ipsec_mbuf.c (9ffa96777e7ffbd3565a956780e930023e71cadb) | ipsec_mbuf.c (37621fd5d93015b59e08fc1278cbabfbf393fa7b) |
---|---|
1/*- 2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 28 unchanged lines hidden (view full) --- 37#include <sys/mbuf.h> 38#include <sys/socket.h> 39 40#include <net/route.h> 41#include <netinet/in.h> 42 43#include <netipsec/ipsec.h> 44 | 1/*- 2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 28 unchanged lines hidden (view full) --- 37#include <sys/mbuf.h> 38#include <sys/socket.h> 39 40#include <net/route.h> 41#include <netinet/in.h> 42 43#include <netipsec/ipsec.h> 44 |
45extern struct mbuf *m_getptr(struct mbuf *, int, int *); 46 | |
47/* 48 * Create a writable copy of the mbuf chain. While doing this 49 * we compact the chain with a goal of producing a chain with 50 * at most two mbufs. The second mbuf in this chain is likely 51 * to be a cluster. The primary purpose of this work is to create 52 * a writable packet for encryption, compression, etc. The 53 * secondary goal is to linearize the data so the data can be 54 * passed to crypto hardware in the most efficient manner possible. --- 421 unchanged lines hidden --- | 45/* 46 * Create a writable copy of the mbuf chain. While doing this 47 * we compact the chain with a goal of producing a chain with 48 * at most two mbufs. The second mbuf in this chain is likely 49 * to be a cluster. The primary purpose of this work is to create 50 * a writable packet for encryption, compression, etc. The 51 * secondary goal is to linearize the data so the data can be 52 * passed to crypto hardware in the most efficient manner possible. --- 421 unchanged lines hidden --- |