ipsec_mbuf.c (9ffa96777e7ffbd3565a956780e930023e71cadb) ipsec_mbuf.c (37621fd5d93015b59e08fc1278cbabfbf393fa7b)
1/*-
2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright

--- 28 unchanged lines hidden (view full) ---

37#include <sys/mbuf.h>
38#include <sys/socket.h>
39
40#include <net/route.h>
41#include <netinet/in.h>
42
43#include <netipsec/ipsec.h>
44
1/*-
2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright

--- 28 unchanged lines hidden (view full) ---

37#include <sys/mbuf.h>
38#include <sys/socket.h>
39
40#include <net/route.h>
41#include <netinet/in.h>
42
43#include <netipsec/ipsec.h>
44
45extern struct mbuf *m_getptr(struct mbuf *, int, int *);
46
47/*
48 * Create a writable copy of the mbuf chain. While doing this
49 * we compact the chain with a goal of producing a chain with
50 * at most two mbufs. The second mbuf in this chain is likely
51 * to be a cluster. The primary purpose of this work is to create
52 * a writable packet for encryption, compression, etc. The
53 * secondary goal is to linearize the data so the data can be
54 * passed to crypto hardware in the most efficient manner possible.

--- 421 unchanged lines hidden ---
45/*
46 * Create a writable copy of the mbuf chain. While doing this
47 * we compact the chain with a goal of producing a chain with
48 * at most two mbufs. The second mbuf in this chain is likely
49 * to be a cluster. The primary purpose of this work is to create
50 * a writable packet for encryption, compression, etc. The
51 * secondary goal is to linearize the data so the data can be
52 * passed to crypto hardware in the most efficient manner possible.

--- 421 unchanged lines hidden ---