Remove ifdefed out part of code, which seems to have originated a decade ago

in OpenBSD.  As it is now, there is no way for this to be useful, since IPsec
is free to forward packets via whatever interface it wants, so checking
capabilities of the interface passed from ip_output (fetched from the routing
table) serves no purpose.

Discussed with:	sam@
This commit is contained in:
Edward Tomasz Napierala 2009-11-09 19:53:34 +00:00
parent 88cbe43d65
commit 4f7418a09f
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=199102
3 changed files with 3 additions and 19 deletions

View File

@ -260,8 +260,7 @@ ip_ipsec_mtu(struct mbuf *m, int mtu)
* -1 = packet was reinjected and stop processing packet
*/
int
ip_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
struct ifnet **ifp)
ip_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error)
{
#ifdef IPSEC
struct secpolicy *sp = NULL;
@ -390,20 +389,6 @@ ip_ipsec_output(struct mbuf **m, struct inpcb *inp, int *flags, int *error,
} else {
/* No IPsec processing for this packet. */
}
#ifdef notyet
/*
* If deferred crypto processing is needed, check that
* the interface supports it.
*/
mtag = m_tag_find(*m, PACKET_TAG_IPSEC_OUT_CRYPTO_NEEDED, NULL);
if (mtag != NULL && ifp != NULL &&
((*ifp)->if_capenable & IFCAP_IPSEC) == 0) {
/* notify IPsec to do its own crypto */
ipsp_skipcrypto_unmark((struct tdb_ident *)(mtag + 1));
*error = EHOSTUNREACH;
goto bad;
}
#endif
}
done:
if (sp != NULL)

View File

@ -36,6 +36,5 @@ int ip_ipsec_filtertunnel(struct mbuf *);
int ip_ipsec_fwd(struct mbuf *);
int ip_ipsec_input(struct mbuf *);
int ip_ipsec_mtu(struct mbuf *, int);
int ip_ipsec_output(struct mbuf **, struct inpcb *, int *, int *,
struct ifnet **);
int ip_ipsec_output(struct mbuf **, struct inpcb *, int *, int *);
#endif

View File

@ -466,7 +466,7 @@ ip_output(struct mbuf *m, struct mbuf *opt, struct route *ro, int flags,
sendit:
#ifdef IPSEC
switch(ip_ipsec_output(&m, inp, &flags, &error, &ifp)) {
switch(ip_ipsec_output(&m, inp, &flags, &error)) {
case 1:
goto bad;
case -1: