm_tmpl *t) | |||
2870 | if (!aalg) | 2885 | if (!aalg) |
2871 | break; | 2886 | break; |
2872 | 2887 | ||
2888 | if (!aalg->pfkey_supported) | ||
2889 | continue; | ||
2890 | |||
2873 | if (aalg_tmpl_set(t, aalg) && aalg->available) { | 2891 | if (aalg_tmpl_set(t, aalg) && aalg->available) { |
2874 | struct sadb_comb *c; | 2892 | struct sadb_comb *c; |
2875 | c = (struct sadb_comb*)skb_put(skb, sizeof(struct sadb_comb)); | 2893 | c = (struct sadb_comb*)skb_put(skb, sizeof(struct sadb_comb)); |
@@ -2902,6 +2920,9 @@ static void dump_esp_combs(struct sk_buff *skb, const struct xfrm_tmpl *t) | |||
2902 | if (!ealg) | 2920 | if (!ealg) |
2903 | break; | 2921 | break; |
2904 | 2922 | ||
2923 | if (!ealg->pfkey_supported) | ||
2924 | continue; | ||
2925 | |||
2905 | if (!(ealg_tmpl_set(t, ealg) && ealg->available)) | 2926 | if (!(ealg_tmpl_set(t, ealg) && ealg->available)) |
2906 | continue; | 2927 | continue; |
2907 | 2928 | ||
@@ -2910,6 +2931,8 @@ static void dump_esp_combs(struct sk_buff *skb, const struct xfrm_tmpl *t) | |||
2910 | const struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(k); | 2931 | const struct xfrm_algo_desc *aalg = xfrm_aalg_get_byidx(k); |
2911 | if (!aalg) | 2932 | if (!aalg) |
2912 | break; | 2933 | break; |
2934 | if (!aalg->pfkey_supported) | ||
2935 | continue; | ||
2913 | if (!(aalg_tmpl_set(t, aalg) && aalg->available)) | 2936 | if (!(aalg_tmpl_set(t, aalg) && aalg->available)) |
2914 | continue; | 2937 | continue; |
2915 | c = (struct sadb_comb*)skb_put(skb, sizeof(struct sadb_comb)); | 2938 | c = (struct sadb_comb*)skb_put(skb, sizeof(struct sadb_comb)); |
diff --git a/net/xfrm/xfrm_algo.c b/net/xfrm/xfrm_algo.c index f9a549554740..6fb9d00a75dc 100644 --- a/net/xfrm/xfrm_algo.c +++ b/net/xfrm/xfrm_algo.c | |||
@@ -35,6 +35,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
35 | } | 35 | } |
36 | }, | 36 | }, |
37 | 37 | ||
38 | .pfkey_supported = 1, | ||
39 | |||
38 | .desc = { | 40 | .desc = { |
39 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV8, | 41 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV8, |
40 | .sadb_alg_ivlen = 8, | 42 | .sadb_alg_ivlen = 8, |
@@ -51,6 +53,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
51 | } | 53 | } |
52 | }, | 54 | }, |
53 | 55 | ||
56 | .pfkey_supported = 1, | ||
57 | |||
54 | .desc = { | 58 | .desc = { |
55 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV12, | 59 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV12, |
56 | .sadb_alg_ivlen = 8, | 60 | .sadb_alg_ivlen = 8, |
@@ -67,6 +71,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
67 | } | 71 | } |
68 | }, | 72 | }, |
69 | 73 | ||
74 | .pfkey_supported = 1, | ||
75 | |||
70 | .desc = { | 76 | .desc = { |
71 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV16, | 77 | .sadb_alg_id = SADB_X_EALG_AES_GCM_ICV16, |
72 | .sadb_alg_ivlen = 8, | 78 | .sadb_alg_ivlen = 8, |
@@ -83,6 +89,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
83 | } | 89 | } |
84 | }, | 90 | }, |
85 | 91 | ||
92 | .pfkey_supported = 1, | ||
93 | |||
86 | .desc = { | 94 | .desc = { |
87 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV8, | 95 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV8, |
88 | .sadb_alg_ivlen = 8, | 96 | .sadb_alg_ivlen = 8, |
@@ -99,6 +107,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
99 | } | 107 | } |
