FreeBSD Bugzilla – Attachment 182793 Details for
Bug 219356
Using AES-GCM with IPSEC with aesni module loaded panics FreeBSD 11 stable
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
Proposed patch (untested)
ipsec.diff (text/plain), 1.53 KB, created by
Andrey V. Elsukov
on 2017-05-22 08:51:07 UTC
(
hide
)
Description:
Proposed patch (untested)
Filename:
MIME Type:
Creator:
Andrey V. Elsukov
Created:
2017-05-22 08:51:07 UTC
Size:
1.53 KB
patch
obsolete
>Index: sys/netipsec/xform_ah.c >=================================================================== >--- sys/netipsec/xform_ah.c (revision 318627) >+++ sys/netipsec/xform_ah.c (working copy) >@@ -808,8 +808,6 @@ ah_input_cb(struct cryptop *crp) > } > return error; > bad: >- if (sav) >- key_freesav(&sav); > if (m != NULL) > m_freem(m); > if (xd != NULL) >@@ -1123,8 +1121,6 @@ ah_output_cb(struct cryptop *crp) > bad: > free(xd, M_XDATA); > crypto_freereq(crp); >- key_freesav(&sav); >- key_freesp(&sp); > return (error); > } > >Index: sys/netipsec/xform_esp.c >=================================================================== >--- sys/netipsec/xform_esp.c (revision 318627) >+++ sys/netipsec/xform_esp.c (working copy) >@@ -602,8 +602,6 @@ esp_input_cb(struct cryptop *crp) > } > return error; > bad: >- if (sav != NULL) >- key_freesav(&sav); > if (m != NULL) > m_freem(m); > if (xd != NULL) >@@ -937,8 +935,6 @@ esp_output_cb(struct cryptop *crp) > bad: > free(xd, M_XDATA); > crypto_freereq(crp); >- key_freesav(&sav); >- key_freesp(&sp); > return (error); > } > >Index: sys/netipsec/xform_ipcomp.c >=================================================================== >--- sys/netipsec/xform_ipcomp.c (revision 318627) >+++ sys/netipsec/xform_ipcomp.c (working copy) >@@ -365,8 +365,6 @@ ipcomp_input_cb(struct cryptop *crp) > } > return error; > bad: >- if (sav != NULL) >- key_freesav(&sav); > if (m != NULL) > m_freem(m); > if (xd != NULL) >@@ -641,8 +639,6 @@ bad: > m_freem(m); > free(xd, M_XDATA); > crypto_freereq(crp); >- key_freesav(&sav); >- key_freesp(&sp); > return (error); > } >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 219356
:
182666
|
182770
| 182793