1. 29 1月, 2008 3 次提交
    • P
      [XFRM]: RFC4303 compliant auditing · afeb14b4
      Paul Moore 提交于
      This patch adds a number of new IPsec audit events to meet the auditing
      requirements of RFC4303.  This includes audit hooks for the following events:
      
       * Could not find a valid SA [sections 2.1, 3.4.2]
         . xfrm_audit_state_notfound()
         . xfrm_audit_state_notfound_simple()
      
       * Sequence number overflow [section 3.3.3]
         . xfrm_audit_state_replay_overflow()
      
       * Replayed packet [section 3.4.3]
         . xfrm_audit_state_replay()
      
       * Integrity check failure [sections 3.4.4.1, 3.4.4.2]
         . xfrm_audit_state_icvfail()
      
      While RFC4304 deals only with ESP most of the changes in this patch apply to
      IPsec in general, i.e. both AH and ESP.  The one case, integrity check
      failure, where ESP specific code had to be modified the same was done to the
      AH code for the sake of consistency.
      Signed-off-by: NPaul Moore <paul.moore@hp.com>
      Acked-by: NJames Morris <jmorris@namei.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      afeb14b4
    • H
      [IPSEC]: Move state lock into x->type->input · 0ebea8ef
      Herbert Xu 提交于
      This patch releases the lock on the state before calling
      x->type->input.  It also adds the lock to the spots where they're
      currently needed.
      
      Most of those places (all except mip6) are expected to disappear with
      async crypto.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      0ebea8ef
    • H
      [IPSEC]: Move integrity stat collection into xfrm_input · 668dc8af
      Herbert Xu 提交于
      Similar to the moving out of the replay processing on the output, this
      patch moves the integrity stat collectin from x->type->input into
      xfrm_input.
      
      This would eventually allow transforms such as AH/ESP to be lockless.
      
      The error value EBADMSG (currently unused in the crypto layer) is used
      to indicate a failed integrity check.  In future this error can be
      directly returned by the crypto layer once we switch to aead
      algorithms.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      668dc8af
  2. 02 11月, 2007 1 次提交
  3. 22 10月, 2007 1 次提交
  4. 18 10月, 2007 2 次提交
  5. 11 10月, 2007 6 次提交
  6. 11 7月, 2007 3 次提交
    • M
      [XFRM]: Add module alias for transformation type. · d3d6dd3a
      Masahide NAKAMURA 提交于
      It is clean-up for XFRM type modules and adds aliases with its
      protocol:
       ESP, AH, IPCOMP, IPIP and IPv6 for IPsec
       ROUTING and DSTOPTS for MIPv6
      
      It is almost the same thing as XFRM mode alias, but it is added
      new defines XFRM_PROTO_XXX for preprocessing since some protocols
      are defined as enum.
      Signed-off-by: NMasahide NAKAMURA <nakam@linux-ipv6.org>
      Acked-by: NIngo Oeser <netdev@axxeo.de>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      d3d6dd3a
    • M
      [IPV6] MIP6: Loadable module support for MIPv6. · 59fbb3a6
      Masahide NAKAMURA 提交于
      This patch makes MIPv6 loadable module named "mip6".
      
      Here is a modprobe.conf(5) example to load it automatically
      when user application uses XFRM state for MIPv6:
      
      alias xfrm-type-10-43 mip6
      alias xfrm-type-10-60 mip6
      
      Some MIPv6 feature is not included by this modular, however,
      it should not be affected to other features like either IPsec
      or IPv6 with and without the patch.
      We may discuss XFRM, MH (RAW socket) and ancillary data/sockopt
      separately for future work.
      