100 | }, | 108 | }, |
101 | 109 | ||
110 | .pfkey_supported = 1, | ||
111 | |||
102 | .desc = { | 112 | .desc = { |
103 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV12, | 113 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV12, |
104 | .sadb_alg_ivlen = 8, | 114 | .sadb_alg_ivlen = 8, |
@@ -115,6 +125,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
115 | } | 125 | } |
116 | }, | 126 | }, |
117 | 127 | ||
128 | .pfkey_supported = 1, | ||
129 | |||
118 | .desc = { | 130 | .desc = { |
119 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV16, | 131 | .sadb_alg_id = SADB_X_EALG_AES_CCM_ICV16, |
120 | .sadb_alg_ivlen = 8, | 132 | .sadb_alg_ivlen = 8, |
@@ -131,6 +143,8 @@ static struct xfrm_algo_desc aead_list[] = { | |||
131 | } | 143 | } |
132 | }, | 144 | }, |
133 | 145 | ||
146 | .pfkey_supported = 1, | ||
147 | |||
134 | .desc = { | 148 | .desc = { |
135 | .sadb_alg_id = SADB_X_EALG_NULL_AES_GMAC, | 149 | .sadb_alg_id = SADB_X_EALG_NULL_AES_GMAC, |
136 | .sadb_alg_ivlen = 8, | 150 | .sadb_alg_ivlen = 8, |
@@ -151,6 +165,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
151 | } | 165 | } |
152 | }, | 166 | }, |
153 | 167 | ||
168 | .pfkey_supported = 1, | ||
169 | |||
154 | .desc = { | 170 | .desc = { |
155 | .sadb_alg_id = SADB_X_AALG_NULL, | 171 | .sadb_alg_id = SADB_X_AALG_NULL, |
156 | .sadb_alg_ivlen = 0, | 172 | .sadb_alg_ivlen = 0, |
@@ -169,6 +185,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
169 | } | 185 | } |
170 | }, | 186 | }, |
171 | 187 | ||
188 | .pfkey_supported = 1, | ||
189 | |||
172 | .desc = { | 190 | .desc = { |
173 | .sadb_alg_id = SADB_AALG_MD5HMAC, | 191 | .sadb_alg_id = SADB_AALG_MD5HMAC, |
174 | .sadb_alg_ivlen = 0, | 192 | .sadb_alg_ivlen = 0, |
@@ -187,6 +205,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
187 | } | 205 | } |
188 | }, | 206 | }, |
189 | 207 | ||
208 | .pfkey_supported = 1, | ||
209 | |||
190 | .desc = { | 210 | .desc = { |
191 | .sadb_alg_id = SADB_AALG_SHA1HMAC, | 211 | .sadb_alg_id = SADB_AALG_SHA1HMAC, |
192 | .sadb_alg_ivlen = 0, | 212 | .sadb_alg_ivlen = 0, |
@@ -205,6 +225,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
205 | } | 225 | } |
206 | }, | 226 | }, |
207 | 227 | ||
228 | .pfkey_supported = 1, | ||
229 | |||
208 | .desc = { | 230 | .desc = { |
209 | .sadb_alg_id = SADB_X_AALG_SHA2_256HMAC, | 231 | .sadb_alg_id = SADB_X_AALG_SHA2_256HMAC, |
210 | .sadb_alg_ivlen = 0, | 232 | .sadb_alg_ivlen = 0, |
@@ -222,6 +244,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
222 | } | 244 | } |
223 | }, | 245 | }, |
224 | 246 | ||
247 | .pfkey_supported = 1, | ||
248 | |||
225 | .desc = { | 249 | .desc = { |
226 | .sadb_alg_id = SADB_X_AALG_SHA2_384HMAC, | 250 | .sadb_alg_id = SADB_X_AALG_SHA2_384HMAC, |
227 | .sadb_alg_ivlen = 0, | 251 | .sadb_alg_ivlen = 0, |
@@ -239,6 +263,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
239 | } | 263 | } |
240 | }, | 264 | }, |
241 | 265 | ||
266 | .pfkey_supported = 1, | ||
267 | |||
242 | .desc = { | 268 | .desc = { |
243 | .sadb_alg_id = SADB_X_AALG_SHA2_512HMAC, | 269 | .sadb_alg_id = SADB_X_AALG_SHA2_512HMAC, |
244 | .sadb_alg_ivlen = 0, | 270 | .sadb_alg_ivlen = 0, |
@@ -257,6 +283,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
257 | } | 283 | } |
258 | }, | 284 | }, |
259 | 285 | ||
286 | .pfkey_supported = 1, | ||
287 | |||
260 | .desc = { | 288 | .desc = { |
