Joy, Thanks for your comment and sorry for the delay. Did you mean a separate error code for 'null' context? The current code catches the case when the sid is SECSID_NULL, and returns ENOPROTOOPT. The question is whether we want to create a different error code for this case. Any suggestions?
thanks, Catherine On 2/10/06, Joy Latten <[EMAIL PROTECTED]> wrote: > Catherine, > I am just wondering about something... > Should a peer_sid of 0 or SECSID_NULL be an error here if > the connection doesn't have a transform? I understand we only get > peer's context if a xfrm is involved, but I am thinking > most user applications may not kno or care if there is a xfrm. > If not treated as an error, it looks like security_to_sid_context() > would just return "null" for context. Would that be acceptable? > > Perhaps it is just important that we document the behaviour because > I am thinking most user apps will not care or know if ipsec is > running, so programmers may use this socket option to get peer > context and may need to understand why they received an error of > ENOPROTOOPT. > > > } > > + else { > > err = -ENOPROTOOPT; > > goto out; > > } > > > > - ssec = sock->sk->sk_security; > > - > > - err = security_sid_to_context(ssec->peer_sid, &scontext, > > &scontext_len); > > + err = security_sid_to_context(peer_sid, &scontext, &scontext_len); > > + > > if (err) > > goto out; > > > > @@ -3396,6 +3410,23 @@ out: > > return err; > > } > > > > + > > Regards, > Joy > - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html