View | Details | Raw Unified | Return to bug 277456 | Differences between
and this patch

Collapse All | Expand All

(-)b/sys/netipsec/key_debug.c (-3 / +3 lines)
Lines 193-201 kdebug_sadb(struct sadb_msg *base) Link Here
193
			printf("%s: invalid ext_len=0 was passed.\n", __func__);
193
			printf("%s: invalid ext_len=0 was passed.\n", __func__);
194
			return;
194
			return;
195
		}
195
		}
196
		if (ext->sadb_ext_len > tlen) {
196
		if (PFKEY_UNUNIT64(ext->sadb_ext_len) > tlen) {
197
			printf("%s: ext_len too big (%u > %u).\n",
197
			printf("%s: ext_len too big (%u > %u).\n", __func__,
198
				__func__, ext->sadb_ext_len, tlen);
198
			    PFKEY_UNUNIT64(ext->sadb_ext_len), tlen);
199
			return;
199
			return;
200
		}
200
		}
201
201

Return to bug 277456