261 | .sadb_alg_id = SADB_X_AALG_RIPEMD160HMAC, | 289 | .sadb_alg_id = SADB_X_AALG_RIPEMD160HMAC, |
262 | .sadb_alg_ivlen = 0, | 290 | .sadb_alg_ivlen = 0, |
@@ -274,6 +302,8 @@ static struct xfrm_algo_desc aalg_list[] = { | |||
274 | } | 302 | } |
275 | }, | 303 | }, |
276 | 304 | ||
305 | .pfkey_supported = 1, | ||
306 | |||
277 | .desc = { | 307 | .desc = { |
278 | .sadb_alg_id = SADB_X_AALG_AES_XCBC_MAC, | 308 | .sadb_alg_id = SADB_X_AALG_AES_XCBC_MAC, |
279 | .sadb_alg_ivlen = 0, | 309 | .sadb_alg_ivlen = 0, |
@@ -295,6 +325,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
295 | } | 325 | } |
296 | }, | 326 | }, |
297 | 327 | ||
328 | .pfkey_supported = 1, | ||
329 | |||
298 | .desc = { | 330 | .desc = { |
299 | .sadb_alg_id = SADB_EALG_NULL, | 331 | .sadb_alg_id = SADB_EALG_NULL, |
300 | .sadb_alg_ivlen = 0, | 332 | .sadb_alg_ivlen = 0, |
@@ -313,6 +345,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
313 | } | 345 | } |
314 | }, | 346 | }, |
315 | 347 | ||
348 | .pfkey_supported = 1, | ||
349 | |||
316 | .desc = { | 350 | .desc = { |
317 | .sadb_alg_id = SADB_EALG_DESCBC, | 351 | .sadb_alg_id = SADB_EALG_DESCBC, |
318 | .sadb_alg_ivlen = 8, | 352 | .sadb_alg_ivlen = 8, |
@@ -331,6 +365,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
331 | } | 365 | } |
332 | }, | 366 | }, |
333 | 367 | ||
368 | .pfkey_supported = 1, | ||
369 | |||
334 | .desc = { | 370 | .desc = { |
335 | .sadb_alg_id = SADB_EALG_3DESCBC, | 371 | .sadb_alg_id = SADB_EALG_3DESCBC, |
336 | .sadb_alg_ivlen = 8, | 372 | .sadb_alg_ivlen = 8, |
@@ -349,6 +385,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
349 | } | 385 | } |
350 | }, | 386 | }, |
351 | 387 | ||
388 | .pfkey_supported = 1, | ||
389 | |||
352 | .desc = { | 390 | .desc = { |
353 | .sadb_alg_id = SADB_X_EALG_CASTCBC, | 391 | .sadb_alg_id = SADB_X_EALG_CASTCBC, |
354 | .sadb_alg_ivlen = 8, | 392 | .sadb_alg_ivlen = 8, |
@@ -367,6 +405,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
367 | } | 405 | } |
368 | }, | 406 | }, |
369 | 407 | ||
408 | .pfkey_supported = 1, | ||
409 | |||
370 | .desc = { | 410 | .desc = { |
371 | .sadb_alg_id = SADB_X_EALG_BLOWFISHCBC, | 411 | .sadb_alg_id = SADB_X_EALG_BLOWFISHCBC, |
372 | .sadb_alg_ivlen = 8, | 412 | .sadb_alg_ivlen = 8, |
@@ -385,6 +425,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
385 | } | 425 | } |
386 | }, | 426 | }, |
387 | 427 | ||
428 | .pfkey_supported = 1, | ||
429 | |||
388 | .desc = { | 430 | .desc = { |
389 | .sadb_alg_id = SADB_X_EALG_AESCBC, | 431 | .sadb_alg_id = SADB_X_EALG_AESCBC, |
390 | .sadb_alg_ivlen = 8, | 432 | .sadb_alg_ivlen = 8, |
@@ -403,6 +445,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
403 | } | 445 | } |
404 | }, | 446 | }, |
405 | 447 | ||
448 | .pfkey_supported = 1, | ||
449 | |||
406 | .desc = { | 450 | .desc = { |
407 | .sadb_alg_id = SADB_X_EALG_SERPENTCBC, | 451 | .sadb_alg_id = SADB_X_EALG_SERPENTCBC, |
408 | .sadb_alg_ivlen = 8, | 452 | .sadb_alg_ivlen = 8, |
@@ -421,6 +465,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
421 | } | 465 | } |
422 | }, | 466 | }, |
423 | 467 | ||
468 | .pfkey_supported = 1, | ||
469 | |||
424 | .desc = { | 470 | .desc = { |
425 | .sadb_alg_id = SADB_X_EALG_CAMELLIACBC, | 471 | .sadb_alg_id = SADB_X_EALG_CAMELLIACBC, |
426 | .sadb_alg_ivlen = 8, | 472 | .sadb_alg_ivlen = 8, |
