udp_usrreq.c (1cbd978e96176e5cb8e785952ed34d1aba66b11d) | udp_usrreq.c (fb95b5d3c3d91d5c06e16abf161c11d4be32fb7a) |
---|---|
1/* 2 * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 306 unchanged lines hidden (view full) --- 315 /* check AH/ESP integrity. */ 316 if (ipsec4_in_reject_so(m, last->inp_socket)) { 317 ipsecstat.in_polvio++; 318 policyfail = 1; 319 /* do not inject data to pcb */ 320 } 321#endif /*IPSEC*/ 322#ifdef MAC | 1/* 2 * Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 306 unchanged lines hidden (view full) --- 315 /* check AH/ESP integrity. */ 316 if (ipsec4_in_reject_so(m, last->inp_socket)) { 317 ipsecstat.in_polvio++; 318 policyfail = 1; 319 /* do not inject data to pcb */ 320 } 321#endif /*IPSEC*/ 322#ifdef MAC |
323 if (mac_check_socket_receive(last->inp_socket, | 323 if (mac_check_socket_deliver(last->inp_socket, |
324 m) != 0) 325 policyfail = 1; 326#endif 327 if (!policyfail) { 328 if ((n = m_copy(m, 0, M_COPYALL)) 329 != NULL) 330 udp_append(last, ip, n, 331 iphlen + --- 69 unchanged lines hidden (view full) --- 401 INP_INFO_RUNLOCK(&udbinfo); 402#ifdef IPSEC 403 if (ipsec4_in_reject_so(m, inp->inp_socket)) { 404 ipsecstat.in_polvio++; 405 goto bad; 406 } 407#endif /*IPSEC*/ 408#ifdef MAC | 324 m) != 0) 325 policyfail = 1; 326#endif 327 if (!policyfail) { 328 if ((n = m_copy(m, 0, M_COPYALL)) 329 != NULL) 330 udp_append(last, ip, n, 331 iphlen + --- 69 unchanged lines hidden (view full) --- 401 INP_INFO_RUNLOCK(&udbinfo); 402#ifdef IPSEC 403 if (ipsec4_in_reject_so(m, inp->inp_socket)) { 404 ipsecstat.in_polvio++; 405 goto bad; 406 } 407#endif /*IPSEC*/ 408#ifdef MAC |
409 error = mac_check_socket_receive(inp->inp_socket, m); | 409 error = mac_check_socket_deliver(inp->inp_socket, m); |
410 if (error) 411 goto bad; 412#endif 413 414 /* 415 * Construct sockaddr format source address. 416 * Stuff source address and datagram in user buffer. 417 */ --- 660 unchanged lines hidden --- | 410 if (error) 411 goto bad; 412#endif 413 414 /* 415 * Construct sockaddr format source address. 416 * Stuff source address and datagram in user buffer. 417 */ --- 660 unchanged lines hidden --- |