From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mitsuru KANDA / =?ISO-2022-JP?B?GyRCP0BFRBsoQiAbJEI9PBsoQg==?= Subject: Re: [PATCH] IPv6 IPComp Date: Tue, 20 May 2003 16:44:00 +0900 Sender: netdev-bounce@oss.sgi.com Message-ID: <87iss6f4fz.wl@karaba.org> References: <873cjebwn1.wl@karaba.org> <20030516.140014.59676235.davem@redhat.com> <871xyvqr7k.wl@karaba.org> <20030519.233532.42779243.davem@redhat.com> Mime-Version: 1.0 (generated by SEMI 1.14.4 - "Hosorogi") Content-Type: text/plain; charset=US-ASCII Cc: netdev@oss.sgi.com Return-path: To: "David S. Miller" In-Reply-To: <20030519.233532.42779243.davem@redhat.com> Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org > Unfortunately setkey is not powerful enough to do this > currently. Only the netlink based ipsec configuration can > set these things up. > > However, all of the testing we did was via tunnel mode IPCOMP. OK, I'll also do test. > Note that for xfrm6_tunnel.c you will need to use some kind > of "u32 --> in6_addr" mapping table. You can do this with > a simple hash table of some kind. Then you can use > xfrm_state_lookup() just like xfrm4_tunnel.c does. I see, thank you. Regards, -mk