@@ -439,6 +485,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
439 | } | 485 | } |
440 | }, | 486 | }, |
441 | 487 | ||
488 | .pfkey_supported = 1, | ||
489 | |||
442 | .desc = { | 490 | .desc = { |
443 | .sadb_alg_id = SADB_X_EALG_TWOFISHCBC, | 491 | .sadb_alg_id = SADB_X_EALG_TWOFISHCBC, |
444 | .sadb_alg_ivlen = 8, | 492 | .sadb_alg_ivlen = 8, |
@@ -456,6 +504,8 @@ static struct xfrm_algo_desc ealg_list[] = { | |||
456 | } | 504 | } |
457 | }, | 505 | }, |
458 | 506 | ||
507 | .pfkey_supported = 1, | ||
508 | |||
459 | .desc = { | 509 | .desc = { |
460 | .sadb_alg_id = SADB_X_EALG_AESCTR, | 510 | .sadb_alg_id = SADB_X_EALG_AESCTR, |
461 | .sadb_alg_ivlen = 8, | 511 | .sadb_alg_ivlen = 8, |
@@ -473,6 +523,7 @@ static struct xfrm_algo_desc calg_list[] = { | |||
473 | .threshold = 90, | 523 | .threshold = 90, |
474 | } | 524 | } |
475 | }, | 525 | }, |
526 | .pfkey_supported = 1, | ||
476 | .desc = { .sadb_alg_id = SADB_X_CALG_DEFLATE } | 527 | .desc = { .sadb_alg_id = SADB_X_CALG_DEFLATE } |
477 | }, | 528 | }, |
478 | { | 529 | { |
@@ -482,6 +533,7 @@ static struct xfrm_algo_desc calg_list[] = { | |||
482 | .threshold = 90, | 533 | .threshold = 90, |
483 | } | 534 | } |
484 | }, | 535 | }, |
536 | .pfkey_supported = 1, | ||
485 | .desc = { .sadb_alg_id = SADB_X_CALG_LZS } | 537 | .desc = { .sadb_alg_id = SADB_X_CALG_LZS } |
486 | }, | 538 | }, |
487 | { | 539 | { |
@@ -491,6 +543,7 @@ static struct xfrm_algo_desc calg_list[] = { | |||
491 | .threshold = 50, | 543 | .threshold = 50, |
492 | } | 544 | } |
493 | }, | 545 | }, |
546 | .pfkey_supported = 1, | ||
494 | .desc = { .sadb_alg_id = SADB_X_CALG_LZJH } | 547 | .desc = { .sadb_alg_id = SADB_X_CALG_LZJH } |
495 | }, | 548 | }, |
496 | }; | 549 | }; |
@@ -714,27 +767,27 @@ void xfrm_probe_algs(void) | |||
714 | } | 767 | } |
715 | EXPORT_SYMBOL_GPL(xfrm_probe_algs); | 768 | EXPORT_SYMBOL_GPL(xfrm_probe_algs); |
716 | 769 | ||
717 | int xfrm_count_auth_supported(void) | 770 | int xfrm_count_pfkey_auth_supported(void) |
718 | { | 771 | { |
719 | int i, n; | 772 | int i, n; |
720 | 773 | ||
721 | for (i = 0, n = 0; i < aalg_entries(); i++) | 774 | for (i = 0, n = 0; i < aalg_entries(); i++) |
722 | if (aalg_list[i].available) | 775 | if (aalg_list[i].available && aalg_list[i].pfkey_supported) |
723 | n++; | 776 | n++; |
724 | return n; | 777 | return n; |
725 | } | 778 | } |
726 | EXPORT_SYMBOL_GPL(xfrm_count_auth_supported); | 779 | EXPORT_SYMBOL_GPL(xfrm_count_pfkey_auth_supported); |
727 | 780 | ||
728 | int xfrm_count_enc_supported(void) | 781 | int xfrm_count_pfkey_enc_supported(void) |
729 | { | 782 | { |
730 | int i, n; | 783 | int i, n; |
731 | 784 | ||
732 | for (i = 0, n = 0; i < ealg_entries(); i++) | 785 | for (i = 0, n = 0; i < ealg_entries(); i++) |
733 | if (ealg_list[i].available) | 786 | if (ealg_list[i].available && ealg_list[i].pfkey_supported) |
734 | n++; | 787 | n++; |
735 | return n; | 788 | return n; |
736 | } | 789 | } |
737 | EXPORT_SYMBOL_GPL(xfrm_count_enc_supported); | 790 | EXPORT_SYMBOL_GPL(xfrm_count_pfkey_enc_supported); |
738 | 791 | ||
739 | #if defined(CONFIG_INET_ESP) || defined(CONFIG_INET_ESP_MODULE) || defined(CONFIG_INET6_ESP) || defined(CONFIG_INET6_ESP_MODULE) | 792 | #if defined(CONFIG_INET_ESP) || defined(CONFIG_INET_ESP_MODULE) || defined(CONFIG_INET6_ESP) || defined(CONFIG_INET6_ESP_MODULE) |
740 | 793 | ||