An error occurred fetching the project authors.
  1. 27 Dec, 2004 1 commit
  2. 25 Oct, 2004 2 commits
  3. 20 Oct, 2004 1 commit
  4. 10 Sep, 2004 1 commit
    • Herbert Xu's avatar
      [IPSEC]: Find larval SAs by sequence number · 4d9f62e9
      Herbert Xu authored
      When larval states are generated along with ACQUIRE messages, we should
      use the sequence to find the corresponding larval state when creating
      states with ADD_SA or ALLOC_SPI.
      
      If we don't do that, then it may take down an unrelated larval state
      with the same parameters (think different TCP sessions).  This not only
      leaves behind a larval state that shouldn't be there, it may also cause
      another ACQUIRE message to be sent unnecessarily.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      4d9f62e9
  5. 24 Aug, 2004 1 commit
  6. 21 Aug, 2004 1 commit
  7. 20 Aug, 2004 1 commit
  8. 19 Aug, 2004 2 commits
  9. 18 Aug, 2004 2 commits
  10. 02 Aug, 2004 1 commit
  11. 29 Jul, 2004 1 commit
  12. 10 Jul, 2004 1 commit
    • Herbert Xu's avatar
      [IPSEC]: Move generic encap code into xfrm4_output · 01124b4f
      Herbert Xu authored
      I've finally finished merging the general encapsulation code for IPv4.
      Here is the patch.
      
      The idea is basically to make x->type->output similar in structure to
      x->type->input.  That means moving the tunnel encapsulation and other
      generic code out.
      
      They have ended up in xfrm4_output.c.
      
      The advantage of this is that we have exactly one copy of the tunnel
      encapsulation code.  So if we need to change it (e.g., set the TTL
      according to the route) then it's easier and less error-prone.
      
      In fact, in doing so I've already noticed that the ECN wasn't being
      copied correctly in everything except xfrm4_tunnel.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@redhat.com>
      01124b4f
  13. 19 Jun, 2004 1 commit
  14. 18 Jun, 2004 1 commit
  15. 03 Jun, 2004 1 commit
    • James Morris's avatar
      [NETFILTER]: Fix checksum bug for multicast/broadcast packets on postrouting hook. · b0f17170
      James Morris authored
      In a nutshell, skb checksum mangling has been removed from
      nf_hook_slow() and pushed up to whatever really needs to do it.
      
      Namely:  NAT, ip_fw_compat, ipt_TCPMSS, IPSec transforms.
      
      skb_checksum_help() has been changed to perform an skb_copy() if needed 
      (e.g. the original problem case where bcast/mcast was cloning packets for 
      transmission over loopback, changing ip_summed).
      
      Because of the above, the output path has been modified to take into 
      account the fact that an skb may need to be changed in some places.  There 
      are some minor changes in the routing code to take care of the now 
      different input and output function prototypes.  The ipv6 fragmentation 
      code has been modified to detect a changed skb.
      
      The rest of the patch (probably the bulk of it) is simply the result of 
      changing to double skb pointers.
      
      I've tested this with ipv4, ipv6, ipsec (including xfrm bundles), NAT and 
      the original DHCP test case.  Everything seems to be working ok.
      Signed-off-by: default avatarJames Morris <jmorris@redhat.com>
      Signed-off-by: default avatarDavid S. Miller <davem@redhat.com>
      b0f17170
  16. 29 May, 2004 1 commit
  17. 20 Mar, 2004 1 commit
  18. 29 Nov, 2003 1 commit
  19. 18 Oct, 2003 1 commit
  20. 08 Aug, 2003 1 commit
  21. 27 Jul, 2003 2 commits
  22. 20 Jul, 2003 1 commit
  23. 07 Jul, 2003 1 commit
    • Herbert Xu's avatar
      [IPSEC] Add policy expiration · e3e5d274
      Herbert Xu authored
      This patch finally adds policy expiration.
      
      Note that it resends soft policy expire messages every 30 seconds.  This
      is needed as when "soft use expire" is used for dead peer detection,
      a lost message could lead to a dead peer that isn't discovered until the
      SAs expire.
      
      I've only implemented notification for XFRM as I didn't want to just add
      another PFKEY extension in case it collides with something else.  Of
      course it could be easily done for PFKEY with an extension too.
      e3e5d274
  24. 30 Jun, 2003 1 commit
    • Herbert Xu's avatar
      [IPSEC] split xfrm_state_replace + fixes · e821464c
      Herbert Xu authored
      Split xfrm_state_replace into xfrm_state_add and xfrm_state_replace.
      
      Fixes:
      1. Only update update lifetime and encap options if the state is valid.
      2. Disallow updates to states that do not exist.
      3. Bail if afinfo cannot be found.
       
      This brings SADB_UPDATE in line with what is required by RFC2367.
      It is also needed by SFS NAT-T support as it needs to update valid
      states when the encap ports move.
      
      I've tweaked the logic slightly so that SADB_UPDATE will fail on a
      larval state that hasn't undergone SADB_GETSPI.  This is what RFC2367
      calls for and it simplifies the code in that we don't have to call
      find_acq for SADB_UPDATE.
      
      This doesn't affect any of the three KMs as they either don't use
      SADB_UPDATE or call SADB_GETSPI before doing an update.
      e821464c
  25. 23 Jun, 2003 1 commit
  26. 14 Jun, 2003 1 commit
  27. 09 Jun, 2003 1 commit
  28. 06 Jun, 2003 1 commit
  29. 04 Jun, 2003 1 commit
    • Arnaldo Carvalho de Melo's avatar
      o net: create struct sock_common and use in struct sock & tcp_tw_bucket · 63413da5
      Arnaldo Carvalho de Melo authored
      With this the data dependency is reduced to just making sure that the first
      member of both struct sock and struct tcp_tw_bucket are a struct sock_common.
      
      Also makes it easier to grep for struct sock and struct tcp_tw_bucket usage in
      the tree as all the members in those structs are prefixed, respectively, with
      sk_ and tw_, like struct inode (i_), struct block_device (bd_), etc.
      
      Checked namespace with make tags/ctags, just one colision with the macros for
      the struct sock members, with a wanrouter struct, fixed that
      s/sk_state/state_sk/g in the wanrouter struct.
      
      Checked as well if the names of the members in both structs collided with some
      macro, none found.
      63413da5
  30. 03 Jun, 2003 1 commit
  31. 22 May, 2003 1 commit
  32. 15 May, 2003 1 commit
  33. 12 May, 2003 1 commit
  34. 09 May, 2003 2 commits
  35. 03 May, 2003 1 commit