return retval;
 }
 
+static int sctp_setsockopt_auth_supported(struct sock *sk,
+                                         char __user *optval,
+                                         unsigned int optlen)
+{
+       struct sctp_assoc_value params;
+       struct sctp_association *asoc;
+       struct sctp_endpoint *ep;
+       int retval = -EINVAL;
+
+       if (optlen != sizeof(params))
+               goto out;
+
+       if (copy_from_user(¶ms, optval, optlen)) {
+               retval = -EFAULT;
+               goto out;
+       }
+
+       asoc = sctp_id2assoc(sk, params.assoc_id);
+       if (!asoc && params.assoc_id != SCTP_FUTURE_ASSOC &&
+           sctp_style(sk, UDP))
+               goto out;
+
+       ep = sctp_sk(sk)->ep;
+       if (params.assoc_value) {
+               retval = sctp_auth_init(ep, GFP_KERNEL);
+               if (retval)
+                       goto out;
+               if (ep->asconf_enable) {
+                       sctp_auth_ep_add_chunkid(ep, SCTP_CID_ASCONF);
+                       sctp_auth_ep_add_chunkid(ep, SCTP_CID_ASCONF_ACK);
+               }
+       }
+
+       ep->auth_enable = !!params.assoc_value;
+       retval = 0;
+
+out:
+       return retval;
+}
+
 /* API 6.2 setsockopt(), getsockopt()
  *
  * Applications use setsockopt() and getsockopt() to set or retrieve
        case SCTP_ASCONF_SUPPORTED:
                retval = sctp_setsockopt_asconf_supported(sk, optval, optlen);
                break;
+       case SCTP_AUTH_SUPPORTED:
+               retval = sctp_setsockopt_auth_supported(sk, optval, optlen);
+               break;
        default:
                retval = -ENOPROTOOPT;
                break;
        return retval;
 }
 
+static int sctp_getsockopt_auth_supported(struct sock *sk, int len,
+                                         char __user *optval,
+                                         int __user *optlen)
+{
+       struct sctp_assoc_value params;
+       struct sctp_association *asoc;
+       int retval = -EFAULT;
+
+       if (len < sizeof(params)) {
+               retval = -EINVAL;
+               goto out;
+       }
+
+       len = sizeof(params);
+       if (copy_from_user(¶ms, optval, len))
+               goto out;
+
+       asoc = sctp_id2assoc(sk, params.assoc_id);
+       if (!asoc && params.assoc_id != SCTP_FUTURE_ASSOC &&
+           sctp_style(sk, UDP)) {
+               retval = -EINVAL;
+               goto out;
+       }
+
+       params.assoc_value = asoc ? asoc->peer.auth_capable
+                                 : sctp_sk(sk)->ep->auth_enable;
+
+       if (put_user(len, optlen))
+               goto out;
+
+       if (copy_to_user(optval, ¶ms, len))
+               goto out;
+
+       retval = 0;
+
+out:
+       return retval;
+}
+
 static int sctp_getsockopt(struct sock *sk, int level, int optname,
                           char __user *optval, int __user *optlen)
 {
                retval = sctp_getsockopt_asconf_supported(sk, len, optval,
                                                          optlen);
                break;
+       case SCTP_AUTH_SUPPORTED:
+               retval = sctp_getsockopt_auth_supported(sk, len, optval,
+                                                       optlen);
+               break;
        default:
                retval = -ENOPROTOOPT;
                break;