diff options
author | Tobias Brunner <tobias@strongswan.org> | 2016-11-29 19:05:25 +0300 |
---|---|---|
committer | Steffen Klassert <steffen.klassert@secunet.com> | 2016-11-30 13:10:16 +0300 |
commit | a55e23864d381c5a4ef110df94b00b2fe121a70d (patch) | |
tree | b763e978a7d10a968c2754543ad23215d9d855fc | |
parent | 7c7fedd51c02f4418e8b2eed64bdab601f882aa4 (diff) | |
download | linux-a55e23864d381c5a4ef110df94b00b2fe121a70d.tar.xz |
esp6: Fix integrity verification when ESN are used
When handling inbound packets, the two halves of the sequence number
stored on the skb are already in network order.
Fixes: 000ae7b2690e ("esp6: Switch to new AEAD interface")
Signed-off-by: Tobias Brunner <tobias@strongswan.org>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
-rw-r--r-- | net/ipv6/esp6.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv6/esp6.c b/net/ipv6/esp6.c index 060a60b2f8a6..111ba55fd512 100644 --- a/net/ipv6/esp6.c +++ b/net/ipv6/esp6.c @@ -418,7 +418,7 @@ static int esp6_input(struct xfrm_state *x, struct sk_buff *skb) esph = (void *)skb_push(skb, 4); *seqhi = esph->spi; esph->spi = esph->seq_no; - esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.input.hi); + esph->seq_no = XFRM_SKB_CB(skb)->seq.input.hi; aead_request_set_callback(req, 0, esp_input_done_esn, skb); } |