/* * netsniff-ng - the packet sniffing beast * Copyright 2009, 2010 Daniel Borkmann. * Subject to the GPL, version 2. */ #ifndef DISSECTOR_80211_H #define DISSECTOR_80211_H #include "hash.h" #include "protos.h" extern struct hash_table ieee80211_lay2; extern void dissector_init_ieee80211(int fnttype); extern void dissector_cleanup_ieee80211(void); static inline struct protocol *dissector_get_ieee80211_entry_point(void) { return &ieee80211_ops; } static inline struct protocol *dissector_get_ieee80211_exit_point(void) { return &none_ops; } #endif /* DISSECTOR_80211_H */ tr> cgit logo index : net-next.git
net-next plumbingsTobias Klauser
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat
on>
authorArtem Savkov <asavkov@redhat.com>2016-10-26 15:02:09 +0100
committerJames Morris <james.l.morris@oracle.com>2016-10-27 16:03:33 +1100
commit31e6ec4519c0fe0ee4a2f6ba3ab278e9506b9500 (patch)
treeba04b350b84151753936b5a2ed9087bc4721d8cd /security
parent7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb (diff)
security/keys: make BIG_KEYS dependent on stdrng.
Since BIG_KEYS can't be compiled as module it requires one of the "stdrng" providers to be compiled into kernel. Otherwise big_key_crypto_init() fails on crypto_alloc_rng step and next dereference of big_key_skcipher (e.g. in big_key_preparse()) results in a NULL pointer dereference. Fixes: 13100a72f40f5748a04017e0ab3df4cf27c809ef ('Security: Keys: Big keys stored encrypted') Signed-off-by: Artem Savkov <asavkov@redhat.com> Signed-off-by: David Howells <dhowells@redhat.com> cc: Stephan Mueller <smueller@chronox.de> cc: Kirill Marinushkin <k.marinushkin@gmail.com> cc: stable@vger.kernel.org Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'security')