Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 04 Aug 2001 06:07:20 +0900
From:      itojun@iijlab.net
To:        Bill Fenner <fenner@research.att.com>
Cc:        freebsd-net@freebsd.org
Subject:   Re: kernel upgrade causes truncated IPSEC packets 
Message-ID:  <5032.996872840@itojun.org>
In-Reply-To: fenner's message of Fri, 03 Aug 2001 14:04:36 MST. <200108032104.OAA22596@windsor.research.att.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
>>	[0-length mbuf in the chain] is perfectly legal, and can happen
>>	by result of m_cat()/m_split() calls from ipsec code.
>I don't see any m_cat() or m_split() happening on output; they're all in
>ah_input.c and esp_input.c .

	i need to go through the detail, but something equivalent to
	these functions happen everywhere in ipsec code.

itojun

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5032.996872840>