      Loadable features:
      * MH receiving check (to send ICMP error back)
      * RO header parsing and building (i.e. RH2 and HAO in DSTOPTS)
      * XFRM policy/state database handling for RO
      
      These are NOT covered as loadable:
      * Home Address flags and its rule on source address selection
      * XFRM sub policy (depends on its own kernel option)
      * XFRM functions to receive RO as IPv6 extension header
      * MH sending/receiving through raw socket if user application
        opens it (since raw socket allows to do so)
      * RH2 sending as ancillary data
      * RH2 operation with setsockopt(2)
      Signed-off-by: NMasahide NAKAMURA <nakam@linux-ipv6.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      59fbb3a6
    • M
      [IPV6] MIP6: Kill unnecessary ifdefs. · 136ebf08
      Masahide NAKAMURA 提交于
      Kill unnecessary CONFIG_IPV6_MIP6.
      
      o It is redundant for RAW socket to keep MH out with the config then
        it can handle any protocol.
      o Clean-up at AH.
      Signed-off-by: NMasahide NAKAMURA <nakam@linux-ipv6.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      136ebf08
  7. 31 5月, 2007 1 次提交
  8. 26 4月, 2007 5 次提交
  9. 11 2月, 2007 1 次提交
  10. 03 12月, 2006 2 次提交
  11. 23 9月, 2006 4 次提交
  12. 21 9月, 2006 1 次提交
  13. 01 7月, 2006 1 次提交
  14. 18 6月, 2006 1 次提交
    • H
      [IPSEC] proto: Move transport mode input path into xfrm_mode_transport · 31a4ab93
      Herbert Xu 提交于
      Now that we have xfrm_mode objects we can move the transport mode specific
      input decapsulation code into xfrm_mode_transport.  This removes duplicate
      code as well as unnecessary header movement in case of tunnel mode SAs
      since we will discard the original IP header immediately.
      
      This also fixes a minor bug for transport-mode ESP where the IP payload
      length is set to the correct value minus the header length (with extension
      headers for IPv6).
      
      Of course the other neat thing is that we no longer have to allocate
      temporary buffers to hold the IP headers for ESP and IPComp.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      31a4ab93
  15. 01 4月, 2006 1 次提交
    • H
      [IPSEC]: Kill unused decap state argument · e695633e
      Herbert Xu 提交于
      This patch removes the decap_state argument from the xfrm input hook.
      Previously this function allowed the input hook to share state with
      the post_input hook.  The latter has since been removed.
      
      The only purpose for it now is to check the encap type.  However, it
      is easier and better to move the encap type check to the generic
      xfrm_rcv function.  This allows us to get rid of the decap state
      argument altogether.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      e695633e
  16. 21 3月, 2006 2 次提交
  17. 13 3月, 2006 1 次提交
  18. 14 1月, 2006 1 次提交
    • J
      [NET]: Use NIP6_FMT in kernel.h · 46b86a2d
      Joe Perches 提交于
      There are errors and inconsistency in the display of NIP6 strings.
      	ie: net/ipv6/ip6_flowlabel.c
      
      There are errors and inconsistency in the display of NIPQUAD strings too.
      	ie: net/netfilter/nf_conntrack_ftp.c
      
      This patch:
      	adds NIP6_FMT to kernel.h
      	changes all code to use NIP6_FMT
      	fixes net/ipv6/ip6_flowlabel.c
      	adds NIPQUAD_FMT to kernel.h
      	fixes net/netfilter/nf_conntrack_ftp.c
      	changes a few uses of "%u.%u.%u.%u" to NIPQUAD_FMT for symmetry to NIP6_FMT
      Signed-off-by: NJoe Perches <joe@perches.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      46b86a2d
  19. 04 1月, 2006 1 次提交
  20. 02 9月, 2005 1 次提交
    • J
      [CRYPTO]: crypto_free_tfm() callers no longer need to check for NULL · 573dbd95
      Jesper Juhl 提交于
      Since the patch to add a NULL short-circuit to crypto_free_tfm() went in,
      there's no longer any need for callers of that function to check for NULL.
      This patch removes the redundant NULL checks and also a few similar checks
      for NULL before calls to kfree() that I ran into while doing the
      crypto_free_tfm bits.
      
      I've succesfuly compile tested this patch, and a kernel with the patch 
      applied boots and runs just fine.
      
      When I posted the patch to LKML (and other lists/people on Cc) it drew the
      following comments :
      
       J. Bruce Fields commented
        "I've no problem with the auth_gss or nfsv4 bits.--b."
      
       Sridhar Samudrala said
        "sctp change looks fine."
      
       Herbert Xu signed off on the patch.
      
      So, I guess this is ready to be dropped into -mm and eventually mainline.
      Signed-off-by: NJesper Juhl <jesper.juhl@gmail.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      573dbd95
  21. 30 8月, 2005 1 次提交